dress (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 129.905161] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 129.915047] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 129.925312] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 129.935360] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 129.947128] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 129.957740] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 129.965410] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 129.979510] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 129.989664] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 129.999977] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 130.010431] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 130.021184] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 130.031179] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 130.040466] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 130.052510] Bluetooth: hci0: command 0x0419 tx timeout [ 130.058099] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 130.069856] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 130.076924] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 130.092915] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 130.100719] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 130.111599] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 130.121256] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 130.130735] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 130.141243] IPv6: ADDRCONF(NETDEV_UP): wlan0: link is not ready [ 130.157552] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 130.164710] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 130.177679] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 130.187842] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 130.206312] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 130.209099] Bluetooth: hci1: command 0x0419 tx timeout [ 130.219821] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 130.233246] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 130.243372] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 130.253776] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 130.264305] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 130.274517] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 130.282482] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 130.300534] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 130.312179] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 130.327039] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 130.340759] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 130.369205] Bluetooth: hci2: command 0x0419 tx timeout [ 130.386560] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 130.401283] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 130.412587] device veth0_macvtap entered promiscuous mode [ 130.426082] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 130.443227] device veth1_macvtap entered promiscuous mode [ 130.455414] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 130.481868] IPv6: ADDRCONF(NETDEV_UP): wlan1: link is not ready [ 130.494441] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 130.503838] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 130.512426] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 130.529353] Bluetooth: hci3: command 0x0419 tx timeout [ 130.536170] IPv6: ADDRCONF(NETDEV_UP): wlan0: link is not ready [ 130.553395] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 130.560553] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 130.567361] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 130.573827] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 130.592837] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 130.602392] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 130.615731] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 130.666358] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 130.689198] Bluetooth: hci4: command 0x0419 tx timeout [ 130.694749] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 16:50:57 executing program 0: [ 130.713092] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 130.734157] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 130.751391] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 16:50:57 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={0x0}}, 0x840) [ 130.766103] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 130.787931] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 16:50:57 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_PORT_GET(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x2000c010) 16:50:57 executing program 0: r0 = socket(0x11, 0xa, 0x0) setsockopt$packet_fanout(r0, 0x107, 0x12, 0x0, 0x0) [ 130.819245] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 130.845614] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 130.856177] Bluetooth: hci5: command 0x0419 tx timeout 16:50:57 executing program 0: sendmsg$NL80211_CMD_GET_FTM_RESPONDER_STATS(0xffffffffffffffff, 0x0, 0x0) [ 130.863611] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 130.905767] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready 16:50:57 executing program 0: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000980)='/dev/vcsa\x00', 0x0, 0x0) sendmsg$NL80211_CMD_FRAME(r0, 0x0, 0x0) [ 130.929044] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 130.941597] IPv6: ADDRCONF(NETDEV_UP): wlan1: link is not ready [ 130.950209] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 130.955430] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 130.983325] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 130.985156] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 131.007461] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 131.018303] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 16:50:57 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_SET_DEST(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[], 0x5c}}, 0x44010) [ 131.027826] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 131.037875] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 131.047889] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 131.058610] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 131.067738] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 131.080032] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 131.091589] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 131.099594] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 131.106698] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 131.116627] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 131.131635] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 131.139431] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 131.147836] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 131.244805] IPv6: ADDRCONF(NETDEV_UP): wlan0: link is not ready [ 131.261776] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 131.288220] IPv6: ADDRCONF(NETDEV_UP): wlan1: link is not ready [ 131.291165] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 131.317936] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 131.341688] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 131.346019] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 131.365714] IPv6: ADDRCONF(NETDEV_UP): wlan0: link is not ready [ 131.373239] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 131.398159] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 131.410049] hrtimer: interrupt took 27664 ns [ 131.434396] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 131.436101] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 131.477945] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready 16:50:58 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_DISABLE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x4000010) [ 131.544218] IPv6: ADDRCONF(NETDEV_UP): wlan0: link is not ready [ 131.553724] Unknown ioctl 1075883590 [ 131.562853] IPv6: ADDRCONF(NETDEV_UP): wlan1: link is not ready [ 131.572117] Unknown ioctl 1075883590 [ 131.581352] Unknown ioctl 1075883590 [ 131.590754] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 131.601636] Unknown ioctl 1075883590 [ 131.605104] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 131.616341] Unknown ioctl 1075883590 [ 131.626585] Unknown ioctl 1075883590 [ 131.632437] Unknown ioctl 1075883590 [ 131.644373] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 131.654448] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 131.667550] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 131.675842] IPv6: ADDRCONF(NETDEV_UP): wlan1: link is not ready [ 131.679890] Unknown ioctl 1075883590 [ 131.696785] Unknown ioctl 1075883590 [ 131.700945] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 131.708089] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 131.718797] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 131.732269] Unknown ioctl 1075883590 [ 131.736285] Unknown ioctl 1075883590 [ 131.745323] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 131.758402] Unknown ioctl 1075883590 [ 131.769601] Unknown ioctl 1075883590 [ 131.773376] Unknown ioctl 1075883590 [ 131.777836] Unknown ioctl 1075883590 [ 131.788460] Unknown ioctl 1075883590 [ 131.803870] Unknown ioctl 1075883590 [ 131.814190] Unknown ioctl 1075883590 [ 131.830272] Unknown ioctl 1075883590 [ 131.846156] Unknown ioctl 1075883590 [ 131.855975] Unknown ioctl 1075883590 [ 131.867048] Unknown ioctl 1075883590 [ 131.877391] Unknown ioctl 1075883590 [ 131.889880] Unknown ioctl 1075883590 [ 131.893654] Unknown ioctl 1075883590 [ 131.910035] Unknown ioctl 1075883590 [ 131.913803] Unknown ioctl 1075883590 [ 131.917544] Unknown ioctl 1075883590 [ 131.927543] Unknown ioctl 1075883590 [ 131.932093] Unknown ioctl 1075883590 [ 131.935844] Unknown ioctl 1075883590 [ 131.941066] Unknown ioctl 1075883590 [ 131.944836] Unknown ioctl 1075883590 16:50:58 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_DISASSOCIATE(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x24004804) 16:50:58 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mknodat(r0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000040)='./file0\x00', 0x0) 16:50:58 executing program 1: openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x5c900, 0x0) [ 131.974978] IPv6: ADDRCONF(NETDEV_UP): wlan0: link is not ready [ 131.991368] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 132.014740] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 132.052689] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 132.067684] IPv6: ADDRCONF(NETDEV_UP): wlan1: link is not ready [ 132.077141] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 132.091331] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 132.098179] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 16:50:59 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={0x0, 0x1, 0x6, @broadcast}, 0x10) 16:50:59 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MEDIA_GET(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=ANY=[], 0xa4}}, 0x4010) 16:50:59 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_TESTMODE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x4040010) 16:50:59 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$FOU_CMD_GET(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x2000c010) 16:50:59 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_PRI(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) 16:50:59 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_WDS_PEER(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={0x0, 0xffffffffffffff8c}}, 0x0) 16:50:59 executing program 2: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000980)='/dev/vcsa\x00', 0x0, 0x0) sendmsg$NL80211_CMD_DISASSOCIATE(r0, 0x0, 0x0) 16:50:59 executing program 1: openat$vcsa(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcsa\x00', 0x100, 0x0) 16:50:59 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, 0x0) 16:50:59 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) getsockopt$packet_int(r0, 0x107, 0x13, &(0x7f0000000000), &(0x7f0000000040)=0x4) 16:50:59 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SMC_PNETID_DEL(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={0x0}}, 0x4) 16:50:59 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_BSS(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x4000880) 16:50:59 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_DEL_MPATH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=ANY=[], 0x64}}, 0xc084) 16:50:59 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_SB_POOL_GET(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x4000000) 16:50:59 executing program 5: 16:50:59 executing program 1: openat$random(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x8000, 0x0) 16:50:59 executing program 0: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000000)) 16:50:59 executing program 4: sendmsg$NL80211_CMD_DEL_KEY(0xffffffffffffffff, 0x0, 0x0) 16:50:59 executing program 5: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000980)='/dev/vcsa\x00', 0x0, 0x0) sendmsg$NL80211_CMD_SET_BSS(r0, 0x0, 0x0) 16:50:59 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SMC_PNETID_GET(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x24040050) 16:50:59 executing program 4: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000980)='/dev/vcsa\x00', 0x0, 0x0) setsockopt$packet_fanout(r0, 0x107, 0x12, 0x0, 0x0) 16:50:59 executing program 3: r0 = socket(0x11, 0x2, 0x0) sendmsg$BATADV_CMD_GET_ORIGINATORS(r0, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={0x0}}, 0x0) 16:50:59 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_DEL_DAEMON(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000003c0)=ANY=[], 0x48}}, 0x800) 16:50:59 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_COALESCE(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x24002084) 16:50:59 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_DEL_DAEMON(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0xc0) 16:50:59 executing program 2: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000980)='/dev/vcsa\x00', 0x0, 0x0) sendmsg$NL80211_CMD_DEL_INTERFACE(r0, 0x0, 0x0) 16:50:59 executing program 1: 16:50:59 executing program 3: 16:50:59 executing program 4: 16:50:59 executing program 0: 16:50:59 executing program 2: 16:50:59 executing program 5: 16:50:59 executing program 3: 16:50:59 executing program 1: 16:50:59 executing program 4: 16:50:59 executing program 0: 16:50:59 executing program 5: 16:50:59 executing program 2: 16:50:59 executing program 4: 16:50:59 executing program 3: 16:50:59 executing program 1: 16:50:59 executing program 0: 16:50:59 executing program 5: 16:50:59 executing program 2: 16:50:59 executing program 4: 16:50:59 executing program 3: 16:50:59 executing program 5: 16:50:59 executing program 1: 16:50:59 executing program 0: 16:50:59 executing program 3: 16:50:59 executing program 4: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000980)='/dev/vcsa\x00', 0x0, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) 16:50:59 executing program 2: 16:51:00 executing program 3: 16:51:00 executing program 4: 16:51:00 executing program 0: 16:51:00 executing program 5: 16:51:00 executing program 2: 16:51:00 executing program 1: 16:51:00 executing program 3: 16:51:00 executing program 4: 16:51:00 executing program 2: 16:51:00 executing program 5: 16:51:00 executing program 1: 16:51:00 executing program 0: 16:51:00 executing program 2: 16:51:00 executing program 4: 16:51:00 executing program 5: 16:51:00 executing program 3: 16:51:00 executing program 0: 16:51:00 executing program 1: 16:51:00 executing program 2: 16:51:00 executing program 3: 16:51:00 executing program 4: 16:51:00 executing program 5: 16:51:00 executing program 2: 16:51:00 executing program 0: 16:51:00 executing program 1: 16:51:00 executing program 3: 16:51:00 executing program 5: 16:51:00 executing program 4: 16:51:00 executing program 0: 16:51:00 executing program 5: 16:51:00 executing program 3: 16:51:00 executing program 0: 16:51:00 executing program 2: 16:51:00 executing program 1: 16:51:00 executing program 4: 16:51:00 executing program 3: 16:51:00 executing program 5: 16:51:00 executing program 4: 16:51:00 executing program 1: 16:51:00 executing program 0: 16:51:00 executing program 3: 16:51:00 executing program 2: 16:51:00 executing program 5: 16:51:00 executing program 4: 16:51:00 executing program 1: 16:51:00 executing program 2: 16:51:00 executing program 3: 16:51:00 executing program 5: 16:51:00 executing program 0: 16:51:00 executing program 4: 16:51:00 executing program 1: 16:51:01 executing program 5: 16:51:01 executing program 2: 16:51:01 executing program 4: 16:51:01 executing program 0: 16:51:01 executing program 3: 16:51:01 executing program 1: 16:51:01 executing program 2: 16:51:01 executing program 4: 16:51:01 executing program 0: 16:51:01 executing program 5: 16:51:01 executing program 2: 16:51:01 executing program 1: 16:51:01 executing program 3: 16:51:01 executing program 4: 16:51:01 executing program 0: 16:51:01 executing program 4: 16:51:01 executing program 5: 16:51:01 executing program 2: 16:51:01 executing program 1: 16:51:01 executing program 3: 16:51:01 executing program 2: 16:51:01 executing program 0: 16:51:01 executing program 5: 16:51:01 executing program 4: 16:51:01 executing program 1: 16:51:01 executing program 3: 16:51:01 executing program 2: 16:51:01 executing program 0: 16:51:01 executing program 5: 16:51:01 executing program 4: 16:51:01 executing program 0: 16:51:01 executing program 3: 16:51:01 executing program 2: 16:51:01 executing program 1: 16:51:01 executing program 5: 16:51:01 executing program 4: 16:51:01 executing program 0: 16:51:01 executing program 3: 16:51:01 executing program 2: 16:51:01 executing program 1: 16:51:01 executing program 5: 16:51:01 executing program 4: 16:51:01 executing program 0: 16:51:01 executing program 2: 16:51:01 executing program 3: 16:51:01 executing program 5: 16:51:01 executing program 1: 16:51:01 executing program 4: 16:51:01 executing program 2: 16:51:01 executing program 3: 16:51:01 executing program 1: 16:51:01 executing program 5: 16:51:01 executing program 0: 16:51:01 executing program 4: 16:51:01 executing program 2: 16:51:02 executing program 3: 16:51:02 executing program 1: 16:51:02 executing program 2: 16:51:02 executing program 5: 16:51:02 executing program 0: 16:51:02 executing program 3: 16:51:02 executing program 4: 16:51:02 executing program 5: 16:51:02 executing program 1: 16:51:02 executing program 2: 16:51:02 executing program 0: 16:51:02 executing program 4: 16:51:02 executing program 3: 16:51:02 executing program 5: 16:51:02 executing program 2: 16:51:02 executing program 0: 16:51:02 executing program 1: 16:51:02 executing program 0: 16:51:02 executing program 3: 16:51:02 executing program 2: 16:51:02 executing program 4: 16:51:02 executing program 1: 16:51:02 executing program 5: 16:51:02 executing program 2: 16:51:02 executing program 0: 16:51:02 executing program 1: 16:51:02 executing program 3: 16:51:02 executing program 4: 16:51:02 executing program 5: 16:51:02 executing program 2: 16:51:02 executing program 0: 16:51:02 executing program 3: 16:51:02 executing program 1: 16:51:02 executing program 4: 16:51:02 executing program 5: 16:51:02 executing program 2: 16:51:02 executing program 0: 16:51:02 executing program 3: 16:51:02 executing program 1: 16:51:02 executing program 5: 16:51:02 executing program 4: 16:51:02 executing program 2: 16:51:02 executing program 0: 16:51:02 executing program 4: 16:51:02 executing program 5: 16:51:02 executing program 1: 16:51:02 executing program 3: 16:51:02 executing program 0: 16:51:02 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000580)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCGETA(r0, 0x5405, 0x0) 16:51:02 executing program 5: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$CHAR_RAW_HDIO_GETGEO(r0, 0x301, 0x0) 16:51:02 executing program 0: request_key(0x0, 0x0, 0x0, 0xffffffffffffffff) 16:51:02 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000580)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSBRKP(r0, 0x5425, 0x0) 16:51:02 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='tasks\x00', 0x2, 0x0) 16:51:02 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x0) 16:51:02 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$FIONREAD(r0, 0x541b, 0x0) 16:51:02 executing program 0: select(0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) 16:51:02 executing program 2: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0xa040, 0x0) 16:51:03 executing program 1: select(0x0, 0x0, &(0x7f0000000080), 0x0, &(0x7f0000000100)) 16:51:03 executing program 3: pipe2$9p(&(0x7f0000000100), 0x800) 16:51:03 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000580)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCGSOFTCAR(r0, 0x5419, 0x0) 16:51:03 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0xb, &(0x7f00000000c0), 0x4) 16:51:03 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$FIONREAD(r0, 0x541b, &(0x7f0000000080)) 16:51:03 executing program 0: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) 16:51:03 executing program 3: pipe2$9p(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RSTATu(r0, 0x0, 0x0) 16:51:03 executing program 4: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, 0x0, 0x0) 16:51:03 executing program 5: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x448001, 0x0) write$P9_RREADDIR(r0, 0x0, 0x0) 16:51:03 executing program 1: r0 = socket$unix(0x1, 0x5, 0x0) sendmsg$unix(r0, &(0x7f00000001c0)={&(0x7f0000000040)=@abs={0x0, 0x0, 0x2}, 0x8, 0x0, 0x0, &(0x7f0000000180)}, 0x0) 16:51:03 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) recvmsg(r0, &(0x7f0000001640)={0x0, 0x0, 0x0}, 0x1) 16:51:03 executing program 4: mprotect(&(0x7f0000ff8000/0x2000)=nil, 0x2000, 0x4) mlock(&(0x7f0000ff8000/0x2000)=nil, 0x2000) 16:51:03 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) connect$unix(r0, 0x0, 0x0) 16:51:03 executing program 2: clock_settime(0xffffffffffffffff, &(0x7f0000000100)) socketpair(0x1, 0x2, 0x0, &(0x7f0000000040)) 16:51:03 executing program 5: semget$private(0x0, 0x3, 0x480) 16:51:03 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) poll(&(0x7f0000000240)=[{r0, 0x46}], 0x1, 0x1ff) 16:51:03 executing program 3: nanosleep(&(0x7f0000000400), 0x0) 16:51:03 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) setsockopt$sock_cred(r0, 0xffff, 0x1022, 0x0, 0x0) 16:51:03 executing program 4: r0 = socket$unix(0x1, 0x2, 0x0) fcntl$dupfd(r0, 0xa, r0) 16:51:03 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x200, 0x0) lchown(&(0x7f0000000240)='./file0\x00', 0xffffffffffffffff, 0x0) 16:51:03 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) poll(&(0x7f0000000180)=[{r0, 0x4}], 0x1, 0x0) 16:51:03 executing program 3: 16:51:03 executing program 0: mlock(&(0x7f0000ff8000/0x2000)=nil, 0x2000) mlock(&(0x7f0000ffa000/0x4000)=nil, 0x4000) 16:51:03 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) close(r0) recvmsg(r0, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) 16:51:03 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) close(r0) getsockopt$sock_int(r0, 0xffff, 0x0, 0x0, 0x0) 16:51:03 executing program 2: r0 = geteuid() setreuid(r0, 0xffffffffffffffff) 16:51:03 executing program 3: mmap(&(0x7f0000fa9000/0x2000)=nil, 0x2000, 0xaada70e314ea6b4, 0x10, 0xffffffffffffffff, 0x0) 16:51:03 executing program 5: 16:51:03 executing program 0: 16:51:03 executing program 2: 16:51:03 executing program 0: 16:51:03 executing program 4: 16:51:03 executing program 3: 16:51:03 executing program 1: 16:51:03 executing program 5: 16:51:03 executing program 2: 16:51:03 executing program 0: 16:51:03 executing program 4: 16:51:03 executing program 1: 16:51:03 executing program 3: utimensat(0xffffffffffffffff, 0x0, &(0x7f00000000c0)={{}, {0x0, 0xffffffffe52d80a2}}, 0x0) 16:51:03 executing program 5: 16:51:03 executing program 2: 16:51:03 executing program 0: 16:51:03 executing program 1: 16:51:03 executing program 2: 16:51:03 executing program 5: 16:51:03 executing program 3: 16:51:03 executing program 2: 16:51:03 executing program 4: 16:51:03 executing program 3: 16:51:03 executing program 1: 16:51:03 executing program 0: 16:51:03 executing program 2: 16:51:03 executing program 4: 16:51:04 executing program 5: 16:51:04 executing program 0: 16:51:04 executing program 4: 16:51:04 executing program 5: 16:51:04 executing program 2: 16:51:04 executing program 1: 16:51:04 executing program 3: 16:51:04 executing program 5: 16:51:04 executing program 4: 16:51:04 executing program 0: 16:51:04 executing program 2: 16:51:04 executing program 1: 16:51:04 executing program 3: 16:51:04 executing program 5: 16:51:04 executing program 2: 16:51:04 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x21, &(0x7f0000000000), &(0x7f0000000080)=0x10) 16:51:04 executing program 4: mprotect(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x0) madvise(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0) 16:51:04 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000000)={0x0, 0x0, 0x6a, "d2ee253a4604cb31f7990f00077fcdde28ddaa943e4971be0059445ff072e86d6e894372f7c49f414d5ac8b02deedf827b30636fe7e9a655c591ba721a33ac026945dc1f7157a41bcef3bc7c64109d275ad4710ccf92f0a98a51da296e0392a2122bc1ce9e9c6347e1f7"}, 0x2) 16:51:04 executing program 3: r0 = socket$inet6_udp(0x1c, 0x2, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000001080)={0x1c, 0x1c}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000040)={0xd, 0x1c, 0x2}, 0x1c) 16:51:04 executing program 5: fcntl$getflags(0xffffffffffffffff, 0x13) 16:51:04 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r0, &(0x7f0000000000)={0x10, 0x2}, 0x10) r1 = dup(r0) sendmsg$inet_sctp(r1, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x180) 16:51:04 executing program 5: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r0, &(0x7f0000000100)={0x1c, 0x1c, 0x3}, 0x1c) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x105, &(0x7f0000000040)=ANY=[@ANYBLOB="0500eb8c", @ANYRES32=0x0], &(0x7f00000000c0)=0x8) setsockopt$inet_sctp_SCTP_ASSOCINFO(r2, 0x84, 0x2, &(0x7f0000000140)={r3}, 0x14) 16:51:04 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) bind$inet(r0, &(0x7f0000000300)={0x10, 0x2}, 0x10) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r0, 0x84, 0x12, &(0x7f00000003c0), 0x64) listen(r0, 0xe9) r1 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r1, &(0x7f0000000000)={0x10, 0x2}, 0x10) sendmsg$inet_sctp(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000001500)="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", 0x1000}, {&(0x7f0000000040)="a94f8a4c8703110d788f0be422744e2728f5474f52be4f5ac3cadbe1bb08685ae2214c5c6d0420ccc93288f8b0b95437c0b91c1712bcdbf692a584c3b179544a7e8439609248c024a5f7448f35b2b3b4caeb775b2bdcd8ed20fb5d363dfa1bb82862f105e8a1cd2372dc6968143684e46fe208210a81b38efe175687195ca3507df8a69f3d121895", 0x88}, {&(0x7f0000001400)="2c84270300", 0x5}], 0x3}, 0x0) 16:51:04 executing program 1: fcntl$getflags(0xffffffffffffffff, 0x7) 16:51:04 executing program 0: mknodat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x1020, 0x0) chown(&(0x7f0000000180)='./file0\x00', 0xffffffffffffffff, 0x0) 16:51:04 executing program 4: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) bind(r0, &(0x7f0000000040)=@un=@file={0xa}, 0xa) 16:51:04 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = dup(r0) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x1206, &(0x7f00000000c0), &(0x7f0000000000)=0x10) 16:51:04 executing program 1: r0 = socket$inet6_tcp(0x1c, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0x40, &(0x7f0000000100)='cubic\x00', 0x6) 16:51:04 executing program 5: mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) 16:51:04 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) bind$inet(r0, &(0x7f0000000300)={0x10, 0x2}, 0x10) connect$inet(r0, &(0x7f0000000000)={0x10, 0x2}, 0x10) r1 = dup(r0) sendmsg$inet_sctp(r1, &(0x7f0000000280)={&(0x7f0000000040)=@in6={0x1c, 0x1c, 0x2}, 0x1c, 0x0, 0x0, &(0x7f00000001c0)=[@dstaddrv4={0x10, 0x84, 0x9, @remote={0xac, 0x14, 0x0}}], 0x10}, 0x180) [ 137.663251] sctp: failed to load transform for md5: -2 16:51:04 executing program 4: fcntl$lock(0xffffffffffffffff, 0xc, 0x0) msync(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0) 16:51:04 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x11, &(0x7f0000000080)=0x80000000, 0x4) 16:51:04 executing program 3: r0 = socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000000)=@in6={0x1c, 0x1c}, 0x1c, &(0x7f0000000340)=[{0x0}, {&(0x7f00000000c0)="ba", 0x1}, {0x0}], 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB=' '], 0x20}, 0x2014c) 16:51:04 executing program 5: shmget$private(0x0, 0x1000, 0x0, &(0x7f0000e06000/0x1000)=nil) 16:51:04 executing program 0: fcntl$getflags(0xffffffffffffffff, 0xb) 16:51:04 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) bind$inet(r0, &(0x7f0000000300)={0x10, 0x2}, 0x10) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r0, 0x84, 0x12, &(0x7f00000003c0), 0x64) listen(r0, 0xe9) r1 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r1, &(0x7f0000000000)={0x10, 0x2}, 0x10) sendmsg$inet_sctp(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000001500)="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", 0x585}], 0x1}, 0x0) 16:51:04 executing program 4: mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x10001) 16:51:04 executing program 1: setgid(0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000640)={0xffffffffffffffff}) setregid(0x0, 0x0) close(r0) 16:51:04 executing program 5: r0 = socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) connect$inet6(r0, &(0x7f0000000200)={0x1c, 0x1c, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0x1c, 0x1c, 0x1}, 0x1c) 16:51:04 executing program 0: r0 = socket$inet6(0x1c, 0x20000005, 0x0) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x31, &(0x7f0000000280)={0x0, 0x16, [], [@generic={0x0, 0xab, "ece2ff7c9de75f2f981044a0baefb683520cf9f949fd99c5b6b9e7b814066aaaaf0be3ff2264776240db8f686ae8af3c74086fe0ea4439ce55ebc02a9d3ab8b15262db66a60ead1d097df7a562661cfa47d0699ecb98eaee3cc6b00c8533a34b0e9602eeb13313f81427efd04595f58cdc90fbd36579ea5938119ce9a1a7ca983c63468488255fcb0b164b1fb620ce22cd854be9cc4986cb4e0129f8b9bf57c6cbb85b7c3e66e3bac6a2d3"}, @pad1]}, 0xb8) setsockopt$inet6_buf(r0, 0x29, 0x19, &(0x7f0000000340)="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", 0x801) 16:51:04 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000002440)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001300)=ANY=[], 0x1130}, 0x0) 16:51:04 executing program 4: mprotect(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) sigaltstack(&(0x7f0000fff000/0x1000)=nil, 0x0) madvise(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x4) [ 137.960258] sctp: failed to load transform for md5: -2 16:51:04 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) bind$inet(r0, &(0x7f0000000300)={0x10, 0x2}, 0x10) r1 = dup(r0) connect$inet(r1, &(0x7f0000000080)={0x10, 0x2}, 0x10) setsockopt$inet_sctp_SCTP_ADD_STREAMS(r1, 0x84, 0x903, &(0x7f00000000c0)={0x0, 0x81}, 0x8) 16:51:04 executing program 2: r0 = socket$inet(0x2, 0x3, 0x0) r1 = dup(r0) setsockopt$sock_int(r1, 0xffff, 0x1, &(0x7f0000000100), 0x4) 16:51:04 executing program 5: accept(0xffffffffffffffff, &(0x7f0000000380)=@in, 0x0) 16:51:05 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000180)={0x0, @in, 0x8, 0x0, 0x1}, 0x98) 16:51:05 executing program 1: r0 = socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) sendmsg(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=ANY=[], 0x20}, 0x0) 16:51:05 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_NODELAY(r0, 0x84, 0x4, &(0x7f0000000100), 0x3) 16:51:05 executing program 4: r0 = socket$inet6_udp(0x1c, 0x2, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000001080)={0x1c, 0x1c}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000040)={0x1c, 0x1c, 0x1}, 0x1c) 16:51:05 executing program 0: r0 = socket$inet6(0x1c, 0x2, 0x0) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x2e, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0x1c, 0x1c, 0x2}, 0x1c) 16:51:05 executing program 5: socket$inet6(0x1c, 0x3, 0x7e) 16:51:05 executing program 3: r0 = socket$inet6_udplite(0x1c, 0x2, 0x88) setsockopt$inet6_int(r0, 0x29, 0x3e, &(0x7f0000000140)=0xb1de, 0x4) 16:51:05 executing program 2: r0 = socket$inet6_udp(0x1c, 0x2, 0x0) close(r0) socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x1c, 0x1c, 0x3}, 0x1c) 16:51:05 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f00000024c0)={&(0x7f0000000000)=@in6={0x1c, 0x1c, 0x3}, 0x1c, 0x0}, 0x0) 16:51:05 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f00000001c0)={&(0x7f0000000000)=@in6={0x1c, 0x1c}, 0x1c, 0x0, 0x0, &(0x7f0000000140)=[@sndinfo={0x1c}], 0x1c}, 0x0) 16:51:05 executing program 5: r0 = socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000000)=@in6={0x1c, 0x1c}, 0x1c, &(0x7f0000000340)=[{&(0x7f0000000040)="515da292452808", 0x7}, {&(0x7f00000000c0)="ba", 0x1}, {0x0}], 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB=' '], 0x20}, 0x2014c) 16:51:05 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) bind$inet(r0, &(0x7f0000000300)={0x10, 0x2}, 0x10) connect$inet(r0, &(0x7f0000000000)={0x10, 0x2}, 0x10) r1 = dup(r0) sendmsg$inet_sctp(r1, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@dstaddrv6={0x1c, 0x84, 0xa, @mcast2}, @init={0x14}], 0x30}, 0x180) 16:51:05 executing program 3: mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) mkdir(&(0x7f0000000680)='./file0\x00', 0x10c) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_buf(r0, 0x6, 0x20, &(0x7f0000000640)="d916d6bd37b8b5d0f3f299f9cc07e9839ada3556c2", 0x15) mlock(&(0x7f0000ffc000/0x3000)=nil, 0x800000) munlock(&(0x7f0000ffa000/0x3000)=nil, 0x3000) 16:51:05 executing program 4: r0 = socket$inet6(0x1c, 0x20000005, 0x0) sendto$inet6(r0, &(0x7f0000000080)="12", 0x1, 0x0, &(0x7f0000000000)={0x1c, 0x1c}, 0x1c) 16:51:05 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000001200)={&(0x7f0000000000)=@in={0x10, 0x2}, 0x10, 0x0, 0x0, &(0x7f00000013c0)=[@init={0x14}], 0x14}, 0x0) 16:51:05 executing program 3: munmap(&(0x7f0000c00000/0x400000)=nil, 0x400000) msync(&(0x7f0000e43000/0x3000)=nil, 0x3000, 0x0) 16:51:05 executing program 4: r0 = socket$inet(0x2, 0x3, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x9, &(0x7f0000000080)={@rand_addr, @multicast2}, 0xc) 16:51:05 executing program 1: r0 = socket$inet6(0x1c, 0x20000005, 0x0) connect(r0, &(0x7f0000000000)=@in={0x10, 0x2}, 0x70) 16:51:05 executing program 0: 16:51:05 executing program 2: r0 = socket$inet(0x2, 0x3, 0x0) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x11, 0x0, 0x0) 16:51:05 executing program 5: r0 = socket$inet6_udp(0x1c, 0x2, 0x0) sendto(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)=@in6={0x1c, 0x1c, 0x2}, 0x1c) 16:51:05 executing program 3: r0 = socket$inet6(0x1c, 0x20000005, 0x0) sendto$inet6(r0, &(0x7f0000000000)="81", 0x1, 0x10001, &(0x7f00000000c0)={0x1c, 0x1c, 0x2}, 0x1a) 16:51:05 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) sendto$inet6(r0, &(0x7f00000000c0)='\b', 0x1, 0x0, &(0x7f0000000140)={0x1c, 0x1c}, 0x1c) 16:51:05 executing program 1: mprotect(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x0) sigaltstack(&(0x7f0000ff1000/0xa000)=nil, 0x0) madvise(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x3) 16:51:05 executing program 4: r0 = socket$inet6_udp(0x1c, 0x2, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x1c, 0x1c, 0x3}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x1b, &(0x7f0000000040), 0x4) 16:51:05 executing program 5: r0 = socket$inet6_udp(0x1c, 0x2, 0x0) setsockopt$inet6_IPV6_DSTOPTS(r0, 0x29, 0x32, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000040)={0x1c, 0x1c, 0x1}, 0x1c) 16:51:05 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) fcntl$getflags(r0, 0x1) 16:51:05 executing program 0: r0 = socket$inet6_udp(0x1c, 0x2, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000001080)={0x1c, 0x1c}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000040)={0x1c, 0x1c, 0x1}, 0x1c) 16:51:05 executing program 2: r0 = socket$inet6(0x1c, 0x1, 0x0) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x31, &(0x7f0000000280)=ANY=[@ANYBLOB="0016"], 0xb8) connect$inet6(r0, &(0x7f0000000180)={0x1c, 0x1c}, 0x1c) 16:51:05 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) bind$inet(r0, &(0x7f0000000300)={0x10, 0x2}, 0x10) connect$inet(r0, &(0x7f0000000000)={0x10, 0x2}, 0x10) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0x101, &(0x7f0000000040), &(0x7f0000000100)=0xa0) 16:51:05 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x8, &(0x7f0000000400), 0x4) 16:51:05 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r0, &(0x7f0000000040)={0x10, 0x2}, 0x10) sendmsg$inet_sctp(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000100)=';', 0x1}], 0x1}, 0x0) 16:51:05 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r0, &(0x7f0000000000)={0x10, 0x2}, 0x10) sendmsg$inet_sctp(r0, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x10c) sendmsg$inet_sctp(r0, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) 16:51:05 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/41, 0x29}], 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xcf1c, 0x0, 0x0, 0x800e00551) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000240)=""/238, 0xee}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8}, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r3, 0x0, 0xbfa8, 0x0, 0x0, 0x800e0053e) shutdown(r2, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)=""/149, 0x95}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x7}, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r5, 0x0, 0x8164, 0x0, 0x0, 0x800e00547) shutdown(r4, 0x0) mknodat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x1000, 0x0) open$dir(&(0x7f0000001240)='./file0\x00', 0x0, 0x0) shutdown(r5, 0x0) shutdown(r3, 0x0) 16:51:05 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f00000001c0)={0x10, 0x2}, 0x10) r1 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r1, &(0x7f00000006c0)={&(0x7f00000000c0)=@in={0x10, 0x2}, 0x10, 0x0}, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x105, &(0x7f0000000100)={0x1, [0x0]}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000000)={r2}, 0x8) 16:51:05 executing program 4: r0 = socket$inet6_tcp(0x1c, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f00000000c0)=0x1, 0x4) 16:51:05 executing program 3: sigaltstack(&(0x7f0000ffe000/0x1000)=nil, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000640)) madvise(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x3) 16:51:06 executing program 0: r0 = socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) read(r0, 0x0, 0x0) 16:51:06 executing program 5: r0 = socket$inet(0x2, 0x3, 0x0) accept(r0, 0x0, 0x0) 16:51:06 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r0, 0x0, 0xfd1d, 0x0, 0x0, 0x800e00515) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0xbf9d, 0x0, 0x0, 0x800e0053e) r3 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000840)=""/4095, 0xfff}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x6}, 0x2) recvfrom$inet(r3, 0x0, 0x22b41b9a8748b1b5, 0x0, 0x0, 0x800e00510) shutdown(r1, 0x0) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) writev(r4, &(0x7f0000000040)=[{&(0x7f0000001c00)="b426652889b178ebce91f988753e32ee65525659197452117a5d2e962fc3608386fdb450862af17c3dcaf2915a4dd93bd6511cbc9c8eaba240e3552a13f588442d8d86f43f6698bab04a9dd0503a28ee335547ff56d057ee9bd5377565bf8d35f5dff40081979e93c4cbbe6a0c73313e0797c044a695f619908341e1988996ddd4c642f8320484605a4a2a081a9b907cc1d63fc29d83b86a44395d7a35288ca69487fc6b50518510c94174ef5838474a0d8747a8b8f4adfcecb58315a07b4cf827011a8fe65afa7a30a2527acde3cfee5907eb37cb922de747cf6acf7a5f375e5807d1145b6a7c", 0xfec0}], 0x1) shutdown(r3, 0x0) 16:51:06 executing program 3: socket(0x1c, 0x3, 0x0) syz_emit_ethernet(0x76, &(0x7f0000000180)={@random="1fcffb37c458", @broadcast, @val, {@ipv6}}, 0x0) 16:51:06 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) bind$inet(r0, &(0x7f0000000300)={0x10, 0x2}, 0x10) connect$inet(r0, &(0x7f0000000000)={0x10, 0x2}, 0x10) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x901, &(0x7f0000000040)={0x0, 0x7}, 0x8) 16:51:06 executing program 0: r0 = socket$inet6_udp(0x1c, 0x2, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000040)={0x1c, 0x1c, 0x1}, 0x1c) 16:51:06 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f00000001c0)={&(0x7f0000000000)=@in={0x10, 0x2}, 0x10, 0x0}, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x23, &(0x7f0000000080)=ANY=[@ANYBLOB="10024e237f"], &(0x7f0000000140)=0x94) 16:51:06 executing program 5: r0 = socket$inet(0x2, 0x3, 0x0) fcntl$lock(r0, 0x0, 0x0) 16:51:06 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000400)={0x0, @in, 0x0, 0x0, 0x181}, 0x98) 16:51:06 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000002440)={&(0x7f0000000000)=@in={0x10, 0x2}, 0x10, 0x0, 0x0, &(0x7f0000001300)=ANY=[], 0x1130}, 0x0) 16:51:06 executing program 4: r0 = socket$inet(0x2, 0x3, 0x0) connect(r0, &(0x7f0000000200)=@un=@abs={0x8}, 0x8) 16:51:06 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = dup2(r0, r0) connect$inet(r1, &(0x7f0000000000)={0x10, 0x2}, 0x8) 16:51:06 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000200)={0x0, @in, 0x8}, 0xa0) 16:51:06 executing program 3: r0 = socket$inet6(0x1c, 0x20000005, 0x0) bind$inet6(r0, &(0x7f0000000040)={0x1c, 0x1c}, 0x1c) 16:51:06 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) bind$inet(r0, &(0x7f0000000300)={0x10, 0x2}, 0x10) connect$inet(r0, &(0x7f0000000000)={0x10, 0x2}, 0x10) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0x101, &(0x7f00000007c0), &(0x7f0000000040)=0xa0) 16:51:06 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f00000006c0)={&(0x7f00000000c0)=@in={0x10, 0x2}, 0x10, 0x0}, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x105, &(0x7f0000000100)={0x1, [0x0]}, &(0x7f0000000140)=0x8) r1 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x105, &(0x7f0000000100)={0x1, [0x0]}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0xf, &(0x7f0000000000), 0xc) 16:51:06 executing program 5: r0 = socket$inet6(0x1c, 0x20000005, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0x1c, 0x1c, 0x2}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000040)={0x1c, 0x1c, 0x2}, 0x1c) 16:51:06 executing program 0: r0 = socket$inet6(0x1c, 0x20000005, 0x0) setsockopt$sock_int(r0, 0xffff, 0x1018, &(0x7f0000000040), 0x4) 16:51:06 executing program 4: mknodat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x1020, 0x0) open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 16:51:06 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r0, &(0x7f0000000040)={0x10, 0x2}, 0x10) r1 = dup2(r0, r0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x15, &(0x7f0000000000), &(0x7f0000000080)=0x8) 16:51:07 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) bind$inet(r0, &(0x7f0000000300)={0x10, 0x2}, 0x10) connect$inet(r0, &(0x7f0000000000)={0x10, 0x2}, 0x10) r1 = dup(r0) sendmsg$inet_sctp(r1, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@dstaddrv4={0x10, 0x84, 0x9, @remote={0xac, 0x14, 0x0}}], 0x10}, 0x180) 16:51:07 executing program 5: setgroups(0x4000000000000060, &(0x7f0000000080)=[0x0]) setgroups(0x0, 0x0) 16:51:07 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) bind(r0, &(0x7f0000000040)=@un=@file={0xa}, 0xa) 16:51:07 executing program 0: r0 = socket$inet6(0x1c, 0x20000005, 0x0) sendmsg$unix(r0, &(0x7f0000001380)={&(0x7f0000000000)=@file={0xa}, 0xa, 0x0}, 0x0) 16:51:07 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000300)=ANY=[@ANYRES32, @ANYBLOB="010482"], 0x82) 16:51:07 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) bind$inet(r0, &(0x7f0000000300)={0x10, 0x2}, 0x10) connect$inet(r0, &(0x7f0000000000)={0x10, 0x2}, 0x10) r1 = dup(r0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x15, &(0x7f0000000380), &(0x7f00000003c0)=0x8) 16:51:07 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000180)={0x0, @in, 0x0, 0x0, 0x1}, 0x98) 16:51:07 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000001200)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[], 0x30}, 0x0) 16:51:07 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f00000006c0)={&(0x7f00000000c0)=@in={0x10, 0x2}, 0x10, 0x0}, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x105, &(0x7f0000000100)={0x1, [0x0]}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x108, &(0x7f0000000040)={r1, 0x0, 0x1}, &(0x7f0000000180)=0x18) 16:51:07 executing program 3: r0 = socket$inet(0x2, 0x3, 0x0) getsockopt$sock_timeval(r0, 0xffff, 0x1006, &(0x7f0000000000), &(0x7f0000000040)=0x10) 16:51:07 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xe, &(0x7f0000000140), 0x8) bind$inet(r0, &(0x7f0000000300)={0x10, 0x2}, 0x10) connect$inet(r0, &(0x7f0000000000)={0xfffffffffffffd91, 0x2}, 0x10) sendmsg$inet_sctp(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000001480)=[{&(0x7f0000000240)="70e38d5c39b8adc6f5e5f11325caec2f64", 0x11}], 0x1}, 0x0) 16:51:07 executing program 2: r0 = socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f00000001c0), 0x4) 16:51:07 executing program 4: r0 = socket(0x1c, 0x5, 0x0) connect$inet6(r0, &(0x7f0000000040)={0x1c, 0x1c, 0x2}, 0x1c) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x105, &(0x7f0000000380)={0x1, [0x0]}, &(0x7f00000003c0)=0x8) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x29, &(0x7f0000000340)={r1}, &(0x7f0000001780)=0x8) 16:51:07 executing program 0: fcntl$getflags(0xffffffffffffffff, 0x6) 16:51:07 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r0, 0x84, 0x12, &(0x7f0000000200)={0x1}, 0x1) 16:51:07 executing program 1: r0 = socket$inet6_tcp(0x1c, 0x1, 0x0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0x1c, 0x1c, 0x2}, 0x1c) dup2(r0, r1) 16:51:07 executing program 5: mknodat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x1020, 0x0) open$dir(0x0, 0x0, 0x0) linkat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) 16:51:07 executing program 3: msync(&(0x7f0000fec000/0x14000)=nil, 0x14000, 0x3) 16:51:07 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000740)={&(0x7f0000000280)=@in6={0x1c, 0x1c}, 0x1c, 0x0, 0x0, &(0x7f0000000700)=[@dstaddrv6={0x1c, 0x84, 0xa, @rand_addr=' \x01\x00'}, @init={0x14}], 0x30}, 0x0) 16:51:07 executing program 1: mknodat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x1020, 0x0) open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) open$dir(&(0x7f00000004c0)='./file0/file0\x00', 0x200, 0x0) 16:51:07 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f00000000c0)={0x0, @in, 0x0, 0x0, 0x10a}, 0x98) 16:51:08 executing program 2: readv(0xffffffffffffffff, &(0x7f0000000140)=[{0x0}], 0x1) pipe2(&(0x7f0000000200), 0x0) 16:51:08 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r0, 0x0, 0x8164, 0x0, 0x0, 0x800e00547) read(r0, &(0x7f0000000640)=""/69, 0x45) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$sock_timeval(r2, 0xffff, 0x1006, &(0x7f0000000080)={0x0, 0x10000}, 0x10) readv(r2, &(0x7f0000000500)=[{&(0x7f00000000c0)=""/65, 0x41}], 0x1) recvfrom$inet(r1, 0x0, 0x350, 0x0, 0x0, 0x800e004df) shutdown(r1, 0x0) 16:51:08 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_mreqn(r0, 0x0, 0x8, 0x0, &(0x7f0000000080)) 16:51:08 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect(r0, &(0x7f0000000040)=@in={0x10, 0x2}, 0x10) 16:51:08 executing program 0: mknodat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x1020, 0x0) open$dir(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) open$dir(&(0x7f0000000140)='./file0\x00', 0x2, 0x0) 16:51:08 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r1, &(0x7f00000006c0)={&(0x7f00000000c0)=@in={0x10, 0x2}, 0x10, 0x0}, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x105, &(0x7f0000000100)={0x1, [0x0]}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000000)={r2}, 0x8) 16:51:08 executing program 5: pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$TIOCSPGRP(r0, 0x40047477, 0x0) 16:51:08 executing program 4: pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$TIOCSPGRP(r0, 0x40047477, &(0x7f00000000c0)) 16:51:08 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_int(r0, 0xffff, 0x0, &(0x7f00000002c0), 0x4) 16:51:08 executing program 4: shmat(0xffffffffffffffff, &(0x7f0000ffd000/0x2000)=nil, 0x0) shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0x0) 16:51:08 executing program 1: 16:51:08 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, 0x0, 0xa) 16:51:08 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_int(r0, 0xffff, 0x0, 0x0, 0x0) 16:51:08 executing program 3: 16:51:08 executing program 5: 16:51:08 executing program 4: 16:51:08 executing program 2: 16:51:08 executing program 1: 16:51:08 executing program 0: 16:51:09 executing program 2: 16:51:09 executing program 5: 16:51:09 executing program 4: 16:51:09 executing program 0: 16:51:09 executing program 1: 16:51:09 executing program 2: 16:51:09 executing program 3: 16:51:09 executing program 4: 16:51:09 executing program 2: 16:51:09 executing program 0: 16:51:09 executing program 5: 16:51:09 executing program 1: 16:51:09 executing program 4: 16:51:09 executing program 3: 16:51:09 executing program 2: 16:51:09 executing program 0: 16:51:09 executing program 3: 16:51:09 executing program 2: 16:51:09 executing program 1: 16:51:09 executing program 5: 16:51:09 executing program 0: 16:51:09 executing program 4: 16:51:09 executing program 2: 16:51:09 executing program 5: 16:51:09 executing program 1: 16:51:09 executing program 3: 16:51:09 executing program 2: 16:51:09 executing program 4: 16:51:09 executing program 0: 16:51:09 executing program 5: 16:51:09 executing program 2: 16:51:09 executing program 0: 16:51:09 executing program 1: 16:51:09 executing program 3: 16:51:09 executing program 4: 16:51:09 executing program 2: 16:51:09 executing program 5: 16:51:09 executing program 0: 16:51:09 executing program 3: 16:51:09 executing program 1: 16:51:09 executing program 4: 16:51:09 executing program 2: 16:51:09 executing program 5: 16:51:09 executing program 3: 16:51:09 executing program 0: 16:51:09 executing program 1: 16:51:09 executing program 4: 16:51:09 executing program 2: 16:51:09 executing program 5: 16:51:09 executing program 3: 16:51:09 executing program 0: 16:51:09 executing program 4: 16:51:09 executing program 5: 16:51:09 executing program 1: 16:51:09 executing program 2: 16:51:09 executing program 3: 16:51:09 executing program 4: 16:51:10 executing program 5: 16:51:10 executing program 0: 16:51:10 executing program 2: 16:51:10 executing program 1: 16:51:10 executing program 3: 16:51:10 executing program 4: 16:51:10 executing program 5: 16:51:10 executing program 2: 16:51:10 executing program 0: 16:51:10 executing program 1: 16:51:10 executing program 4: 16:51:10 executing program 2: 16:51:10 executing program 5: 16:51:10 executing program 3: 16:51:10 executing program 1: 16:51:10 executing program 0: 16:51:10 executing program 3: 16:51:10 executing program 4: 16:51:10 executing program 2: 16:51:10 executing program 1: 16:51:10 executing program 5: 16:51:10 executing program 0: 16:51:10 executing program 4: 16:51:10 executing program 3: 16:51:10 executing program 2: 16:51:10 executing program 1: 16:51:10 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f00000001c0)={0x10, 0x2}, 0x10) sendmsg$inet_sctp(r0, &(0x7f0000000680)={&(0x7f0000000000)=@in={0x10, 0x2}, 0x10, 0x0}, 0x0) 16:51:10 executing program 0: 16:51:10 executing program 3: 16:51:10 executing program 4: 16:51:10 executing program 5: 16:51:10 executing program 3: 16:51:10 executing program 0: 16:51:10 executing program 2: 16:51:10 executing program 1: 16:51:10 executing program 4: 16:51:10 executing program 5: 16:51:10 executing program 1: 16:51:10 executing program 2: 16:51:10 executing program 0: 16:51:10 executing program 4: 16:51:10 executing program 3: 16:51:10 executing program 5: 16:51:10 executing program 1: 16:51:10 executing program 0: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180), 0x0}, 0x48) 16:51:10 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000016c00)={0x11, 0x4, &(0x7f0000000080)=@framed={{}, [@alu={0x4}]}, &(0x7f0000000100)='GPL\x00', 0x1, 0xc4, &(0x7f0000000140)=""/196, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 16:51:10 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000dec000)={0x1a, 0x4}, 0x40) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0), 0x10000000000000cb, 0x0, 0xffffffffffffff69, 0x20000001}, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x4e24, @private=0xa010101}, 0x4, 0x3, 0x1}}, 0x80, &(0x7f0000000340)=[{&(0x7f0000000500)="5fb90c5e5f67122af6951772ff1636150dc14d0062c3cc7638925c1bba65ccbc78185ab573dece47388324f8b760ea678314fa0e6c141c746f4fb89d0978e4a43d32f918a221b9b9ab0e62bf231542b11919053e9ec441ad77e5076a7ae3249e25187865a27c3b5e671f67dbcb00fa9c56b2c7732a0818cebbc37d3be728531456493d2fbc12c9c0cabcf107f49964d1ef377c00c5db2457f70ff9a56bf73e80bcc7311062b76097d1d541dc7baebaa664ccc020469836529bff3a4f66ac62b5c52314a7d6c4a18ab9d39f008f9e72fb32e1d90927fe774cd5d14875b86553227cb6cae08eb8a1174481eb6cb1f3602ff3", 0xf1}, {&(0x7f0000000200)}, {&(0x7f0000000240)="6154d41a28fb1b98", 0x8}, {&(0x7f0000000600)="bd4d1535529d795e9e17ae49d1df97b3550a5e17b479d61c845fa09b4bc840c5ef303943f35b2dc399b330a4b420354122c9c05776043148728bc8a1c78e96393ed3bbc1add8d3b625bd3bd4bdcd9295dd793f7bfe2773ef6a90afeaa5aa5ada490fb0205c2d235e081fa10f35ae7d334a573bcf3cd995758c648720cd5e426ea96eebd3382347efb5f8ef53988fab9a564248dd1e", 0x95}, {&(0x7f0000000280)="210e91ab3f2cdbbe7a39c8", 0xb}, {&(0x7f0000000780)="2c56ec0b6b7fb35ea9d91d9d77d23cd559f71a07b1bfccc53dd46820dccb4a529b2d19348f4a9d11ad8673a253a24c17e7e68a66a29f60e14e9b32fd3e8797c29c731cfca1d6d21d6abd9ded5517dd8cf8f3a862f0805034e7ea8236758897be6c52128dab7d9d6eaf963888ac38e0df2fbf68ee3f270f09b5eac87b100bf1a61cb14190b847935a2e3c4173cfabf9895b7c0f25b6cc48ba", 0x98}], 0x6, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], 0x2f8}, 0x0) socketpair(0x1, 0x3, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(r2, &(0x7f00000000c0)='memory.events\x00', 0x0, 0x0) r3 = getpid() perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x820, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x200}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, r3, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f2, &(0x7f0000000080)='ip6tnl0\x00') socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10000, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x0, 0x7f, 0xca, &(0x7f0000000080)=""/202, 0x0, 0x1, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000003c0)={0x2, 0xb, 0x3, 0x9}, 0x10}, 0x78) 16:51:10 executing program 3: r0 = socket$kcm(0x29, 0x5, 0x0) sendmsg$kcm(r0, &(0x7f0000004e80)={0x0, 0x0, &(0x7f0000004d40)=[{&(0x7f0000004b80)="c0", 0x1}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f000000f8c0)={0xffffffffffffffff}) sendmsg$inet(r1, &(0x7f000000fb00)={0x0, 0x0, &(0x7f000000fa40)=[{&(0x7f000000f940)="d8", 0x1}], 0x1}, 0x20000880) 16:51:10 executing program 5: 16:51:10 executing program 1: 16:51:10 executing program 5: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f000000f8c0)) 16:51:10 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c3f, 0x427, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000540), 0x4}, 0x0, 0x7c4, 0x400000, 0x0, 0x8, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x9, 0x3, 0x0, 0x0, 0x0, 0x1fd, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, @perf_bp={&(0x7f0000001700), 0xb}, 0x11114, 0x800200000, 0x9, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x2, 0x200000000000001, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r4 = openat$cgroup(r3, &(0x7f0000000200)='syz0\x00', 0x200002, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000240)={0x2, 0x0, @empty}, 0x10, &(0x7f0000001780)=[{&(0x7f0000001bc0)="7f860b0d26554408053c2f3f4be5bf1161a6ebbe34aa04206f57c398832a35acbc6c174674198c2741b7a8921ef01888d466993a66b2fe97c8ff673293273857923a13afe18f97bf83345fa0822bf3efeb510f9fe7b8dc301969e35f262b1284e8ee94ca5bbad95595107d82f0e8132ba892a8355f6b9e15df1990aeb204fd306481d1f37617d1fa5f3e87c662677dcc8d61ff5306b7e3fd08d6f2bc529f7fbe72ee9184cb95fda4dda85c7334f2e06d95b335cec884f944d3b72b30", 0xbc}, {&(0x7f00000002c0)}, {&(0x7f00000005c0)}, {&(0x7f0000000440)}], 0x4, &(0x7f0000000580)=ANY=[@ANYRES16, @ANYRES64, @ANYRESHEX=r4, @ANYRESHEX=r1, @ANYRES64=r2], 0x199}, 0x20000044) perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0x40, 0x1, 0x7f, 0x80, 0x0, 0x0, 0x10, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1ff, 0x1, @perf_bp={&(0x7f00000000c0)}, 0x600, 0xfff, 0x3, 0x2, 0x4, 0x6, 0x2}, 0x0, 0x0, r0, 0x2) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='pids.current\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000001b00)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc87,\x00\xd2\x97\x04\x03\xdc\r\xd3\x85)\x18+j\xa6&\x8a\x85\xda\xbc\xfc\xcdx\xa8\x96\x83\x99\x15-_\xdf(\xbb\xb4VJh\xdfl94\x8c\x872\x8a.\v\x8d^\x10\x1bfJgD\x9d\xe0T\xa4\xc4\n\x8c_\f\x96\x19\xff\x14\x15\xddI\xa1!\xe7cf\xd95\xe9s\x1e\x8d\xb7~E\x94\xbf\xb3\xae\xdf\x14\xa3ofG\xf6\xe4\xcb\t\x8f\xea\x97\x03\xbbg\"\x83\xbb7L\xdfzD\xa7\xb7k\xaeW\xe3\x1ewpN\xeb-4\x91kr\xbc\xfep\xfbmQ(2\t\x90\xb9\x93\xcb\xd1\x13,0 \xc8D\xe7\xf26Q\xd3\xa8\xa3\x86\xf4\xa5') bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000600)=0x8001) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000b40)='lo\x00\x96o8\x14d\xa1\xe3\xd7\\b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\xff\xe6\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\xb7l\xed}\xe5\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2ak\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x01\x00\x00\x00\xd3\r7\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xd5s2\x9cVF\xd5\x18\xfe\x0f\x8f \x01\x00\x00\xb1\x88\xebW_\xa5\xe1\xf6\x8aj\xca\xf8m\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\rh^J-\xd1\xbaUn\x04\'%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x1f\x9c,\x113\x7f\x03\x93\xe1\xcc\xe7f\r\xf3\xff0\f\x82%_\x92\x8b\xc4\xb9\xd9\xe7\xf2\xe4\xc1i\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\r\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1\xa8\xd4\xe6K0\xe1\xa3TS\x18\xe6x\x1f%P\x9fU)\x83E\n\x90M\r.\x85gn_\xb2\xe9\x8a\x1c\xe3\x93\xd8\xbc\xb6N\xc3\xe1\xafh\xa0iF\xdcq\xf9\x17\xd9i\x844E\x1a\x13\x9a\xe6\xd3\xab:PM\xfbe\xfe9\xd9\x94\x1dx\xd6\x03b\xf7\x10N\xd1\x93\rU\x7fy\x18tE\xf1*\x9a0Z\x9f\xdc{\x13\xf6\xb7\xf7\xe6=\x9cD\x108\x8eS\xa0\xd0\xa7\tn\xd9\xae\xc0\x18~x[\x85Y\xb2\x82w\x150\x97\xba\xe6\xca\xb1\xa3\x02\x14^\xbdZ\xae\xf5/\xcf\xb8\xea8Uw\x92`\"2\x81j\xbb\x87+\x89\xc50x0, 0x1, 0x0, 0x6, @dev}, 0x80, 0x0}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x2, 0x4, 0x18, 0x8000000000000002, 0x0, 0x0, 0x0, [], r2}, 0x40) 16:51:10 executing program 1: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r1, 0x18000000000002e0, 0xe10, 0x9000a00, &(0x7f00000004c0)="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", 0x0, 0xfd, 0x6000000000000000, 0xfffffffffffffe7e, 0x1d4}, 0x28) recvmsg$kcm(r0, &(0x7f0000000080)={&(0x7f0000004e00)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, 0x0}, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x2, 0x4, 0x400000, 0x8000000000000002, 0x0, 0x0, 0x0, [], r2}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000000040)={r3, &(0x7f0000000140), &(0x7f0000000380)=""/205, 0x700}, 0x20) 16:51:10 executing program 4: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f000000f600)) [ 144.030438] device lo entered promiscuous mode 16:51:11 executing program 0: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000003bc0)={0xffffffffffffffff}, 0x4) 16:51:11 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001600)=@bpf_lsm={0x1d, 0x2, &(0x7f00000003c0)=@raw=[@map_val], &(0x7f0000000440)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 16:51:11 executing program 0: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r1, 0x18000000000002e0, 0xe10, 0x9000a00, &(0x7f00000004c0)="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", 0x0, 0xfd, 0x6000000000000000, 0xfffffffffffffe7e, 0x1d4}, 0x28) recvmsg$kcm(r0, &(0x7f0000000080)={&(0x7f0000004e00)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, 0x0}, 0x0) r3 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)="d1", 0x1}], 0x1}, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x2, 0x4, 0x400000, 0x8000000000000002, 0x0, 0x0, 0x0, [], r2}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000000040)={r4, &(0x7f0000000140), &(0x7f0000000380)=""/205}, 0x20) 16:51:11 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 16:51:11 executing program 4: socketpair(0x26, 0x80000, 0x0, &(0x7f0000000000)) 16:51:11 executing program 4: getpeername$unix(0xffffffffffffff9c, 0x0, 0x0) 16:51:11 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c3f, 0x427, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000540), 0x4}, 0x0, 0x7c4, 0x400000, 0x0, 0x8, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x9, 0x3, 0x0, 0x0, 0x0, 0x1fd, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, @perf_bp={&(0x7f0000001700), 0xb}, 0x11114, 0x800200000, 0x9, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x2, 0x200000000000001, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r4 = openat$cgroup(r3, &(0x7f0000000200)='syz0\x00', 0x200002, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000240)={0x2, 0x0, @empty}, 0x10, &(0x7f0000001780)=[{&(0x7f0000001bc0)="7f860b0d26554408053c2f3f4be5bf1161a6ebbe34aa04206f57c398832a35acbc6c174674198c2741b7a8921ef01888d466993a66b2fe97c8ff673293273857923a13afe18f97bf83345fa0822bf3efeb510f9fe7b8dc301969e35f262b1284e8ee94ca5bbad95595107d82f0e8132ba892a8355f6b9e15df1990aeb204fd306481d1f37617d1fa5f3e87c662677dcc8d61ff5306b7e3fd08d6f2bc529f7fbe72ee9184cb95fda4dda85c7334f2e06d95b335cec884f944d3b72b30", 0xbc}, {&(0x7f00000002c0)}, {&(0x7f00000005c0)}, {&(0x7f0000000440)}], 0x4, &(0x7f0000000580)=ANY=[@ANYRES16, @ANYRES64, @ANYRESHEX=r4, @ANYRESHEX=r1, @ANYRES64=r2], 0x199}, 0x20000044) perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0x40, 0x1, 0x7f, 0x80, 0x0, 0x0, 0x10, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1ff, 0x1, @perf_bp={&(0x7f00000000c0)}, 0x600, 0xfff, 0x3, 0x2, 0x4, 0x6, 0x2}, 0x0, 0x0, r0, 0x2) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='pids.current\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000001b00)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc87,\x00\xd2\x97\x04\x03\xdc\r\xd3\x85)\x18+j\xa6&\x8a\x85\xda\xbc\xfc\xcdx\xa8\x96\x83\x99\x15-_\xdf(\xbb\xb4VJh\xdfl94\x8c\x872\x8a.\v\x8d^\x10\x1bfJgD\x9d\xe0T\xa4\xc4\n\x8c_\f\x96\x19\xff\x14\x15\xddI\xa1!\xe7cf\xd95\xe9s\x1e\x8d\xb7~E\x94\xbf\xb3\xae\xdf\x14\xa3ofG\xf6\xe4\xcb\t\x8f\xea\x97\x03\xbbg\"\x83\xbb7L\xdfzD\xa7\xb7k\xaeW\xe3\x1ewpN\xeb-4\x91kr\xbc\xfep\xfbmQ(2\t\x90\xb9\x93\xcb\xd1\x13,0 \xc8D\xe7\xf26Q\xd3\xa8\xa3\x86\xf4\xa5') bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000600)=0x8001) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000b40)='lo\x00\x96o8\x14d\xa1\xe3\xd7\\b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\xff\xe6\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\xb7l\xed}\xe5\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2ak\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x01\x00\x00\x00\xd3\r7\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xd5s2\x9cVF\xd5\x18\xfe\x0f\x8f \x01\x00\x00\xb1\x88\xebW_\xa5\xe1\xf6\x8aj\xca\xf8m\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\rh^J-\xd1\xbaUn\x04\'%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x1f\x9c,\x113\x7f\x03\x93\xe1\xcc\xe7f\r\xf3\xff0\f\x82%_\x92\x8b\xc4\xb9\xd9\xe7\xf2\xe4\xc1i\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\r\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1\xa8\xd4\xe6K0\xe1\xa3TS\x18\xe6x\x1f%P\x9fU)\x83E\n\x90M\r.\x85gn_\xb2\xe9\x8a\x1c\xe3\x93\xd8\xbc\xb6N\xc3\xe1\xafh\xa0iF\xdcq\xf9\x17\xd9i\x844E\x1a\x13\x9a\xe6\xd3\xab:PM\xfbe\xfe9\xd9\x94\x1dx\xd6\x03b\xf7\x10N\xd1\x93\rU\x7fy\x18tE\xf1*\x9a0Z\x9f\xdc{\x13\xf6\xb7\xf7\xe6=\x9cD\x108\x8eS\xa0\xd0\xa7\tn\xd9\xae\xc0\x18~x[\x85Y\xb2\x82w\x150\x97\xba\xe6\xca\xb1\xa3\x02\x14^\xbdZ\xae\xf5/\xcf\xb8\xea8Uw\x92`\"2\x81j\xbb\x87+\x89\xc50x0, 0x1, 0x0, 0x6, @dev}, 0x80, 0x0}, 0x0) r3 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)="d1", 0x1}], 0x1}, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x2, 0x4, 0x400000, 0x8000000000000002, 0x0, 0x0, 0x0, [], r2}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000000040)={r4, &(0x7f0000000140), &(0x7f0000000380)=""/205}, 0x20) 16:51:11 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername$unix(r0, 0x0, 0x0) 16:51:12 executing program 4: openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x201, 0x0) 16:51:12 executing program 5: 16:51:12 executing program 3: pipe2(&(0x7f0000003680), 0x0) 16:51:12 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x0, 0x0) getdents(r0, 0x0, 0x0) 16:51:12 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername$unix(r0, 0x0, &(0x7f0000000180)) 16:51:12 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) sendmsg(r0, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[{0x10, 0x1}], 0x10}, 0x0) 16:51:12 executing program 2: 16:51:12 executing program 1: r0 = socket$unix(0x1, 0x2, 0x0) setsockopt$sock_cred(r0, 0xffff, 0x1022, 0x0, 0x0) 16:51:12 executing program 3: 16:51:12 executing program 5: 16:51:12 executing program 4: 16:51:12 executing program 0: 16:51:12 executing program 3: 16:51:12 executing program 5: 16:51:12 executing program 0: 16:51:12 executing program 1: 16:51:12 executing program 4: 16:51:12 executing program 2: 16:51:12 executing program 0: 16:51:12 executing program 5: 16:51:12 executing program 1: 16:51:12 executing program 4: 16:51:12 executing program 3: 16:51:12 executing program 2: 16:51:12 executing program 0: 16:51:13 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@union={0x0, 0x1, 0x0, 0x5, 0x1, 0x0, [{0x0, 0x5, 0x20}]}]}}, &(0x7f00000001c0)=""/216, 0x32, 0xd8, 0x1}, 0x20) 16:51:13 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x5, 0x20}]}]}}, &(0x7f00000001c0)=""/216, 0x32, 0xd8, 0x1}, 0x20) 16:51:13 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x2}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) 16:51:13 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x881) 16:51:13 executing program 2: r0 = socket$kcm(0x2, 0xa, 0x2) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x541b, &(0x7f0000000000)={'vlan0\x00', @broadcast}) 16:51:13 executing program 0: socketpair(0x2, 0x2, 0x7, &(0x7f0000000080)) 16:51:13 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x2}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000100)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}) 16:51:13 executing program 5: r0 = socket$kcm(0x29, 0x2, 0x0) recvmsg$kcm(r0, &(0x7f00000028c0)={0x0, 0x0, &(0x7f0000002740)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}, 0x40) 16:51:13 executing program 4: socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) 16:51:13 executing program 3: openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x10040, 0x0) [ 146.187786] syz-executor.2 uses obsolete (PF_INET,SOCK_PACKET) 16:51:13 executing program 2: r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0xc0045878, 0x0) 16:51:13 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x2}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, 0x0) 16:51:13 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000080)='io.stat\x00', 0x0, 0x0) 16:51:13 executing program 0: socketpair(0xa, 0x6, 0x0, &(0x7f0000000240)) 16:51:13 executing program 4: r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x400454e2, 0x0) 16:51:13 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x2}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}) 16:51:13 executing program 1: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) sendmsg(r0, &(0x7f0000002740)={0x0, 0x0, &(0x7f00000024c0)=[{&(0x7f00000003c0)="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", 0x1000}, {&(0x7f0000000180)="cd9bf340319d178e54b33e638a63c0b56d813b008edba09866dde543d36d2cd0b74ed2f54616d9e4d2568ca59119fd4c7341728a4a623c4a2d616a4c8894e0700282d22f05729dd15d9328b68b987c532164b5dd03b1eaa3aad8a948ee749282038cd5b5a7c96f66686bb5eca9e3e3f98c41affa9f503449431f83b2bce30e7f9f19ec69300d16a9102bb3d62c5d7bb10eab487e7d06fdfc0b1cc8c613f0c8232db0d2c621fecb474107ea1ff03bcf3aae764e6ea5ccf95a762f4ec00118198929300904fbfbcaa4a280a6c25114dcdd5e85a713c20a7bf2bf379587d23160a2bf497346a797d8004b0ff4381e", 0xed}, {&(0x7f0000000280)="6fa18e650abb76f7cbe8c8295148884f1cc34da1808bcf2d152c9521aa16d75b7c25a8c24b45bf4703cb797a41f2131554d1c4821589906608c2ec70488501dd1521267a06399bf12400e6f5ddd4be25948ba2a1354b3b7adcbc50092a2e034efd7162d9be912344439983835a367a889ece2163304e7740a334d1c8f799f5a865df18da56ced7621f9b1f23cd4afaac47eef929cfea818e2d9f78db864040e38ba610d9", 0xa4}, {&(0x7f0000000340)="b95f9ba04d0c8e3f53f2aa911316a1a4f7ccffacc9984081a61c2d50", 0x1c}, {&(0x7f00000013c0)="d3ce39618fbe6c9cbefcbcd1c30937f29d6ca52283a4564d076ec39842d474ec5e7a5a87e8fc852b61be4f914172e2e51ee9e6ded6fbb69e916d41a18470d898db873cbc4842e1e5bbe0b8e66ced7f5c55d1645940e2fe7d1e8f6e37e1b108242f5c81c1f85b6f4dd23edf372f9757769266123a8740bb564c3f8f38a766d6bdc5e96a80e2cf4411706ee2ce444f84b04bddb4b23c488dfc21d01b3999cf9735fe64de634f4805551cd0e9f0b19377d51f77f782fd0de71bebe70adaceb03ed1e7dd1d8877a4352369acf638d45ff02fb3aab9ab41b13dca976eedb979448c", 0xdf}, {&(0x7f00000014c0)="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", 0xb35}], 0x6}, 0x0) 16:51:13 executing program 5: socketpair(0x2, 0x1, 0x40, &(0x7f00000000c0)) 16:51:13 executing program 2: 16:51:13 executing program 0: r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x8983, &(0x7f0000000040)) 16:51:13 executing program 4: r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x8981, 0x0) 16:51:13 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x1, 0x2, 0x4, 0x9}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000100), &(0x7f00000001c0), 0x4, r0}, 0x38) 16:51:13 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x2}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, 0x0) 16:51:13 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x2}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000001c0)='/dev/net/tun\x00') 16:51:13 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x2}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) 16:51:13 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000140)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x11000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f2, &(0x7f0000000000)='ip6gre0\x00') socket$kcm(0x29, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000001f40)={&(0x7f0000001f00)='./file0\x00'}, 0x10) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000040)='devices.allow\x00', 0x2, 0x0) 16:51:13 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@const={0x0, 0x0, 0x0, 0xa, 0x3}]}}, &(0x7f00000000c0)=""/172, 0x26, 0xac, 0x1}, 0x20) 16:51:13 executing program 2: perf_event_open(&(0x7f0000000080)={0x5, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x2}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 16:51:13 executing program 5: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f00000003c0)={0x0, 0x0, 0x0}, 0x60000051) 16:51:13 executing program 1: r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x541b, 0x0) 16:51:13 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x2000, 0x0) close(r0) 16:51:13 executing program 5: socketpair(0x29, 0x5, 0x0, &(0x7f0000000040)) 16:51:13 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x3}, 0xffffffffffffff7f) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x311100, 0x0) bpf$BPF_MAP_FREEZE(0x16, 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000080)={0x1000}, 0x8) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000380)={r0}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) 16:51:13 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x2}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)) 16:51:13 executing program 1: r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0xc0189436, &(0x7f0000000040)) 16:51:13 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0xd, 0x2, 0x4, 0x7fff}, 0x40) 16:51:13 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/172, 0x29, 0xac, 0x1}, 0x20) 16:51:13 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000140)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x11000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f2, &(0x7f0000000000)='ip6gre0\x00') socket$kcm(0x29, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000001f40)={&(0x7f0000001f00)='./file0\x00'}, 0x10) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000040)='devices.allow\x00', 0x2, 0x0) 16:51:13 executing program 2: perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x2, @perf_config_ext={0x0, 0x2}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 16:51:13 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000140)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x11000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={0x1, 0x28, &(0x7f0000000240)}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f2, &(0x7f0000000000)='ip6gre0\x00') perf_event_open(0x0, 0x0, 0x4, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x29, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000001f40)={&(0x7f0000001f00)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, 0x0) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001c40)=r3, 0x4) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000300)='freezer.state\x00', 0x2, 0x0) r4 = socket$kcm(0x29, 0x5, 0x0) sendmsg$kcm(r4, &(0x7f00000002c0)={&(0x7f0000000340)=@hci={0x1f, 0xffffffffffffffff, 0x1}, 0x80, &(0x7f0000000740)=[{&(0x7f00000003c0)="7cce56d7b4b0f249255dd58314a5502a5b6c7f5df935724c700b2bf371f908fcb8e4101fc09059956790ec8aa98af6cd1ac547ffeaa80ca7a4148e865276c44834ca185d3b1890d92bebb406abf552fe5127b392cbf8bab72ba1e065f72d7bf995759d7478854d97111a0283af5809f675944aa247e35651f26b4b3ae0e8641818bed1f5111dd75d7c419c6c91cc1c615192b54ed4c096f6148b919e970f4ac88315ed825980429fef2f72f9d43fe831644ce2956e275704e4ccc179c4ab82805741ee01713508109a26017b503ba9d23016f137ff38010ea7744889b519411e6eeceec4", 0xe4}, {&(0x7f00000004c0)="df13ada3bbe7393f38ef692ca838705e14c83c5b39f7533814ba2185704b295ec497658aa6b6acc73f9e238138f34fdd5ca22de87ec599cafa73bc04fbcb399d58b1df064b0c5de09c59c68b5a47df7763", 0x51}, {&(0x7f0000001c80)="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", 0x154}, {&(0x7f00000006c0)="1d0c4a29c6c52282672a3a58514c945f33e846d6985ff981fefb0033e5b09ac026f6c2ed03aa361b5acf237e209496deeabf104e0e0421e8bbbc5c0b617e49f6f8efbf64c9b117833721347d037abe585cfa3148aece7ca3062ae258280200", 0x5f}], 0x4, &(0x7f00000007c0)=ANY=[@ANYBLOB="2000000000000000060000000100000091fffd0a3a347fb0d878bf89acb67500b00000000000000008010000ff000000b71783ab8715e520053a9b1394ce209072d4de97401633829f487530881cfda9f43749ff7e2fb63855df9b1969da94aa366b02e84db76b8a104e6a2ac31b69a55a8e7b1a9d3035f8be8c816e608191b147f3b7dc6b2c670cb97be8a675c4be1751e74783da6e59955ffa4f415bd5c550cb0a54210880b000600fc377096a923c5d43c559b91cde025a90c84e2591fec0da180940a35da974fc8caed130b43400180000000000000029000000ffff0000e12ae7000000000018000000000000000c01000000080000655e9ffd1d000000a80000000000000011010000ffff0000588b51d9cbd1b1647f0f175bb1eeba2274d0b1d63710124d85ea68f25cdc059c6b20ddf30b290344e783ef29338a4340ebfd8808ba0830e00788caf39e30e89417a345cde3833254b5063c657849dcb075f10bea3d3959c878313f3e15254ea58a874c251f597f780cfa151720d9ae029a61745006c51f104e16ad8038fab68203faf6cbdd6c9d7577f8f0726cec7ee49ff60dae5476606c3af9d1049b4b35076e967c00000000001010000000000000080100004005000062b7a1fdfb952cb2ddbb52e9bece54999bdfa8adb679422e5740756fbbfd97da2c42c86af9deca13c84f6e71de35f376593a1fea1d5d7c0d59bda68913035d52ef6bc5d9b00dd8c184ff063b1f9159fa37d4e25b1efd2c6d5ae6d2d5d18e061fcc1e50745c32fcebbcd05cacbbe4d600f90c2faa58350c12816a9b02b382d3c78a6fca130f66f926c3071886071d49538ffa02aaf176c58cec690714ea9720a8f8e1555c501aa566d1b981fbbed4440df823c0888d44643b21a03440470b8caff56ee04b1975a7c1481b8b14142b13e2824b39ec0f9072d5869ebb3fd01bda74a8085e836a94842020ff0dd59371271af834c42e3fc74b3e037a1005863b94ab37f7b27971a748dd8e6ae245c997c18aa5cb9236a831002f9a2a73be73ce1cbfc35ffb11521108be48f471ab687a8a19488cc45a1c41d281ef347cd57d98b1dc1dcefedd016e45c490342c001f73fead944a408a297b182de38c80b73b80a01d71413f75987c41f1c71302b1d72c1fce6ef2af4f34364b062c602d0621b87185d22aed6e1c3ded53b2ae325f314986b4f1711865fd39892f29c50639400c83a7f28c185e3eee9654198ada780ebe3a78334aba202e027e2576e81433e978f7b8deaafaf799a091e9268993901d4ca7f7cfd261ec751cb98f443744be9f586cffe00b54f4f53f707a5d51925970b8aff117eed542079ce839275d64851e6f229c0b031e0267988fc47042b9252ad5e01e33831dd2d3f12054d7a482031e779a5ceb191c98fbc7424f4548abacb82a5020b9ba2bd87eef867fb63867dd98e75e290f563b18d07cad0d7bc1391721b39f20729996b2ee95fe31761ec56fe20ffe616435483b20562ef5e936753e8690193cfc19eef5efdbab98323d83beae6e074c11365ca82eff4a13559bd10c3c152ecabff2140acc984b4610593746638e9b751fb74bc872d6fa0d2f2f0026cb9906ba7cd5e8375c6a5cf03beb5fac0714dd069684bf16532aee3bf5d395d018c079f1c50d55522ca5b21354c18b4613f014316799e570536e437c975dbe4cdce8acfbfae3b5456bbacc5de364657cf09061a8d36c4a255dad03b9f3a859225a627d1ac0cb8cac46ccd4b165a4830031b684d58d13ce37477ab2687063b9972e325a1da725062c296d9cc8ee00887cc7939ef929183e956c0210a77fc30efa4fc002565ed4847adf1cbbb0878bc6c052b55ed7182513075a36738d9c59638e07a499a32cf66bf16d2185c8205cf4e90da34fdd9bf82b4007f799f38da3e9ec38398750d8d59078e900803a48d1714fa5edf14c98becf1679115cdb7b3d5957b9613b30bf5f4175448b03de9aafe73ca66bb678fbbb4a80b39d5b23043d9c36d827e34bf846d4f44d9e311a9c23d9b78889454c1bb27c71901af865c18721bc8f99a406a37ffee3aadc9d6c429e96fe585f909f881342f334010fe5e7bedd743b2a0895f38e8d7927dbd279a208dc439b521b5bc5bac3254cd8b5fa3af835a04cd8ae53a8eeff4353010af79fb42258ef9a313b28fc1afb6b99e8fa19815af8347784b5e8fe5b4532553c3705e4482c6a715d0d5a7dd6ec136fe02bf240b1f09533d4915a35f8e6f97a8b4a311e5c8206a20185bd498f67b8b071cb11cc08ad135ec40997c6d0a9308e774f2cf58181d3966397a614ed61f5960dfbfb81e99202450d64e52f70bdab7743d3fa40ac3c66b8c2a065089b62cb7280ec140fee6ecdbfa8b391e9b1395c5e368e6187fc4ba5df73f48255ef02f398b287b66d2f15ccb753053e30bd480adb6108bef8cd844b2b0ec4bdee4771b9a4e9cc9c43c461975f1a0d74714a9e5d90f24ad1466ae48918319f19b3a4e1a31517c74c38d8f4031543e0681a0df0caffeb0abcc63f4890610a15ed8d5f52b2967ea1545e01ff419b962c1edd4185b638f7cb5f7ffe4a88962057223324b8f3350f2fe05e07a38fe78c1ed9e6291db8e82045d07640e2a7190961a5296c4061abe2fbaeeab58bb461bfa9aac375b8d555785fcb9948d040b157ed22d55c3dab4036f6133af0d042d5edc16b2b8fcd7eb0469587c1413c48601c258af937caf41e04df2c5eceb3e1ff5cef97d1f90983513ba14908f9fc111d9d43abbc2ab931f552c3314a7335842d304cc913ced80374d2fa5927bcd502be03ecc30e46365a66b6dc46185087e6875bcd23ff638cfcbc83847c84806bcd4ed715c8bff2fe3bb9b4f7886e7d420b6c642ae5eda7f27fd530b3ea26ef617d49615f92e58b9d0ac265ac91dd82cfe13567ad95ec700a2f5003c13feb5c595ed13a1f3f60d07687c51dde893cf33975902b14e5b0ac4b94c6afb138bca1a2f5aa4251d99c0c76f56ee35b3e05168dbb566db150a46dc0426ca382b0d143a426e59ce8a5c5bfe152bd4f92e125917d48c5673feb7d1b8f92e7773bda5c675a429fe3483e4217a33c5edb39d638b1d6701cf2775b82e030447f6936fd89e0d455e28519392738b2b9f41c4c6d51b60c5ad626340a7c665a48a8457fb9b2cb47cce7c4d660b775c36f116fcd7b42b9be1a1023e91b33cbf2ad9d3ab11cf254b63fa828c1d6bf612efe7ca997936af24d2b750269ff7af94e5c7247157e85ba23227f60e67fd4f09b8a325ce7211a3bbc18d14ea08f4f2e95796bcb23a55f62cefaf0f9259bdd5d2aaf191d9f04044cf4b979dfae9089ff2e077a10ef25f3217c52a73045c88a915061ab8dfcea10b1a5b8398aab6ce68dd676e1789f217d4ea6eec56c5b3fb0f72057c10df7e0b1d08440bc12bbc5e74b75194a89af12df701913691d8a720f350fc4a117589ae1fff741cfbdbd2e675fd08b5da4abaf171b59f0797d97a1c8c341dc267a1820b3149436158c30dcaee00d073254e8e5b522f7beb2c3490a67b9129b7e9e58baa9830e1db9a92f01f084f374b6a6f68fbd7f011f3636ade352fdc010b27c660feba636b69c98c092cfc9e47f391ef2a08c67046ac8b9ad262a342a44af367860f2ba3f5052cb29fa4eadf30f5d2db50eddef3e7b1cbd11aed58688fc3048113bf5e6485656be1d24fe695ae7329d9923846f1a43908fa86e82883be7bb71995ea3362de9b6d116336f7d1125925f7822d9722fef19981d90f8849799db8d0a7da44c30db56730147b0ba26705a824de23c0a2e567adc511b965dd33b372812eb0518e6aa3e7d033a1f5bc9d574534f143c84f5a28421965a3ade553e6eb8e2b1c6a4d6af5e2bce3c0e8905ad7fa82ae964583b7ad2fd31f59c8f33cb57c5350d77326bbc25f2afc626f64cfa12ba79b42204c5ad0001e7721993c1524ff07c2f4193ef1e11ae9230c382423f7ae87af0efc0fb183bb5d1e8cb8282d99c868b445699c1da91fcc42a8c857cd3892eef2a2c39862615292ce06f111d047f2ba9f8c89c094e9e05d8457ac7342536e1650490ac26f17e1794dc862d67d690c9310415d19a8f45f98e2267d0e5ad2ed1f01e18c659ac499d51eb230b0844817980935d968a003db9276dbe8efd0364fe3369df724720d57b0edea5db693f8efa86522f31c3a835296cdb1ac4644d4b264e060d826a8ddb83468ecc6fbd7563703d60c6e23c2e2d2f8d7de7115437b70ed960006d939c1bb96b7e332ee0c6bb7789dbb9e898f88c8dc2184011a87d5406d7147e9145d4d9af65bffc35bbee116a555bb41945956bbe304fd2e91e1ef6fba0944a9a83699ca94f5bf3055f69ba92092d0583f611a56c9280c8d889b52d846c40674e57739dda072be39e20fa71e2e999ae3a573fd0442b1d656285d3ab76ba6677cabb40854be82b433ad8e6a19df050aac663c2893faa64a56bada1f5836abd6c1a3c6249f320b956911494e3a731e2d85717ac7873989f98161b667137885e829c11a6be4f68fdf3478a2d4b763a294f27c99ddef2a00d48ffc29bdc281e0bc149745437dd97ee6455ab20bfe585f13d3a6b215ef1b6b50bdd9450d4db9317d2f5d156c64abf85017eaa2fc4c18b7ead3049ea0f1d001c385a9f3b480959c5e6e83f13d4dea95976144cdfa667f1dd2d643b8452ddea841ac60a2f42617f91e0a9bcc9b601186b2d27278cd7d9ad66392049e2946ae55ee4f9b2de12e57c6d8640fdc90ed6612e0ffba4e07a6392e372d20a7c654ca02d212f9833b4eb960b9d73e75841b7b644b026b5d5c428a5fbf966e8cdef177cacae857a53cf1c8ddf11a5df9f775b2776e62844492880c8c0572df4cd5f0d1dac3ed2649ec3d3d25e1c5f7e2cd5a55407b1b61b9a911b2f50fa8ceaafac9695e2c5276cc10eb07acbd6761848b573cf263bb0d552650d2d34dd5cd9b94ec600febe4903daf2b0049db897e7b5bfb0dcd9c1142116ca556ff0ae5df60f10eeb87e14fe810f2ef82a6bf1f4511e661efba5f7a2992d36cf5b89f6aa90753c40bac31ddb619806f46dff6098f11707986bb6f3d83b6da080c146741dd7e9f9447eff7c825ede9bb139aed3ccbd659b00e9198dc4bf6e559bc135561e388a56d1efa23fb879f8e652771074b8a7e42ccb0c9c62dc1eaa9e0a474a24e20952167106892ecf45abd164bcef967dd084773f726fb10def34e6d84a926308b6840b0adbef4e70de72ce94c02f0eaea191a76639014b5fcdd680ac6c8098749f4e7101c2b96a378ac6114c81a61bb6cd70fb95c2d81c9e0d0e5eff0124923a38a28760d77591e851cbd6cfcb994e19bf22ad6e7f5790d3dde6822493dcf5d0436028574f75f0dc7a934d52b3f18cbf04b45e78ecabc69e2ccd8669217a92ba923010062b43a4b93d765554db1dd26bfec752d32e1e19c9fb217d8ce6ab39ccba5008bd4e7794882810493397943b45749d34b9ca807e27b123a0262fe7df1db7cc829b1c21732c000878af61a71d95310c68ff2a65b68c981f5fd82fa574b03cf9c1174f26636d0c600b1d9b28f4e1acc0542fdd34b0565c1d857fcbf510e05f65ef5d9d576964ec011a6246d0d361d1c55b6d39ebebf25058d560773301192b07de48935b31e49282c217b809f480cce006284573e01f0d4eeeb6477b0d0384bc887741705e97f1dd2aecdf13ca72d9b0fdafd6be9dd632794b9e9022c642e71e30ca1bbe2af571a1b95482af3c74fc18057c5f012b0b770cae7da3ad7e776fb14bf35ab2d2325f3b7e0134f7f0ab0248a4e02d66f37a0ca2848288b87aab244c8d53d2ed671ca4eed181299e4221817900e497108cb69ff365b82445f13154848cec37de7f0037df1bca9121db303b1dea7e4113c30d5a36d8d4385752ae0a6e4c23c3484018249f13cdd78f3d66c744922dce43ff9edbace0cd630f45cbcaa504d32e59b60f35f7cebe2d9fc2cd45fb65d8762b1b28d2419cdb979cef0beb28964a0f78a364eb37aa4d70ececa8fe58d2eae5f6374f8f308c0962dcecfdd2e2520cb1744225cbdeb2aaa6def9dd88fbfbfbe7f37e4dcbd7b5757f421b81f6e5bbd89f252e7b48000d0ccd9fd167d48e8569cb671df7ccf14d26d41a23dbc26e1ac836c938b5d288583023be644be86b460dcc7750e041be3a8025c631294d8aa97c55be4f4545e2714f1bd6d239ced1bb0dab63c044032612645e1f6f8581aad1505988ec064aed4618aab105f6e5b3fd7898fe7dabcdbd493d4524db6e614c2316c1e6cc0183b08ab3f10bc250755d427a41dd123c3aa22bfa78115bf7b6d001e0a563cc28ae25df78629f55b969ff5ecf53ad816833d51efea60cbc799ac89781fae9581c314bf1fd83b53221175428c1afc6053c834a0fdaf2e59c28a2c0702211486444af9a4e283156be99bd27122f41d000000000000000150100000200000059427858995250576a4fe639fc4552a3ed475152f4c48a187fd41d618540cfb8fc6eb3d619c4fd4bb07a8e09052fc89af0bbc8965f3c16e94503c03fa0ab31c2e80770e3887e2b0e42bd6caa1993f0380bda4b397f3af39581bf91800172e219b958fe9cd7ccd55832e6bd7a94149a936b9e8727305185946412f96ae9c6282874a730a7582a6a30dde64cbe7d3435cfdeb6052c507db560d9a40733136c6cb6e79d03b11467a9fab62a0b245599bb33dd70b7b499f0311a6c1b14de03bd00"], 0x1298}, 0x0) openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000040)='devices.allow\x00', 0x2, 0x0) 16:51:13 executing program 3: r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x5421, &(0x7f0000000040)) 16:51:13 executing program 5: r0 = socket$kcm(0x29, 0x2, 0x0) close(r0) 16:51:13 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x7}]}]}}, &(0x7f00000001c0)=""/216, 0x32, 0xd8, 0x1}, 0x20) 16:51:14 executing program 5: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000340)={0xffffffffffffffff}) close(r0) 16:51:14 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x2}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) 16:51:14 executing program 0: r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x8981, &(0x7f0000000040)) 16:51:14 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000340)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f00000001c0)=""/126, 0x7e}], 0x1}, 0x40012040) 16:51:14 executing program 5: perf_event_open(&(0x7f0000000080)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 16:51:14 executing program 3: write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='threaded\x00', 0x248800) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='threaded\x00', 0x9) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x400000000}, 0x0, 0x8ac7, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cgroup.events\x00', 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x200002, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) socketpair(0x0, 0xa, 0x0, &(0x7f0000000200)) r3 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000040)={r2, r1}, 0x10) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000180)={r3, r2, 0x4, r2}, 0x10) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r4, &(0x7f0000000200), 0x43408) 16:51:14 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000140)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x11000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f2, &(0x7f0000000000)='ip6gre0\x00') socket$kcm(0x29, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000001f40)={&(0x7f0000001f00)='./file0\x00'}, 0x10) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000040)='devices.allow\x00', 0x2, 0x0) 16:51:14 executing program 0: socketpair(0x2, 0x2, 0x0, &(0x7f0000000080)) 16:51:14 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000140)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x11000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={0x1, 0x28, &(0x7f0000000240)}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f2, &(0x7f0000000000)='ip6gre0\x00') perf_event_open(0x0, 0x0, 0x4, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x29, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000001f40)={&(0x7f0000001f00)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, 0x0) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001c40)=r3, 0x4) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000300)='freezer.state\x00', 0x2, 0x0) r4 = socket$kcm(0x29, 0x5, 0x0) sendmsg$kcm(r4, &(0x7f00000002c0)={&(0x7f0000000340)=@hci={0x1f, 0xffffffffffffffff, 0x1}, 0x80, &(0x7f0000000740)=[{&(0x7f00000003c0)="7cce56d7b4b0f249255dd58314a5502a5b6c7f5df935724c700b2bf371f908fcb8e4101fc09059956790ec8aa98af6cd1ac547ffeaa80ca7a4148e865276c44834ca185d3b1890d92bebb406abf552fe5127b392cbf8bab72ba1e065f72d7bf995759d7478854d97111a0283af5809f675944aa247e35651f26b4b3ae0e8641818bed1f5111dd75d7c419c6c91cc1c615192b54ed4c096f6148b919e970f4ac88315ed825980429fef2f72f9d43fe831644ce2956e275704e4ccc179c4ab82805741ee01713508109a26017b503ba9d23016f137ff38010ea7744889b519411e6eeceec4", 0xe4}, {&(0x7f00000004c0)="df13ada3bbe7393f38ef692ca838705e14c83c5b39f7533814ba2185704b295ec497658aa6b6acc73f9e238138f34fdd5ca22de87ec599cafa73bc04fbcb399d58b1df064b0c5de09c59c68b5a47df7763", 0x51}, {&(0x7f0000001c80)="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", 0x154}, {&(0x7f00000006c0)="1d0c4a29c6c52282672a3a58514c945f33e846d6985ff981fefb0033e5b09ac026f6c2ed03aa361b5acf237e209496deeabf104e0e0421e8bbbc5c0b617e49f6f8efbf64c9b117833721347d037abe585cfa3148aece7ca3062ae258280200", 0x5f}], 0x4, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x1298}, 0x0) openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000040)='devices.allow\x00', 0x2, 0x0) 16:51:14 executing program 2: perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x2}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x2}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 16:51:14 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@typedef={0x3}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/221, 0x28, 0xdd, 0x1}, 0x20) 16:51:14 executing program 0: perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 16:51:14 executing program 2: bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000000), 0x8) bpf$MAP_CREATE(0x0, &(0x7f00000006c0)={0x9, 0x1f, 0xfff, 0xc08, 0x0, 0x1}, 0x40) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) 16:51:14 executing program 0: socketpair(0x2, 0x0, 0x7fffffff, &(0x7f0000000040)) 16:51:14 executing program 3: write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='threaded\x00', 0x248800) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='threaded\x00', 0x9) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x400000000}, 0x0, 0x8ac7, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cgroup.events\x00', 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x200002, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) socketpair(0x0, 0xa, 0x0, &(0x7f0000000200)) r3 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000040)={r2, r1}, 0x10) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000180)={r3, r2, 0x4, r2}, 0x10) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r4, &(0x7f0000000200), 0x43408) 16:51:14 executing program 0: write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='threaded\x00', 0x248800) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='threaded\x00', 0x9) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x400000000}, 0x0, 0x8ac7, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='cgroup.events\x00', 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x200002, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) socketpair(0x0, 0xa, 0x0, &(0x7f0000000200)) r3 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000040)={r2, r1}, 0x10) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000180)={r3, r2, 0x4, r2}, 0x10) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r4, &(0x7f0000000200), 0x43408) 16:51:14 executing program 5: r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x8904, &(0x7f0000000040)) 16:51:14 executing program 5: r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x5451, 0x0) 16:51:14 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000140)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x11000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={0x1, 0x28, &(0x7f0000000240)}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f2, &(0x7f0000000000)='ip6gre0\x00') perf_event_open(0x0, 0x0, 0x4, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x29, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000001f40)={&(0x7f0000001f00)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, 0x0) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001c40)=r3, 0x4) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000300)='freezer.state\x00', 0x2, 0x0) r4 = socket$kcm(0x29, 0x5, 0x0) sendmsg$kcm(r4, &(0x7f00000002c0)={&(0x7f0000000340)=@hci={0x1f, 0xffffffffffffffff, 0x1}, 0x80, &(0x7f0000000740)=[{&(0x7f00000003c0)="7cce56d7b4b0f249255dd58314a5502a5b6c7f5df935724c700b2bf371f908fcb8e4101fc09059956790ec8aa98af6cd1ac547ffeaa80ca7a4148e865276c44834ca185d3b1890d92bebb406abf552fe5127b392cbf8bab72ba1e065f72d7bf995759d7478854d97111a0283af5809f675944aa247e35651f26b4b3ae0e8641818bed1f5111dd75d7c419c6c91cc1c615192b54ed4c096f6148b919e970f4ac88315ed825980429fef2f72f9d43fe831644ce2956e275704e4ccc179c4ab82805741ee01713508109a26017b503ba9d23016f137ff38010ea7744889b519411e6eeceec4", 0xe4}, {&(0x7f00000004c0)="df13ada3bbe7393f38ef692ca838705e14c83c5b39f7533814ba2185704b295ec497658aa6b6acc73f9e238138f34fdd5ca22de87ec599cafa73bc04fbcb399d58b1df064b0c5de09c59c68b5a47df7763", 0x51}, {&(0x7f0000001c80)="aa3a55f70541111b9d035cd683d4b11699f12275adbac63de72c3074d9e313c532808e2b71b58fcc08c103f71ae97dd5d53cb7862612749f4ed3e4ae244642f4996e0ccb4df3add552ef527c5d046a0bb5d488592b68685fa226d0dce7d26730e03d1d53398c1cb0a34ce706d1147b1cb69f1e957f9b7a794568e00a38b0452dcdcc8b4db93c1e0a27a176065d4b3f2ebceb899bf20772ee9761ca043820709ff5d176435e01a198713a560000000000000000000000006f277cff9cba814389e863bde843fbe352dd1d5940b9a11ff72c658a9948b32d3913184928321f70188b73e3cf3d272c0b3f00000000000000bc9edebd09de463a5fd57d713969a3dfbc75a44eba373c17e83103f8fe845630dd32d05ad4ba57d2851e0874e03bae725993b6414a5dc44cf4b1dd37f1e7049398efc50864c7350ec11aa4daa6a4710b19bd1f3b638195f02a7decffc4dc4de6542ca397", 0x154}, {&(0x7f00000006c0)="1d0c4a29c6c52282672a3a58514c945f33e846d6985ff981fefb0033e5b09ac026f6c2ed03aa361b5acf237e209496deeabf104e0e0421e8bbbc5c0b617e49f6f8efbf64c9b117833721347d037abe585cfa3148aece7ca3062ae258280200", 0x5f}], 0x4, &(0x7f00000007c0)=ANY=[@ANYBLOB="2000000000000000060000000100000091fffd0a3a347fb0d878bf89acb67500b00000000000000008010000ff000000b71783ab8715e520053a9b1394ce209072d4de97401633829f487530881cfda9f43749ff7e2fb63855df9b1969da94aa366b02e84db76b8a104e6a2ac31b69a55a8e7b1a9d3035f8be8c816e608191b147f3b7dc6b2c670cb97be8a675c4be1751e74783da6e59955ffa4f415bd5c550cb0a54210880b000600fc377096a923c5d43c559b91cde025a90c84e2591fec0da180940a35da974fc8caed130b43400180000000000000029000000ffff0000e12ae7000000000018000000000000000c01000000080000655e9ffd1d000000a80000000000000011010000ffff0000588b51d9cbd1b1647f0f175bb1eeba2274d0b1d63710124d85ea68f25cdc059c6b20ddf30b290344e783ef29338a4340ebfd8808ba0830e00788caf39e30e89417a345cde3833254b5063c657849dcb075f10bea3d3959c878313f3e15254ea58a874c251f597f780cfa151720d9ae029a61745006c51f104e16ad8038fab68203faf6cbdd6c9d7577f8f0726cec7ee49ff60dae5476606c3af9d1049b4b35076e967c00000000001010000000000000080100004005000062b7a1fdfb952cb2ddbb52e9bece54999bdfa8adb679422e5740756fbbfd97da2c42c86af9deca13c84f6e71de35f376593a1fea1d5d7c0d59bda68913035d52ef6bc5d9b00dd8c184ff063b1f9159fa37d4e25b1efd2c6d5ae6d2d5d18e061fcc1e50745c32fcebbcd05cacbbe4d600f90c2faa58350c12816a9b02b382d3c78a6fca130f66f926c3071886071d49538ffa02aaf176c58cec690714ea9720a8f8e1555c501aa566d1b981fbbed4440df823c0888d44643b21a03440470b8caff56ee04b1975a7c1481b8b14142b13e2824b39ec0f9072d5869ebb3fd01bda74a8085e836a94842020ff0dd59371271af834c42e3fc74b3e037a1005863b94ab37f7b27971a748dd8e6ae245c997c18aa5cb9236a831002f9a2a73be73ce1cbfc35ffb11521108be48f471ab687a8a19488cc45a1c41d281ef347cd57d98b1dc1dcefedd016e45c490342c001f73fead944a408a297b182de38c80b73b80a01d71413f75987c41f1c71302b1d72c1fce6ef2af4f34364b062c602d0621b87185d22aed6e1c3ded53b2ae325f314986b4f1711865fd39892f29c50639400c83a7f28c185e3eee9654198ada780ebe3a78334aba202e027e2576e81433e978f7b8deaafaf799a091e9268993901d4ca7f7cfd261ec751cb98f443744be9f586cffe00b54f4f53f707a5d51925970b8aff117eed542079ce839275d64851e6f229c0b031e0267988fc47042b9252ad5e01e33831dd2d3f12054d7a482031e779a5ceb191c98fbc7424f4548abacb82a5020b9ba2bd87eef867fb63867dd98e75e290f563b18d07cad0d7bc1391721b39f20729996b2ee95fe31761ec56fe20ffe616435483b20562ef5e936753e8690193cfc19eef5efdbab98323d83beae6e074c11365ca82eff4a13559bd10c3c152ecabff2140acc984b4610593746638e9b751fb74bc872d6fa0d2f2f0026cb9906ba7cd5e8375c6a5cf03beb5fac0714dd069684bf16532aee3bf5d395d018c079f1c50d55522ca5b21354c18b4613f014316799e570536e437c975dbe4cdce8acfbfae3b5456bbacc5de364657cf09061a8d36c4a255dad03b9f3a859225a627d1ac0cb8cac46ccd4b165a4830031b684d58d13ce37477ab2687063b9972e325a1da725062c296d9cc8ee00887cc7939ef929183e956c0210a77fc30efa4fc002565ed4847adf1cbbb0878bc6c052b55ed7182513075a36738d9c59638e07a499a32cf66bf16d2185c8205cf4e90da34fdd9bf82b4007f799f38da3e9ec38398750d8d59078e900803a48d1714fa5edf14c98becf1679115cdb7b3d5957b9613b30bf5f4175448b03de9aafe73ca66bb678fbbb4a80b39d5b23043d9c36d827e34bf846d4f44d9e311a9c23d9b78889454c1bb27c71901af865c18721bc8f99a406a37ffee3aadc9d6c429e96fe585f909f881342f334010fe5e7bedd743b2a0895f38e8d7927dbd279a208dc439b521b5bc5bac3254cd8b5fa3af835a04cd8ae53a8eeff4353010af79fb42258ef9a313b28fc1afb6b99e8fa19815af8347784b5e8fe5b4532553c3705e4482c6a715d0d5a7dd6ec136fe02bf240b1f09533d4915a35f8e6f97a8b4a311e5c8206a20185bd498f67b8b071cb11cc08ad135ec40997c6d0a9308e774f2cf58181d3966397a614ed61f5960dfbfb81e99202450d64e52f70bdab7743d3fa40ac3c66b8c2a065089b62cb7280ec140fee6ecdbfa8b391e9b1395c5e368e6187fc4ba5df73f48255ef02f398b287b66d2f15ccb753053e30bd480adb6108bef8cd844b2b0ec4bdee4771b9a4e9cc9c43c461975f1a0d74714a9e5d90f24ad1466ae48918319f19b3a4e1a31517c74c38d8f4031543e0681a0df0caffeb0abcc63f4890610a15ed8d5f52b2967ea1545e01ff419b962c1edd4185b638f7cb5f7ffe4a88962057223324b8f3350f2fe05e07a38fe78c1ed9e6291db8e82045d07640e2a7190961a5296c4061abe2fbaeeab58bb461bfa9aac375b8d555785fcb9948d040b157ed22d55c3dab4036f6133af0d042d5edc16b2b8fcd7eb0469587c1413c48601c258af937caf41e04df2c5eceb3e1ff5cef97d1f90983513ba14908f9fc111d9d43abbc2ab931f552c3314a7335842d304cc913ced80374d2fa5927bcd502be03ecc30e46365a66b6dc46185087e6875bcd23ff638cfcbc83847c84806bcd4ed715c8bff2fe3bb9b4f7886e7d420b6c642ae5eda7f27fd530b3ea26ef617d49615f92e58b9d0ac265ac91dd82cfe13567ad95ec700a2f5003c13feb5c595ed13a1f3f60d07687c51dde893cf33975902b14e5b0ac4b94c6afb138bca1a2f5aa4251d99c0c76f56ee35b3e05168dbb566db150a46dc0426ca382b0d143a426e59ce8a5c5bfe152bd4f92e125917d48c5673feb7d1b8f92e7773bda5c675a429fe3483e4217a33c5edb39d638b1d6701cf2775b82e030447f6936fd89e0d455e28519392738b2b9f41c4c6d51b60c5ad626340a7c665a48a8457fb9b2cb47cce7c4d660b775c36f116fcd7b42b9be1a1023e91b33cbf2ad9d3ab11cf254b63fa828c1d6bf612efe7ca997936af24d2b750269ff7af94e5c7247157e85ba23227f60e67fd4f09b8a325ce7211a3bbc18d14ea08f4f2e95796bcb23a55f62cefaf0f9259bdd5d2aaf191d9f04044cf4b979dfae9089ff2e077a10ef25f3217c52a73045c88a915061ab8dfcea10b1a5b8398aab6ce68dd676e1789f217d4ea6eec56c5b3fb0f72057c10df7e0b1d08440bc12bbc5e74b75194a89af12df701913691d8a720f350fc4a117589ae1fff741cfbdbd2e675fd08b5da4abaf171b59f0797d97a1c8c341dc267a1820b3149436158c30dcaee00d073254e8e5b522f7beb2c3490a67b9129b7e9e58baa9830e1db9a92f01f084f374b6a6f68fbd7f011f3636ade352fdc010b27c660feba636b69c98c092cfc9e47f391ef2a08c67046ac8b9ad262a342a44af367860f2ba3f5052cb29fa4eadf30f5d2db50eddef3e7b1cbd11aed58688fc3048113bf5e6485656be1d24fe695ae7329d9923846f1a43908fa86e82883be7bb71995ea3362de9b6d116336f7d1125925f7822d9722fef19981d90f8849799db8d0a7da44c30db56730147b0ba26705a824de23c0a2e567adc511b965dd33b372812eb0518e6aa3e7d033a1f5bc9d574534f143c84f5a28421965a3ade553e6eb8e2b1c6a4d6af5e2bce3c0e8905ad7fa82ae964583b7ad2fd31f59c8f33cb57c5350d77326bbc25f2afc626f64cfa12ba79b42204c5ad0001e7721993c1524ff07c2f4193ef1e11ae9230c382423f7ae87af0efc0fb183bb5d1e8cb8282d99c868b445699c1da91fcc42a8c857cd3892eef2a2c39862615292ce06f111d047f2ba9f8c89c094e9e05d8457ac7342536e1650490ac26f17e1794dc862d67d690c9310415d19a8f45f98e2267d0e5ad2ed1f01e18c659ac499d51eb230b0844817980935d968a003db9276dbe8efd0364fe3369df724720d57b0edea5db693f8efa86522f31c3a835296cdb1ac4644d4b264e060d826a8ddb83468ecc6fbd7563703d60c6e23c2e2d2f8d7de7115437b70ed960006d939c1bb96b7e332ee0c6bb7789dbb9e898f88c8dc2184011a87d5406d7147e9145d4d9af65bffc35bbee116a555bb41945956bbe304fd2e91e1ef6fba0944a9a83699ca94f5bf3055f69ba92092d0583f611a56c9280c8d889b52d846c40674e57739dda072be39e20fa71e2e999ae3a573fd0442b1d656285d3ab76ba6677cabb40854be82b433ad8e6a19df050aac663c2893faa64a56bada1f5836abd6c1a3c6249f320b956911494e3a731e2d85717ac7873989f98161b667137885e829c11a6be4f68fdf3478a2d4b763a294f27c99ddef2a00d48ffc29bdc281e0bc149745437dd97ee6455ab20bfe585f13d3a6b215ef1b6b50bdd9450d4db9317d2f5d156c64abf85017eaa2fc4c18b7ead3049ea0f1d001c385a9f3b480959c5e6e83f13d4dea95976144cdfa667f1dd2d643b8452ddea841ac60a2f42617f91e0a9bcc9b601186b2d27278cd7d9ad66392049e2946ae55ee4f9b2de12e57c6d8640fdc90ed6612e0ffba4e07a6392e372d20a7c654ca02d212f9833b4eb960b9d73e75841b7b644b026b5d5c428a5fbf966e8cdef177cacae857a53cf1c8ddf11a5df9f775b2776e62844492880c8c0572df4cd5f0d1dac3ed2649ec3d3d25e1c5f7e2cd5a55407b1b61b9a911b2f50fa8ceaafac9695e2c5276cc10eb07acbd6761848b573cf263bb0d552650d2d34dd5cd9b94ec600febe4903daf2b0049db897e7b5bfb0dcd9c1142116ca556ff0ae5df60f10eeb87e14fe810f2ef82a6bf1f4511e661efba5f7a2992d36cf5b89f6aa90753c40bac31ddb619806f46dff6098f11707986bb6f3d83b6da080c146741dd7e9f9447eff7c825ede9bb139aed3ccbd659b00e9198dc4bf6e559bc135561e388a56d1efa23fb879f8e652771074b8a7e42ccb0c9c62dc1eaa9e0a474a24e20952167106892ecf45abd164bcef967dd084773f726fb10def34e6d84a926308b6840b0adbef4e70de72ce94c02f0eaea191a76639014b5fcdd680ac6c8098749f4e7101c2b96a378ac6114c81a61bb6cd70fb95c2d81c9e0d0e5eff0124923a38a28760d77591e851cbd6cfcb994e19bf22ad6e7f5790d3dde6822493dcf5d0436028574f75f0dc7a934d52b3f18cbf04b45e78ecabc69e2ccd8669217a92ba923010062b43a4b93d765554db1dd26bfec752d32e1e19c9fb217d8ce6ab39ccba5008bd4e7794882810493397943b45749d34b9ca807e27b123a0262fe7df1db7cc829b1c21732c000878af61a71d95310c68ff2a65b68c981f5fd82fa574b03cf9c1174f26636d0c600b1d9b28f4e1acc0542fdd34b0565c1d857fcbf510e05f65ef5d9d576964ec011a6246d0d361d1c55b6d39ebebf25058d560773301192b07de48935b31e49282c217b809f480cce006284573e01f0d4eeeb6477b0d0384bc887741705e97f1dd2aecdf13ca72d9b0fdafd6be9dd632794b9e9022c642e71e30ca1bbe2af571a1b95482af3c74fc18057c5f012b0b770cae7da3ad7e776fb14bf35ab2d2325f3b7e0134f7f0ab0248a4e02d66f37a0ca2848288b87aab244c8d53d2ed671ca4eed181299e4221817900e497108cb69ff365b82445f13154848cec37de7f0037df1bca9121db303b1dea7e4113c30d5a36d8d4385752ae0a6e4c23c3484018249f13cdd78f3d66c744922dce43ff9edbace0cd630f45cbcaa504d32e59b60f35f7cebe2d9fc2cd45fb65d8762b1b28d2419cdb979cef0beb28964a0f78a364eb37aa4d70ececa8fe58d2eae5f6374f8f308c0962dcecfdd2e2520cb1744225cbdeb2aaa6def9dd88fbfbfbe7f37e4dcbd7b5757f421b81f6e5bbd89f252e7b48000d0ccd9fd167d48e8569cb671df7ccf14d26d41a23dbc26e1ac836c938b5d288583023be644be86b460dcc7750e041be3a8025c631294d8aa97c55be4f4545e2714f1bd6d239ced1bb0dab63c044032612645e1f6f8581aad1505988ec064aed4618aab105f6e5b3fd7898fe7dabcdbd493d4524db6e614c2316c1e6cc0183b08ab3f10bc250755d427a41dd123c3aa22bfa78115bf7b6d001e0a563cc28ae25df78629f55b969ff5ecf53ad816833d51efea60cbc799ac89781fae9581c314bf1fd83b53221175428c1afc6053c834a0fdaf2e59c28a2c0702211486444af9a4e283156be99bd27122f41d000000000000000150100000200000059427858995250576a4fe639fc4552a3ed475152f4c48a187fd41d618540cfb8fc6eb3d619c4fd4bb07a8e09052fc89af0bbc8965f3c16e94503c03fa0ab31c2e80770e3887e2b0e42bd6caa1993f0380bda4b397f3af39581bf91800172e219b958fe9cd7ccd55832e6bd7a94149a936b9e8727305185946412f96ae9c6282874a730a7582a6a30dde64cbe7d3435cfdeb6052c507db560d9a40733136c6cb6e79d03b11467a9fab62a0b245599bb33dd70b7b499f0311a6c1b14de03bd00"], 0x1298}, 0x0) openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000040)='devices.allow\x00', 0x2, 0x0) 16:51:14 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000140)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x11000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f2, &(0x7f0000000000)='ip6gre0\x00') socket$kcm(0x29, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000001f40)={&(0x7f0000001f00)='./file0\x00'}, 0x10) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000040)='devices.allow\x00', 0x2, 0x0) 16:51:14 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000003e80)={0x344b2c670f9ea1e0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x40) 16:51:14 executing program 2: openat$tun(0xffffffffffffff9c, 0x0, 0x432c00, 0x0) 16:51:14 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@const]}}, &(0x7f00000000c0)=""/172, 0x26, 0xac, 0x1}, 0x20) 16:51:14 executing program 5: r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x8913, &(0x7f0000000040)) 16:51:14 executing program 3: 16:51:14 executing program 0: 16:51:14 executing program 2: 16:51:14 executing program 3: 16:51:15 executing program 0: 16:51:15 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000140)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x11000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={0x1, 0x28, &(0x7f0000000240)}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f2, &(0x7f0000000000)='ip6gre0\x00') perf_event_open(0x0, 0x0, 0x4, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x29, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000001f40)={&(0x7f0000001f00)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, 0x0) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001c40)=r3, 0x4) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000300)='freezer.state\x00', 0x2, 0x0) r4 = socket$kcm(0x29, 0x5, 0x0) sendmsg$kcm(r4, &(0x7f00000002c0)={&(0x7f0000000340)=@hci={0x1f, 0xffffffffffffffff, 0x1}, 0x80, &(0x7f0000000740)=[{&(0x7f00000003c0)="7cce56d7b4b0f249255dd58314a5502a5b6c7f5df935724c700b2bf371f908fcb8e4101fc09059956790ec8aa98af6cd1ac547ffeaa80ca7a4148e865276c44834ca185d3b1890d92bebb406abf552fe5127b392cbf8bab72ba1e065f72d7bf995759d7478854d97111a0283af5809f675944aa247e35651f26b4b3ae0e8641818bed1f5111dd75d7c419c6c91cc1c615192b54ed4c096f6148b919e970f4ac88315ed825980429fef2f72f9d43fe831644ce2956e275704e4ccc179c4ab82805741ee01713508109a26017b503ba9d23016f137ff38010ea7744889b519411e6eeceec4", 0xe4}, {&(0x7f00000004c0)="df13ada3bbe7393f38ef692ca838705e14c83c5b39f7533814ba2185704b295ec497658aa6b6acc73f9e238138f34fdd5ca22de87ec599cafa73bc04fbcb399d58b1df064b0c5de09c59c68b5a47df7763", 0x51}, {&(0x7f0000001c80)="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", 0x154}, {&(0x7f00000006c0)="1d0c4a29c6c52282672a3a58514c945f33e846d6985ff981fefb0033e5b09ac026f6c2ed03aa361b5acf237e209496deeabf104e0e0421e8bbbc5c0b617e49f6f8efbf64c9b117833721347d037abe585cfa3148aece7ca3062ae258280200", 0x5f}], 0x4, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x1298}, 0x0) openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000040)='devices.allow\x00', 0x2, 0x0) 16:51:15 executing program 3: 16:51:15 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000140)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x11000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f2, &(0x7f0000000000)='ip6gre0\x00') socket$kcm(0x29, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000001f40)={&(0x7f0000001f00)='./file0\x00'}, 0x10) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) 16:51:15 executing program 2: 16:51:15 executing program 5: 16:51:15 executing program 3: 16:51:15 executing program 2: 16:51:15 executing program 0: 16:51:15 executing program 5: 16:51:15 executing program 3: 16:51:15 executing program 2: 16:51:15 executing program 0: 16:51:15 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000140)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x11000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={0x1, 0x28, &(0x7f0000000240)}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f2, &(0x7f0000000000)='ip6gre0\x00') perf_event_open(0x0, 0x0, 0x4, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x29, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000001f40)={&(0x7f0000001f00)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, 0x0) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001c40)=r3, 0x4) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000300)='freezer.state\x00', 0x2, 0x0) r4 = socket$kcm(0x29, 0x5, 0x0) sendmsg$kcm(r4, &(0x7f00000002c0)={&(0x7f0000000340)=@hci={0x1f, 0xffffffffffffffff, 0x1}, 0x80, &(0x7f0000000740)=[{&(0x7f00000003c0)="7cce56d7b4b0f249255dd58314a5502a5b6c7f5df935724c700b2bf371f908fcb8e4101fc09059956790ec8aa98af6cd1ac547ffeaa80ca7a4148e865276c44834ca185d3b1890d92bebb406abf552fe5127b392cbf8bab72ba1e065f72d7bf995759d7478854d97111a0283af5809f675944aa247e35651f26b4b3ae0e8641818bed1f5111dd75d7c419c6c91cc1c615192b54ed4c096f6148b919e970f4ac88315ed825980429fef2f72f9d43fe831644ce2956e275704e4ccc179c4ab82805741ee01713508109a26017b503ba9d23016f137ff38010ea7744889b519411e6eeceec4", 0xe4}, {&(0x7f00000004c0)="df13ada3bbe7393f38ef692ca838705e14c83c5b39f7533814ba2185704b295ec497658aa6b6acc73f9e238138f34fdd5ca22de87ec599cafa73bc04fbcb399d58b1df064b0c5de09c59c68b5a47df7763", 0x51}, {&(0x7f0000001c80)="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", 0x154}, {&(0x7f00000006c0)="1d0c4a29c6c52282672a3a58514c945f33e846d6985ff981fefb0033e5b09ac026f6c2ed03aa361b5acf237e209496deeabf104e0e0421e8bbbc5c0b617e49f6f8efbf64c9b117833721347d037abe585cfa3148aece7ca3062ae258280200", 0x5f}], 0x4, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x1298}, 0x0) 16:51:15 executing program 5: 16:51:15 executing program 3: 16:51:15 executing program 0: 16:51:15 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000140)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x11000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f2, &(0x7f0000000000)='ip6gre0\x00') socket$kcm(0x29, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000001f40)={&(0x7f0000001f00)='./file0\x00'}, 0x10) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) 16:51:15 executing program 2: 16:51:15 executing program 3: 16:51:15 executing program 0: 16:51:15 executing program 5: 16:51:15 executing program 2: 16:51:15 executing program 3: 16:51:15 executing program 5: 16:51:15 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000140)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x11000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={0x1, 0x28, &(0x7f0000000240)}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f2, &(0x7f0000000000)='ip6gre0\x00') perf_event_open(0x0, 0x0, 0x4, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x29, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000001f40)={&(0x7f0000001f00)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, 0x0) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001c40)=r3, 0x4) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000300)='freezer.state\x00', 0x2, 0x0) socket$kcm(0x29, 0x5, 0x0) 16:51:15 executing program 0: 16:51:15 executing program 2: 16:51:15 executing program 5: 16:51:15 executing program 3: 16:51:15 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000140)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x11000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f2, &(0x7f0000000000)='ip6gre0\x00') socket$kcm(0x29, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000001f40)={&(0x7f0000001f00)='./file0\x00'}, 0x10) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) 16:51:15 executing program 0: 16:51:15 executing program 5: 16:51:15 executing program 2: 16:51:15 executing program 3: 16:51:15 executing program 0: 16:51:15 executing program 2: 16:51:15 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000140)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x11000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={0x1, 0x28, &(0x7f0000000240)}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f2, &(0x7f0000000000)='ip6gre0\x00') perf_event_open(0x0, 0x0, 0x4, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x29, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000001f40)={&(0x7f0000001f00)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, 0x0) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001c40)=r3, 0x4) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000300)='freezer.state\x00', 0x2, 0x0) 16:51:15 executing program 5: 16:51:15 executing program 3: 16:51:15 executing program 0: 16:51:15 executing program 2: 16:51:16 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000140)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x11000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f2, &(0x7f0000000000)='ip6gre0\x00') socket$kcm(0x29, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000001f40)={&(0x7f0000001f00)='./file0\x00'}, 0x10) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000040)='devices.allow\x00', 0x2, 0x0) 16:51:16 executing program 5: 16:51:16 executing program 3: 16:51:16 executing program 0: 16:51:16 executing program 2: 16:51:16 executing program 5: 16:51:16 executing program 3: 16:51:16 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000140)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x11000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={0x1, 0x28, &(0x7f0000000240)}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f2, &(0x7f0000000000)='ip6gre0\x00') perf_event_open(0x0, 0x0, 0x4, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x29, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000001f40)={&(0x7f0000001f00)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, 0x0) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001c40)=r3, 0x4) 16:51:16 executing program 2: 16:51:16 executing program 0: 16:51:16 executing program 3: 16:51:16 executing program 5: 16:51:16 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000140)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x11000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f2, &(0x7f0000000000)='ip6gre0\x00') socket$kcm(0x29, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000001f40)={&(0x7f0000001f00)='./file0\x00'}, 0x10) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000040)='devices.allow\x00', 0x2, 0x0) 16:51:16 executing program 2: 16:51:16 executing program 5: 16:51:16 executing program 0: 16:51:16 executing program 3: 16:51:16 executing program 2: 16:51:16 executing program 5: r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) recvmsg(r1, &(0x7f0000001ac0)={0x0, 0x0, 0x0}, 0x0) sendmsg$inet(r1, &(0x7f0000001b40)={0x0, 0x0, &(0x7f00000014c0)=[{&(0x7f00000000c0)="17", 0x1}], 0x1}, 0x0) 16:51:16 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000140)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x11000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={0x1, 0x28, &(0x7f0000000240)}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f2, &(0x7f0000000000)='ip6gre0\x00') perf_event_open(0x0, 0x0, 0x4, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x29, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000001f40)={&(0x7f0000001f00)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) 16:51:16 executing program 0: r0 = timerfd_create(0x9, 0x0) timerfd_settime(r0, 0x0, &(0x7f0000000100)={{0x77359400}}, &(0x7f0000000140)) 16:51:16 executing program 3: pselect6(0x0, 0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000140)={&(0x7f0000000100)={[0x4]}, 0x8}) 16:51:16 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000001200)='/dev/zero\x00', 0x2001, 0x0) write$cgroup_pid(r0, 0x0, 0xf0ffffff7f0000) 16:51:16 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000140)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x11000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f2, &(0x7f0000000000)='ip6gre0\x00') socket$kcm(0x29, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000001f40)={&(0x7f0000001f00)='./file0\x00'}, 0x10) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000040)='devices.allow\x00', 0x2, 0x0) 16:51:16 executing program 3: r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x8982, &(0x7f0000000040)) 16:51:16 executing program 0: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x6841, &(0x7f0000001380)) 16:51:16 executing program 2: r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000040)) 16:51:16 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) getpgid(0x0) sendmsg$netlink(r0, &(0x7f00000027c0)={&(0x7f0000000000)=@proc={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000002740)=[{&(0x7f0000000040)={0x220, 0x0, 0x0, 0x0, 0x0, "", [@typed={0x35, 0x0, 0x0, 0x0, @binary="d5bb3837625f8c7c846e0ccb47ee02b1bae48d6063b3774d63be43b2aef00d736b0ea52cb60be5e4d3c22bea0d3b3038bb"}, @typed={0x2d, 0x0, 0x0, 0x0, @binary="a71346f418d0b69adbb1dd99a19fd7b90cec53a2981fd87c9dbef188884732ae6b362d22861f347d8a"}, @typed={0x4}, @generic="60ff3d851751ca90c48eda7a8aab6c6bc2834205fdbfb301b8174dbb09ba1140b5a9a433e38941660afcf10b1fd7e031838b26e2c0c9c2a6377ec66e2a9b4ff160977f2a2c15bc170f7e2c9160331f69dc34d95b75d6a58cae61b82052b4c9f77ff551ee314d28fb27dc80c28c34ceee9c2b9bcf91be53b4350fe42dd814071221ee64c439dc96cce45cccc9af764e96db51f45408b852c96567f94c3443f843acc9dfa59aecbfc2ecb533656ad7a0968594429aee53bfdccb41279a422a261e375cc572637583f71cbf5e34971652750cb59518c86cba39a51ba8afb28e8ab4f56470b96c", @typed={0xc, 0x0, 0x0, 0x0, @u64}, @typed={0xad, 0x0, 0x0, 0x0, @binary="06024477ad5c4e3f3b26f28719a03dd779196e397e029e0c6a4c97868c7f3c8696a17950e01a7cfc014e2fc15cd1fb908fc311311421952576a617d94cd18469b4f918b36e9cd6c82fe892f927f2f3692a5b99e53968c4d6bb094bc400252c0121a63dce93c907f205a0893722b927f405d1816abf362755217235c8ff59da9a2397b7581f2f06dd7c34daa33d14a8757149db6ae5356c06e0da39f6408f94ff4c3ca7266b26ad7581"}]}, 0x220}, {&(0x7f0000004b80)={0xca4, 0x0, 0x0, 0x0, 0x0, "", [@typed={0x14, 0x0, 0x0, 0x0, @ipv6=@private1}, @generic="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"]}, 0xca4}], 0x2}, 0x0) 16:51:16 executing program 3: mq_timedreceive(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x3938700}) 16:51:16 executing program 2: fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000080)='system.posix_acl_access\x00', 0x0, 0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x24, 0x0) ioctl$BLKTRACESTOP(r0, 0x1275, 0x0) wait4(0x0, 0x0, 0x80000002, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='clear_refs\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='stat\x00') sendfile(r1, r4, 0x0, 0x1) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ttyS3\x00', 0x121c00, 0x0) ioctl$BTRFS_IOC_INO_PATHS(r6, 0xc0389423, &(0x7f00000001c0)={0x9, 0x10, [0x7, 0xfd, 0x4, 0xb5], &(0x7f0000000140)=[0x0, 0x0]}) write$binfmt_misc(r5, &(0x7f0000001a40)=ANY=[], 0x4240a2a0) openat$vcsa(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcsa\x00', 0x80, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r7, 0x1, 0x1a, &(0x7f0000000280), 0x10) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r7, 0x8982, &(0x7f0000000200)={0x0, 'vcan0\x00', {}, 0x80}) 16:51:17 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFINDEX(r0, 0x400454da, &(0x7f0000001200)) 16:51:17 executing program 0: perf_event_open(&(0x7f0000002600)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x174, 0x1010, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 16:51:17 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000140)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x11000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f2, &(0x7f0000000000)='ip6gre0\x00') socket$kcm(0x29, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000001f40)={&(0x7f0000001f00)='./file0\x00'}, 0x10) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000040)='devices.allow\x00', 0x2, 0x0) 16:51:17 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000004dc0)='/dev/zero\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000080)={0x2020}, 0xfffffffffffffc63) 16:51:17 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000140)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x11000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={0x1, 0x28, &(0x7f0000000240)}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f2, &(0x7f0000000000)='ip6gre0\x00') perf_event_open(0x0, 0x0, 0x4, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x29, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000001f40)={&(0x7f0000001f00)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, 0x0) 16:51:17 executing program 3: openat$vcs(0xffffffffffffff9c, 0x0, 0x6d8800, 0x0) 16:51:17 executing program 0: mq_notify(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0, @thr={0x0, 0x0}}) 16:51:17 executing program 3: perf_event_open$cgroup(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6012, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 16:51:17 executing program 0: r0 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0xec8, 0x0) inotify_add_watch(r0, 0x0, 0xe41) 16:51:17 executing program 5: r0 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8930, &(0x7f00000005c0)={'vcan0\x00'}) 16:51:17 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000140)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x11000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={0x1, 0x28, &(0x7f0000000240)}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f2, &(0x7f0000000000)='ip6gre0\x00') perf_event_open(0x0, 0x0, 0x4, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000001f40)={&(0x7f0000001f00)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) 16:51:17 executing program 2: r0 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8993, &(0x7f00000005c0)={'vcan0\x00'}) 16:51:17 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000140)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x11000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f2, &(0x7f0000000000)='ip6gre0\x00') socket$kcm(0x29, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000001f40)={&(0x7f0000001f00)='./file0\x00'}, 0x10) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000040)='devices.allow\x00', 0x2, 0x0) 16:51:17 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = getpgid(0x0) sendmsg$netlink(r0, &(0x7f00000027c0)={&(0x7f0000000000)=@proc={0x10, 0x0, 0x25dfdbff}, 0xc, &(0x7f0000002740)=[{&(0x7f0000000040)={0x220, 0x0, 0x0, 0x0, 0x0, "", [@typed={0x35, 0x0, 0x0, 0x0, @binary="d5bb3837625f8c7c846e0ccb47ee02b1bae48d6063b3774d63be43b2aef00d736b0ea52cb60be5e4d3c22bea0d3b3038bb"}, @typed={0x2d, 0x0, 0x0, 0x0, @binary="a71346f418d0b69adbb1dd99a19fd7b90cec53a2981fd87c9dbef188884732ae6b362d22861f347d8a"}, @typed={0x4}, @generic="60ff3d851751ca90c48eda7a8aab6c6bc2834205fdbfb301b8174dbb09ba1140b5a9a433e38941660afcf10b1fd7e031838b26e2c0c9c2a6377ec66e2a9b4ff160977f2a2c15bc170f7e2c9160331f69dc34d95b75d6a58cae61b82052b4c9f77ff551ee314d28fb27dc80c28c34ceee9c2b9bcf91be53b4350fe42dd814071221ee64c439dc96cce45cccc9af764e96db51f45408b852c96567f94c3443f843acc9dfa59aecbfc2ecb533656ad7a0968594429aee53bfdccb41279a422a261e375cc572637583f71cbf5e34971652750cb59518c86cba39a51ba8afb28e8ab4f56470b96c", @typed={0xc, 0x0, 0x0, 0x0, @u64}, @typed={0xad, 0x0, 0x0, 0x0, @binary="06024477ad5c4e3f3b26f28719a03dd779196e397e029e0c6a4c97868c7f3c8696a17950e01a7cfc014e2fc15cd1fb908fc311311421952576a617d94cd18469b4f918b36e9cd6c82fe892f927f2f3692a5b99e53968c4d6bb094bc400252c0121a63dce93c907f205a0893722b927f405d1816abf362755217235c8ff59da9a2397b7581f2f06dd7c34daa33d14a8757149db6ae5356c06e0da39f6408f94ff4c3ca7266b26ad7581"}]}, 0x220}, {&(0x7f0000004b80)={0xc94, 0x0, 0x0, 0x0, 0x0, "", [@typed={0x14, 0x0, 0x0, 0x0, @ipv6=@private1}, @generic="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"]}, 0xc94}, {&(0x7f0000002580)={0x10}, 0x10}], 0x3, &(0x7f0000002780)=[@cred={{0x1c, 0x1, 0x2, {r1, 0xee01, 0xee01}}}], 0x20}, 0x0) 16:51:17 executing program 0: timer_create(0x3, 0x0, &(0x7f0000000140)) timer_gettime(0x0, &(0x7f0000000180)) 16:51:17 executing program 5: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x200002, 0x0) 16:51:17 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000140)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x11000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={0x1, 0x28, &(0x7f0000000240)}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f2, &(0x7f0000000000)='ip6gre0\x00') perf_event_open(0x0, 0x0, 0x4, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000001f40)={&(0x7f0000001f00)='./file0\x00', 0x0, 0x8}, 0x10) 16:51:17 executing program 0: perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x841, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x44010}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 16:51:17 executing program 3: r0 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8932, &(0x7f00000005c0)={'vcan0\x00'}) 16:51:17 executing program 5: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001380)) 16:51:17 executing program 0: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$IOCTL_START_ACCEL_DEV(r0, 0x40096102, &(0x7f00000004c0)) 16:51:18 executing program 0: r0 = memfd_create(&(0x7f0000006500)='\xd9,&{-(\x00', 0x0) dup3(r0, 0xffffffffffffffff, 0x0) 16:51:18 executing program 5: mq_getsetattr(0xffffffffffffffff, &(0x7f0000000040), 0x0) 16:51:18 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000003180)) io_setup(0x2, &(0x7f0000000040)) 16:51:18 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000140)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x11000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f2, &(0x7f0000000000)='ip6gre0\x00') socket$kcm(0x29, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000001f40)={&(0x7f0000001f00)='./file0\x00'}, 0x10) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000040)='devices.allow\x00', 0x2, 0x0) 16:51:18 executing program 0: syz_open_procfs(0x0, &(0x7f0000002180)='gid_map\x00') 16:51:18 executing program 3: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001380)) 16:51:18 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000140)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x11000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={0x1, 0x28, &(0x7f0000000240)}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f2, &(0x7f0000000000)='ip6gre0\x00') perf_event_open(0x0, 0x0, 0x4, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) 16:51:18 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000020c0)='/dev/fuse\x00', 0x2, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002100)='/dev/fuse\x00', 0x2, 0x0) dup3(r1, r0, 0x0) 16:51:18 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_PORT_GET(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000002da20b"], 0x14}}, 0x0) 16:51:18 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x541b, &(0x7f0000000040)) 16:51:18 executing program 2: r0 = semget$private(0x0, 0x4, 0x2e9) r1 = semget$private(0x0, 0x1, 0x0) semctl$SETALL(r1, 0x0, 0x11, &(0x7f00000004c0)=[0x8]) semctl$GETZCNT(r1, 0x4, 0xf, &(0x7f0000000140)=""/112) r2 = semget$private(0x0, 0x1, 0x0) r3 = semget$private(0x0, 0x3, 0x40) semctl$IPC_RMID(r3, 0x0, 0x0) semctl$SETALL(r2, 0x0, 0x11, &(0x7f00000004c0)=[0x8]) semget(0x3, 0x1, 0x149) semctl$SEM_STAT(r0, 0x1, 0x12, &(0x7f00000000c0)=""/107) r4 = semget(0x1, 0x2, 0x785) semctl$SETALL(r2, 0x0, 0x11, &(0x7f0000000040)=[0x8001, 0x1ff, 0xca, 0x2]) semop(r4, &(0x7f0000000000)=[{0x1, 0x3, 0x1000}, {0x1, 0x2}], 0x2) semop(r4, &(0x7f0000000080)=[{0x3, 0xf2c6, 0x800}], 0x1) 16:51:18 executing program 5: pselect6(0x40, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0), 0x0) 16:51:18 executing program 3: timer_create(0x0, 0x0, &(0x7f0000000380)) timer_getoverrun(0x0) 16:51:18 executing program 0: mbind(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, &(0x7f0000001300), 0x9, 0x0) 16:51:18 executing program 5: accept$alg(0xffffffffffffffff, 0x0, 0x0) 16:51:18 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000140)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x11000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f2, &(0x7f0000000000)='ip6gre0\x00') socket$kcm(0x29, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000001f40)={&(0x7f0000001f00)='./file0\x00'}, 0x10) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000040)='devices.allow\x00', 0x2, 0x0) 16:51:18 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000280)='/dev/sg#\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffc) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x5452, &(0x7f0000000000)) 16:51:18 executing program 3: r0 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x40049409, &(0x7f00000005c0)={'vcan0\x00'}) 16:51:18 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0xc020660b, 0x0) 16:51:18 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000140)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x11000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={0x1, 0x28, &(0x7f0000000240)}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f2, &(0x7f0000000000)='ip6gre0\x00') perf_event_open(0x0, 0x0, 0x4, 0xffffffffffffffff, 0x0) 16:51:18 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = getpgid(0x0) sendmsg$netlink(r0, &(0x7f00000027c0)={0x0, 0x0, &(0x7f0000002740)=[{0x0}, {&(0x7f0000004b80)={0x10}, 0x10}, {&(0x7f0000002580)={0x14, 0x3f, 0x1, 0x0, 0x0, "", [@nested={0x4}]}, 0x14}], 0x3, &(0x7f0000002780)=[@cred={{0x1c, 0x1, 0x2, {r1, 0xee01, 0xee01}}}], 0x20}, 0x0) 16:51:18 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vfio/vfio\x00', 0x0, 0x0) flock(r0, 0xc) 16:51:18 executing program 5: r0 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8913, &(0x7f00000005c0)={'vcan0\x00'}) 16:51:18 executing program 2: timerfd_settime(0xffffffffffffffff, 0x4c770ba2e14a8689, &(0x7f0000000200)={{0x0, 0x3938700}}, 0x0) 16:51:18 executing program 3: r0 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x5451, 0x0) 16:51:18 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) r1 = creat(&(0x7f0000000240)='./file1\x00', 0x0) dup3(r0, r1, 0x0) 16:51:18 executing program 0: io_pgetevents(0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={0x77359400}, &(0x7f00000000c0)={&(0x7f0000000080), 0x8}) 16:51:18 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000140)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x11000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f2, &(0x7f0000000000)='ip6gre0\x00') socket$kcm(0x29, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000001f40)={&(0x7f0000001f00)='./file0\x00'}, 0x10) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000040)='devices.allow\x00', 0x2, 0x0) 16:51:18 executing program 2: r0 = getpgid(0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, 0xffffffffffffffff, 0x0) 16:51:18 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000140)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x11000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={0x1, 0x28, &(0x7f0000000240)}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f2, &(0x7f0000000000)='ip6gre0\x00') 16:51:18 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x73, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000180)='./bus\x00', 0x151042, 0x0) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/crypto\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x4000000000010046) 16:51:18 executing program 5: timer_create(0x0, &(0x7f0000001140)={0x0, 0x0, 0x4, @thr={0x0, 0x0}}, 0x0) 16:51:18 executing program 2: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000020c0)='/dev/fuse\x00', 0x2, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002100)='/dev/fuse\x00', 0x2, 0x0) dup3(r2, r1, 0x0) creat(&(0x7f00000044c0)='./file0\x00', 0x0) write$FUSE_IOCTL(r0, &(0x7f0000004180)={0x20}, 0x20) 16:51:18 executing program 0: perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 16:51:19 executing program 5: io_setup(0x2, &(0x7f0000000000)=0x0) io_submit(r0, 0x1, &(0x7f0000007940)=[0x0]) 16:51:19 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x894c, 0x0) 16:51:19 executing program 2: mq_open(&(0x7f0000000040)='\xd6\xc6\x04@\xc1pnT\xe5\xbd\x1dZ\x9a\x1c\f\xeaN\\B\x80\xe9x\xfa{\x8c7\n$Y\x97\xd2W6\xb3\r\x00\x00\x00\x00', 0x0, 0x0, 0x0) 16:51:19 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000140)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x11000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f2, &(0x7f0000000000)='ip6gre0\x00') socket$kcm(0x29, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000001f40)={&(0x7f0000001f00)='./file0\x00'}, 0x10) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000040)='devices.allow\x00', 0x2, 0x0) 16:51:19 executing program 2: move_pages(0x0, 0x1, &(0x7f0000000080)=[&(0x7f0000ffc000/0x1000)=nil], 0x0, 0x0, 0x0) 16:51:19 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0x8912, &(0x7f0000000340)={"78a3d7633a15b26e8b8b0ae5ca4ac7bd"}) 16:51:19 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000140)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x11000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={0x1, 0x28, &(0x7f0000000240)}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) 16:51:19 executing program 5: socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000004dc0)='/dev/zero\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000080)={0x2020}, 0xffffff83) 16:51:19 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x73, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000180)='./bus\x00', 0x151042, 0x0) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/crypto\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x4000000000010046) 16:51:19 executing program 0: syz_open_dev$usbmon(&(0x7f0000000200)='/dev/usbmon#\x00', 0x0, 0x101000) 16:51:19 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) getpgid(0x0) sendmsg$netlink(r0, &(0x7f00000027c0)={&(0x7f0000000000)=@proc={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000002740)=[{&(0x7f0000000040)={0x1cc, 0x0, 0x0, 0x0, 0x0, "", [@typed={0x35, 0x0, 0x0, 0x0, @binary="d5bb3837625f8c7c846e0ccb47ee02b1bae48d6063b3774d63be43b2aef00d736b0ea52cb60be5e4d3c22bea0d3b3038bb"}, @typed={0x2d, 0x0, 0x0, 0x0, @binary="a71346f418d0b69adbb1dd99a19fd7b90cec53a2981fd87c9dbef188884732ae6b362d22861f347d8a"}, @typed={0x4}, @generic="60ff3d851751ca90c48eda7a8aab6c6bc2834205fdbfb301b8174dbb09ba1140b5a9a433e38941660afcf10b1fd7e031838b26e2c0c9c2a6377ec66e2a9b4ff160977f2a2c15bc170f7e2c9160331f69dc34d95b75d6a58cae61b82052b4c9f77ff551ee314d28fb27dc80c28c34ceee9c2b9bcf91be53b4350fe42dd814071221ee64c439dc96cce45cccc9af764e96db51f45408b852c96567f94c3443f843acc9dfa59aecbfc2ecb533656ad7a0968594429aee53bfdccb41279a422a261e375cc572637583f71cbf5e34971652750cb59518c86cba39a51ba8afb28e8ab4f56470b96c", @typed={0xc, 0x0, 0x0, 0x0, @u64}, @typed={0x59, 0x0, 0x0, 0x0, @binary="06024477ad5c4e3f3b26f28719a03dd779196e397e029e0c6a4c97868c7f3c8696a17950e01a7cfc014e2fc15cd1fb908fc311311421952576a617d94cd18469b4f918b36e9cd6c82fe892f927f2f3692a5b99e539"}]}, 0x1cc}, {&(0x7f0000004b80)={0xcf8, 0x0, 0x0, 0x0, 0x0, "", [@typed={0x14, 0x0, 0x0, 0x0, @ipv6=@private1}, @generic="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"]}, 0xcf8}], 0x2}, 0x0) 16:51:19 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000140)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x11000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={0x1, 0x28, &(0x7f0000000240)}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') 16:51:19 executing program 2: r0 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8904, 0x0) 16:51:19 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) write$FUSE_OPEN(r0, 0x0, 0x0) 16:51:19 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000001200)='/dev/zero\x00', 0x2001, 0x0) write$cgroup_pid(r0, 0x0, 0x0) 16:51:19 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 16:51:19 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000140)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x11000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f2, &(0x7f0000000000)='ip6gre0\x00') socket$kcm(0x29, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000001f40)={&(0x7f0000001f00)='./file0\x00'}, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000040)='devices.allow\x00', 0x2, 0x0) 16:51:19 executing program 5: r0 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8912, &(0x7f00000005c0)={'vcan0\x00'}) 16:51:19 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0xc, 0x121041) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000000c0)={0x0, 0x0, 0x0, {0x0, 0x100000000000001}, {0x20, 0x2}}) write$evdev(r0, &(0x7f0000000040), 0x2b8) ioctl$EVIOCGKEY(r0, 0x80404518, &(0x7f0000000040)=""/100) 16:51:19 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000140)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x11000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={0x1, 0x28, &(0x7f0000000240)}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') 16:51:19 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x73, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000180)='./bus\x00', 0x151042, 0x0) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/crypto\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x4000000000010046) [ 152.732467] ptrace attach of "/root/syz-executor.2"[11663] was attempted by "/root/syz-executor.2"[11664] 16:51:19 executing program 2: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0) 16:51:19 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0xc, 0x121041) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000000c0)={0x0, 0x0, 0x0, {0x0, 0x100000000000001}, {0x20, 0x2}}) write$evdev(r0, &(0x7f0000000040), 0x2b8) ioctl$EVIOCGKEY(r0, 0x80404518, &(0x7f0000000040)=""/100) 16:51:19 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000140)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x11000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={0x1, 0x28, &(0x7f0000000240)}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') 16:51:19 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0xc, 0x121041) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000000c0)={0x0, 0x0, 0x0, {0x0, 0x100000000000001}, {0x20, 0x2}}) write$evdev(r0, &(0x7f0000000040), 0x2b8) ioctl$EVIOCGKEY(r0, 0x80404518, &(0x7f0000000040)=""/100) 16:51:19 executing program 5: r0 = socket$inet(0x2, 0x3, 0x7) ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000080)) 16:51:19 executing program 2: openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) io_setup(0x8000, &(0x7f0000000040)) 16:51:19 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000140)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x11000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f2, &(0x7f0000000000)='ip6gre0\x00') socket$kcm(0x29, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000001f40)={&(0x7f0000001f00)='./file0\x00'}, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000040)='devices.allow\x00', 0x2, 0x0) 16:51:19 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0xc, 0x121041) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000000c0)={0x0, 0x0, 0x0, {0x0, 0x100000000000001}, {0x20, 0x2}}) write$evdev(r0, &(0x7f0000000040), 0x2b8) ioctl$EVIOCGKEY(r0, 0x80404518, &(0x7f0000000040)=""/100) 16:51:19 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000140)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x11000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={0x1, 0x28, &(0x7f0000000240)}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) 16:51:19 executing program 5: r0 = socket$inet(0x2, 0x3, 0x7) ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000080)) 16:51:19 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x73, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000180)='./bus\x00', 0x151042, 0x0) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/crypto\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x4000000000010046) 16:51:20 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0xc, 0x121041) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000000c0)={0x0, 0x0, 0x0, {0x0, 0x100000000000001}, {0x20, 0x2}}) ioctl$EVIOCGKEY(r0, 0x80404518, &(0x7f0000000040)=""/100) 16:51:20 executing program 5: syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') 16:51:20 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000140)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x11000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={0x1, 0x28, &(0x7f0000000240)}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) 16:51:20 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0xb200, 0x0, &(0x7f0000002100), &(0x7f00000032c0), &(0x7f0000003300)) 16:51:20 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000140)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x11000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f2, &(0x7f0000000000)='ip6gre0\x00') socket$kcm(0x29, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000001f40)={&(0x7f0000001f00)='./file0\x00'}, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000040)='devices.allow\x00', 0x2, 0x0) 16:51:20 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0xc, 0x121041) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000000c0)={0x0, 0x0, 0x0, {0x0, 0x100000000000001}, {0x20, 0x2}}) ioctl$EVIOCGKEY(r0, 0x80404518, &(0x7f0000000040)=""/100) 16:51:20 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x73, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000180)='./bus\x00', 0x151042, 0x0) sendfile(r3, 0xffffffffffffffff, 0x0, 0x4000000000010046) 16:51:20 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000001300)='net/igmp\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f00000000c0)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_open_pts(r2, 0x2) sendfile(r5, r0, 0x0, 0x6f0a77bd) 16:51:20 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000140)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x11000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={0x1, 0x28, &(0x7f0000000240)}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) 16:51:20 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0xc, 0x121041) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000000c0)={0x0, 0x0, 0x0, {0x0, 0x100000000000001}, {0x20, 0x2}}) ioctl$EVIOCGKEY(r0, 0x80404518, &(0x7f0000000040)=""/100) 16:51:20 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x73, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000180)='./bus\x00', 0x151042, 0x0) sendfile(r3, 0xffffffffffffffff, 0x0, 0x4000000000010046) 16:51:20 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000140)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x11000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f2, &(0x7f0000000000)='ip6gre0\x00') socket$kcm(0x29, 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000040)='devices.allow\x00', 0x2, 0x0) 16:51:20 executing program 2: pselect6(0x0, 0x0, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000140)={&(0x7f0000000100)={[0x4]}, 0x8}) 16:51:20 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0xc, 0x121041) write$evdev(r0, &(0x7f0000000040), 0x2b8) ioctl$EVIOCGKEY(r0, 0x80404518, &(0x7f0000000040)=""/100) 16:51:20 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000140)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x11000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) 16:51:20 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000001300)='net/igmp\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f00000000c0)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_open_pts(r2, 0x2) sendfile(r5, r0, 0x0, 0x6f0a77bd) 16:51:20 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x73, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000180)='./bus\x00', 0x151042, 0x0) sendfile(r3, 0xffffffffffffffff, 0x0, 0x4000000000010046) 16:51:20 executing program 2: mprotect(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2) 16:51:20 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0xc, 0x121041) write$evdev(r0, &(0x7f0000000040), 0x2b8) ioctl$EVIOCGKEY(r0, 0x80404518, &(0x7f0000000040)=""/100) 16:51:20 executing program 2: r0 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000001700)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}, 0x0) 16:51:20 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000140)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x11000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) 16:51:20 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000140)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x11000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f2, &(0x7f0000000000)='ip6gre0\x00') socket$kcm(0x29, 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000040)='devices.allow\x00', 0x2, 0x0) 16:51:20 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x73, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/crypto\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r3, 0x0, 0x4000000000010046) 16:51:20 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000001300)='net/igmp\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f00000000c0)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_open_pts(r2, 0x2) sendfile(r5, r0, 0x0, 0x6f0a77bd) 16:51:20 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000140)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x11000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) 16:51:20 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0xc, 0x121041) write$evdev(r0, &(0x7f0000000040), 0x2b8) ioctl$EVIOCGKEY(r0, 0x80404518, &(0x7f0000000040)=""/100) 16:51:20 executing program 0: ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000000c0)={0x0, 0x0, 0x0, {0x0, 0x100000000000001}, {0x20, 0x2}}) write$evdev(0xffffffffffffffff, &(0x7f0000000040), 0x2b8) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f0000000040)=""/100) 16:51:20 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x73, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/crypto\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r3, 0x0, 0x4000000000010046) 16:51:20 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000140)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x11000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={0x1, 0x28, &(0x7f0000000240)}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) 16:51:20 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000140)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x11000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f2, &(0x7f0000000000)='ip6gre0\x00') socket$kcm(0x29, 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000040)='devices.allow\x00', 0x2, 0x0) 16:51:20 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000001300)='net/igmp\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f00000000c0)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_open_pts(r2, 0x2) sendfile(r5, r0, 0x0, 0x6f0a77bd) 16:51:21 executing program 2: perf_event_open$cgroup(&(0x7f0000006a40)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 16:51:21 executing program 0: ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000000c0)={0x0, 0x0, 0x0, {0x0, 0x100000000000001}, {0x20, 0x2}}) write$evdev(0xffffffffffffffff, &(0x7f0000000040), 0x2b8) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f0000000040)=""/100) 16:51:21 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x73, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/crypto\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r3, 0x0, 0x4000000000010046) 16:51:21 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000140)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x11000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f2, &(0x7f0000000000)='ip6gre0\x00') bpf$OBJ_GET_PROG(0x7, &(0x7f0000001f40)={&(0x7f0000001f00)='./file0\x00'}, 0x10) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000040)='devices.allow\x00', 0x2, 0x0) 16:51:21 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000001300)='net/igmp\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f00000000c0)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendfile(0xffffffffffffffff, r0, 0x0, 0x6f0a77bd) 16:51:21 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000140)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x11000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={0x1, 0x28, &(0x7f0000000240)}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) 16:51:21 executing program 0: ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000000c0)={0x0, 0x0, 0x0, {0x0, 0x100000000000001}, {0x20, 0x2}}) write$evdev(0xffffffffffffffff, &(0x7f0000000040), 0x2b8) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f0000000040)=""/100) 16:51:21 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = open(&(0x7f0000000180)='./bus\x00', 0x151042, 0x0) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/crypto\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x4000000000010046) 16:51:21 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000140)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x11000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={0x1, 0x28, &(0x7f0000000240)}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) 16:51:21 executing program 2: move_pages(0x0, 0x1, &(0x7f0000000080)=[&(0x7f0000ffc000/0x1000)=nil], 0x0, &(0x7f0000000100), 0x0) 16:51:21 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000001300)='net/igmp\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f00000000c0)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendfile(0xffffffffffffffff, r0, 0x0, 0x6f0a77bd) 16:51:21 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000140)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x11000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f2, &(0x7f0000000000)='ip6gre0\x00') bpf$OBJ_GET_PROG(0x7, &(0x7f0000001f40)={&(0x7f0000001f00)='./file0\x00'}, 0x10) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000040)='devices.allow\x00', 0x2, 0x0) 16:51:21 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000140)) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={0x1, 0x28, &(0x7f0000000240)}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) 16:51:21 executing program 0: r0 = syz_open_dev$evdev(0x0, 0xc, 0x121041) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000000c0)={0x0, 0x0, 0x0, {0x0, 0x100000000000001}, {0x20, 0x2}}) write$evdev(r0, &(0x7f0000000040), 0x2b8) ioctl$EVIOCGKEY(r0, 0x80404518, &(0x7f0000000040)=""/100) 16:51:21 executing program 2: r0 = socket$inet(0x2, 0x3, 0x7) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, 0x0) 16:51:21 executing program 0: r0 = syz_open_dev$evdev(0x0, 0xc, 0x121041) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000000c0)={0x0, 0x0, 0x0, {0x0, 0x100000000000001}, {0x20, 0x2}}) write$evdev(r0, &(0x7f0000000040), 0x2b8) ioctl$EVIOCGKEY(r0, 0x80404518, &(0x7f0000000040)=""/100) 16:51:21 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000140)) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={0x1, 0x28, &(0x7f0000000240)}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) 16:51:21 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r1, r0) r2 = open(&(0x7f0000000180)='./bus\x00', 0x151042, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/crypto\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x4000000000010046) 16:51:21 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000001300)='net/igmp\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f00000000c0)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendfile(0xffffffffffffffff, r0, 0x0, 0x6f0a77bd) 16:51:21 executing program 2: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000042c0)='./file0\x00', &(0x7f0000002000)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) llistxattr(&(0x7f00000021c0)='./file0/file0\x00', 0x0, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0x3) 16:51:21 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000140)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x11000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f2, &(0x7f0000000000)='ip6gre0\x00') bpf$OBJ_GET_PROG(0x7, &(0x7f0000001f40)={&(0x7f0000001f00)='./file0\x00'}, 0x10) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000040)='devices.allow\x00', 0x2, 0x0) 16:51:21 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000140)) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={0x1, 0x28, &(0x7f0000000240)}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) 16:51:21 executing program 0: r0 = syz_open_dev$evdev(0x0, 0xc, 0x121041) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000000c0)={0x0, 0x0, 0x0, {0x0, 0x100000000000001}, {0x20, 0x2}}) write$evdev(r0, &(0x7f0000000040), 0x2b8) ioctl$EVIOCGKEY(r0, 0x80404518, &(0x7f0000000040)=""/100) 16:51:21 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x121041) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000000c0)={0x0, 0x0, 0x0, {0x0, 0x100000000000001}, {0x20, 0x2}}) write$evdev(r0, &(0x7f0000000040), 0x2b8) ioctl$EVIOCGKEY(r0, 0x80404518, &(0x7f0000000040)=""/100) 16:51:22 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r1, r0) r2 = open(&(0x7f0000000180)='./bus\x00', 0x151042, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/crypto\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x4000000000010046) 16:51:22 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x11000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={0x1, 0x28, &(0x7f0000000240)}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) 16:51:22 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000001300)='net/igmp\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f00000000c0)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) dup(r3) r4 = syz_open_pts(r2, 0x2) sendfile(r4, r0, 0x0, 0x6f0a77bd) 16:51:22 executing program 2: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000042c0)='./file0\x00', &(0x7f0000002000)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) llistxattr(&(0x7f00000021c0)='./file0/file0\x00', 0x0, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0x3) 16:51:22 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000140)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x11000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) socket$kcm(0x29, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000001f40)={&(0x7f0000001f00)='./file0\x00'}, 0x10) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000040)='devices.allow\x00', 0x2, 0x0) 16:51:22 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x121041) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000000c0)={0x0, 0x0, 0x0, {0x0, 0x100000000000001}, {0x20, 0x2}}) write$evdev(r0, &(0x7f0000000040), 0x2b8) ioctl$EVIOCGKEY(r0, 0x80404518, &(0x7f0000000040)=""/100) 16:51:22 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x11000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={0x1, 0x28, &(0x7f0000000240)}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) 16:51:22 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r1, r0) r2 = open(&(0x7f0000000180)='./bus\x00', 0x151042, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/crypto\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x4000000000010046) 16:51:22 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000001300)='net/igmp\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f00000000c0)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) dup(r3) r4 = syz_open_pts(r2, 0x2) sendfile(r4, r0, 0x0, 0x6f0a77bd) 16:51:22 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x121041) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000000c0)={0x0, 0x0, 0x0, {0x0, 0x100000000000001}, {0x20, 0x2}}) write$evdev(r0, &(0x7f0000000040), 0x2b8) ioctl$EVIOCGKEY(r0, 0x80404518, &(0x7f0000000040)=""/100) 16:51:22 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_PORT_GET(r0, &(0x7f0000000400)={&(0x7f0000000300), 0x7, &(0x7f00000003c0)={&(0x7f0000000380)={0x14}, 0x14}}, 0x0) 16:51:22 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000140)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x11000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) socket$kcm(0x29, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000001f40)={&(0x7f0000001f00)='./file0\x00'}, 0x10) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000040)='devices.allow\x00', 0x2, 0x0) 16:51:22 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x11000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={0x1, 0x28, &(0x7f0000000240)}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) 16:51:22 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0xc, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000000c0)={0x0, 0x0, 0x0, {0x0, 0x100000000000001}, {0x20, 0x2}}) write$evdev(r0, &(0x7f0000000040), 0x2b8) ioctl$EVIOCGKEY(r0, 0x80404518, &(0x7f0000000040)=""/100) 16:51:22 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000003180)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r0, 0x0, 0x0, 0x20012103, 0x0) 16:51:22 executing program 1: ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000140)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x11000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={0x1, 0x28, &(0x7f0000000240)}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) 16:51:22 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = open(&(0x7f0000000180)='./bus\x00', 0x151042, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/crypto\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x4000000000010046) 16:51:22 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000140)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x11000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) socket$kcm(0x29, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000001f40)={&(0x7f0000001f00)='./file0\x00'}, 0x10) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000040)='devices.allow\x00', 0x2, 0x0) 16:51:22 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000001300)='net/igmp\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f00000000c0)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) dup(r3) r4 = syz_open_pts(r2, 0x2) sendfile(r4, r0, 0x0, 0x6f0a77bd) 16:51:22 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0xc, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000000c0)={0x0, 0x0, 0x0, {0x0, 0x100000000000001}, {0x20, 0x2}}) write$evdev(r0, &(0x7f0000000040), 0x2b8) ioctl$EVIOCGKEY(r0, 0x80404518, &(0x7f0000000040)=""/100) 16:51:22 executing program 2: r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x4, 0x0) read$char_usb(r0, &(0x7f0000000040)=""/112, 0x70) 16:51:22 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000140)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x11000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f2, &(0x7f0000000000)='ip6gre0\x00') socket$kcm(0x29, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000001f40)={&(0x7f0000001f00)='./file0\x00'}, 0x10) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000040)='devices.allow\x00', 0x2, 0x0) 16:51:22 executing program 1: ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000140)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x11000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={0x1, 0x28, &(0x7f0000000240)}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) 16:51:22 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = open(&(0x7f0000000180)='./bus\x00', 0x151042, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/crypto\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x4000000000010046) 16:51:22 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0xc, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000000c0)={0x0, 0x0, 0x0, {0x0, 0x100000000000001}, {0x20, 0x2}}) write$evdev(r0, &(0x7f0000000040), 0x2b8) ioctl$EVIOCGKEY(r0, 0x80404518, &(0x7f0000000040)=""/100) 16:51:22 executing program 2: 16:51:22 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000001300)='net/igmp\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f00000000c0)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r3 = syz_open_pts(r2, 0x2) sendfile(r3, r0, 0x0, 0x6f0a77bd) 16:51:22 executing program 1: ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000140)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x11000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={0x1, 0x28, &(0x7f0000000240)}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) 16:51:22 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000140)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x11000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f2, &(0x7f0000000000)='ip6gre0\x00') socket$kcm(0x29, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000001f40)={&(0x7f0000001f00)='./file0\x00'}, 0x10) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000040)='devices.allow\x00', 0x2, 0x0) 16:51:22 executing program 2: 16:51:22 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0xc, 0x121041) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, 0x0) write$evdev(r0, &(0x7f0000000040), 0x2b8) ioctl$EVIOCGKEY(r0, 0x80404518, &(0x7f0000000040)=""/100) 16:51:22 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000140)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x11000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f2, &(0x7f0000000000)='ip6gre0\x00') socket$kcm(0x29, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000001f40)={&(0x7f0000001f00)='./file0\x00'}, 0x10) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000040)='devices.allow\x00', 0x2, 0x0) 16:51:22 executing program 2: 16:51:22 executing program 1: bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000140)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x11000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={0x1, 0x28, &(0x7f0000000240)}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) 16:51:22 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = open(&(0x7f0000000180)='./bus\x00', 0x151042, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/crypto\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x4000000000010046) 16:51:22 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000001300)='net/igmp\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f00000000c0)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r3 = syz_open_pts(r2, 0x2) sendfile(r3, r0, 0x0, 0x6f0a77bd) 16:51:23 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0xc, 0x121041) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, 0x0) write$evdev(r0, &(0x7f0000000040), 0x2b8) ioctl$EVIOCGKEY(r0, 0x80404518, &(0x7f0000000040)=""/100) 16:51:23 executing program 2: 16:51:23 executing program 1: bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000140)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x11000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={0x1, 0x28, &(0x7f0000000240)}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) 16:51:23 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000140)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x11000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f2, &(0x7f0000000000)='ip6gre0\x00') socket$kcm(0x29, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000001f40)={&(0x7f0000001f00)='./file0\x00'}, 0x10) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000040)='devices.allow\x00', 0x2, 0x0) 16:51:23 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0xc, 0x121041) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, 0x0) write$evdev(r0, &(0x7f0000000040), 0x2b8) ioctl$EVIOCGKEY(r0, 0x80404518, &(0x7f0000000040)=""/100) 16:51:23 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000001300)='net/igmp\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f00000000c0)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r3 = syz_open_pts(r2, 0x2) sendfile(r3, r0, 0x0, 0x6f0a77bd) 16:51:23 executing program 3: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = open(&(0x7f0000000180)='./bus\x00', 0x151042, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/crypto\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x4000000000010046) 16:51:23 executing program 2: 16:51:23 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000140)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x11000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f2, &(0x7f0000000000)='ip6gre0\x00') socket$kcm(0x29, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000001f40)={&(0x7f0000001f00)='./file0\x00'}, 0x10) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000040)='devices.allow\x00', 0x2, 0x0) 16:51:23 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0xc, 0x121041) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000000c0)={0x0, 0x0, 0x0, {}, {0x20, 0x2}}) write$evdev(r0, &(0x7f0000000040), 0x2b8) ioctl$EVIOCGKEY(r0, 0x80404518, &(0x7f0000000040)=""/100) 16:51:23 executing program 1: bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000140)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x11000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={0x1, 0x28, &(0x7f0000000240)}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) 16:51:23 executing program 2: 16:51:23 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000140)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x11000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={0x1, 0x28, &(0x7f0000000240)}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) 16:51:23 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000140)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x11000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f2, &(0x7f0000000000)='ip6gre0\x00') socket$kcm(0x29, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000001f40)={&(0x7f0000001f00)='./file0\x00'}, 0x10) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000040)='devices.allow\x00', 0x2, 0x0) 16:51:23 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0xc, 0x121041) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000000c0)={0x0, 0x0, 0x0, {}, {0x20, 0x2}}) write$evdev(r0, &(0x7f0000000040), 0x2b8) ioctl$EVIOCGKEY(r0, 0x80404518, &(0x7f0000000040)=""/100) 16:51:23 executing program 3: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = open(&(0x7f0000000180)='./bus\x00', 0x151042, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/crypto\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x4000000000010046) 16:51:23 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000001300)='net/igmp\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f00000000c0)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) r3 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_open_pts(r2, 0x2) sendfile(r4, r0, 0x0, 0x6f0a77bd) 16:51:23 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000140)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x11000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f2, &(0x7f0000000000)='ip6gre0\x00') socket$kcm(0x29, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000001f40)={&(0x7f0000001f00)='./file0\x00'}, 0x10) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000040)='devices.allow\x00', 0x2, 0x0) 16:51:23 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0xc, 0x121041) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000000c0)={0x0, 0x0, 0x0, {}, {0x20, 0x2}}) write$evdev(r0, &(0x7f0000000040), 0x2b8) ioctl$EVIOCGKEY(r0, 0x80404518, &(0x7f0000000040)=""/100) 16:51:23 executing program 2: 16:51:23 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000140)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x11000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={0x1, 0x28, &(0x7f0000000240)}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) 16:51:23 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0xc, 0x121041) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000000c0)={0x0, 0x0, 0x0, {0x0, 0x100000000000001}, {0x0, 0x2}}) write$evdev(r0, &(0x7f0000000040), 0x2b8) ioctl$EVIOCGKEY(r0, 0x80404518, &(0x7f0000000040)=""/100) 16:51:23 executing program 2: 16:51:23 executing program 3: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = open(&(0x7f0000000180)='./bus\x00', 0x151042, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/crypto\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x4000000000010046) 16:51:23 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000001300)='net/igmp\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f00000000c0)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) r3 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_open_pts(r2, 0x2) sendfile(r4, r0, 0x0, 0x6f0a77bd) 16:51:23 executing program 2: 16:51:23 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000140)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x11000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f2, &(0x7f0000000000)='ip6gre0\x00') socket$kcm(0x29, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000001f40)={&(0x7f0000001f00)='./file0\x00'}, 0x10) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000040)='devices.allow\x00', 0x2, 0x0) 16:51:23 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000140)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x11000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={0x1, 0x28, &(0x7f0000000240)}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) 16:51:23 executing program 2: 16:51:23 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0xc, 0x121041) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000000c0)={0x0, 0x0, 0x0, {0x0, 0x100000000000001}, {0x0, 0x2}}) write$evdev(r0, &(0x7f0000000040), 0x2b8) ioctl$EVIOCGKEY(r0, 0x80404518, &(0x7f0000000040)=""/100) 16:51:23 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000140)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x11000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f2, &(0x7f0000000000)='ip6gre0\x00') socket$kcm(0x29, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000001f40)={&(0x7f0000001f00)='./file0\x00'}, 0x10) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000040)='devices.allow\x00', 0x2, 0x0) 16:51:23 executing program 2: 16:51:23 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000001300)='net/igmp\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f00000000c0)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) r3 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_open_pts(r2, 0x2) sendfile(r4, r0, 0x0, 0x6f0a77bd) 16:51:23 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x11000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={0x1, 0x28, &(0x7f0000000240)}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) 16:51:23 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = open(&(0x7f0000000180)='./bus\x00', 0x151042, 0x0) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/crypto\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x4000000000010046) 16:51:24 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0xc, 0x121041) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000000c0)={0x0, 0x0, 0x0, {0x0, 0x100000000000001}, {0x0, 0x2}}) write$evdev(r0, &(0x7f0000000040), 0x2b8) ioctl$EVIOCGKEY(r0, 0x80404518, &(0x7f0000000040)=""/100) 16:51:24 executing program 2: 16:51:24 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000140)) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f2, &(0x7f0000000000)='ip6gre0\x00') socket$kcm(0x29, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000001f40)={&(0x7f0000001f00)='./file0\x00'}, 0x10) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000040)='devices.allow\x00', 0x2, 0x0) 16:51:24 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0xc, 0x121041) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000000c0)={0x0, 0x0, 0x0, {0x0, 0x100000000000001}, {0x20}}) write$evdev(r0, &(0x7f0000000040), 0x2b8) ioctl$EVIOCGKEY(r0, 0x80404518, &(0x7f0000000040)=""/100) 16:51:24 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x11000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={0x1, 0x28, &(0x7f0000000240)}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) 16:51:24 executing program 2: 16:51:24 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000001300)='net/igmp\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f00000000c0)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_open_pts(r2, 0x2) sendfile(r5, r0, 0x0, 0x6f0a77bd) 16:51:24 executing program 2: 16:51:24 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = open(&(0x7f0000000180)='./bus\x00', 0x151042, 0x0) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/crypto\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x4000000000010046) 16:51:24 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0xc, 0x121041) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000000c0)={0x0, 0x0, 0x0, {0x0, 0x100000000000001}, {0x20}}) write$evdev(r0, &(0x7f0000000040), 0x2b8) ioctl$EVIOCGKEY(r0, 0x80404518, &(0x7f0000000040)=""/100) 16:51:24 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x11000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={0x1, 0x28, &(0x7f0000000240)}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) 16:51:24 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000001300)='net/igmp\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f00000000c0)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_open_pts(r2, 0x2) sendfile(r5, r0, 0x0, 0x6f0a77bd) 16:51:24 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000140)) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f2, &(0x7f0000000000)='ip6gre0\x00') socket$kcm(0x29, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000001f40)={&(0x7f0000001f00)='./file0\x00'}, 0x10) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000040)='devices.allow\x00', 0x2, 0x0) 16:51:24 executing program 2: 16:51:24 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0xc, 0x121041) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000000c0)={0x0, 0x0, 0x0, {0x0, 0x100000000000001}, {0x20}}) write$evdev(r0, &(0x7f0000000040), 0x2b8) ioctl$EVIOCGKEY(r0, 0x80404518, &(0x7f0000000040)=""/100) 16:51:24 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000140)) perf_event_open(0x0, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={0x1, 0x28, &(0x7f0000000240)}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) 16:51:24 executing program 2: 16:51:24 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000001300)='net/igmp\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f00000000c0)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_open_pts(r2, 0x2) sendfile(r5, r0, 0x0, 0x6f0a77bd) 16:51:24 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = open(&(0x7f0000000180)='./bus\x00', 0x151042, 0x0) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/crypto\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x4000000000010046) 16:51:24 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0xc, 0x121041) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000000c0)={0x0, 0x0, 0x0, {0x0, 0x100000000000001}, {0x20, 0x2}}) write$evdev(0xffffffffffffffff, &(0x7f0000000040), 0x2b8) ioctl$EVIOCGKEY(r0, 0x80404518, &(0x7f0000000040)=""/100) 16:51:24 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000140)) perf_event_open(0x0, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={0x1, 0x28, &(0x7f0000000240)}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) 16:51:24 executing program 2: 16:51:24 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000140)) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f2, &(0x7f0000000000)='ip6gre0\x00') socket$kcm(0x29, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000001f40)={&(0x7f0000001f00)='./file0\x00'}, 0x10) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000040)='devices.allow\x00', 0x2, 0x0) 16:51:24 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000001300)='net/igmp\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f00000000c0)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_open_pts(0xffffffffffffffff, 0x2) sendfile(r4, r0, 0x0, 0x6f0a77bd) 16:51:24 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0xc, 0x121041) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000000c0)={0x0, 0x0, 0x0, {0x0, 0x100000000000001}, {0x20, 0x2}}) write$evdev(0xffffffffffffffff, &(0x7f0000000040), 0x2b8) ioctl$EVIOCGKEY(r0, 0x80404518, &(0x7f0000000040)=""/100) 16:51:24 executing program 2: 16:51:24 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000140)) perf_event_open(0x0, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={0x1, 0x28, &(0x7f0000000240)}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) 16:51:24 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000001300)='net/igmp\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f00000000c0)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_open_pts(0xffffffffffffffff, 0x2) sendfile(r4, r0, 0x0, 0x6f0a77bd) 16:51:24 executing program 3: socketpair$unix(0x1, 0x2, 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = open(&(0x7f0000000180)='./bus\x00', 0x151042, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/crypto\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x4000000000010046) 16:51:24 executing program 2: 16:51:24 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x11000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f2, &(0x7f0000000000)='ip6gre0\x00') socket$kcm(0x29, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000001f40)={&(0x7f0000001f00)='./file0\x00'}, 0x10) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000040)='devices.allow\x00', 0x2, 0x0) 16:51:24 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0xc, 0x121041) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000000c0)={0x0, 0x0, 0x0, {0x0, 0x100000000000001}, {0x20, 0x2}}) write$evdev(0xffffffffffffffff, &(0x7f0000000040), 0x2b8) ioctl$EVIOCGKEY(r0, 0x80404518, &(0x7f0000000040)=""/100) 16:51:24 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000140)) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x11000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={0x1, 0x28, &(0x7f0000000240)}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) 16:51:24 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000001300)='net/igmp\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f00000000c0)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_open_pts(0xffffffffffffffff, 0x2) sendfile(r4, r0, 0x0, 0x6f0a77bd) 16:51:24 executing program 2: 16:51:24 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0xc, 0x121041) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000000c0)={0x0, 0x0, 0x0, {0x0, 0x100000000000001}, {0x20, 0x2}}) write$evdev(r0, 0x0, 0x0) ioctl$EVIOCGKEY(r0, 0x80404518, &(0x7f0000000040)=""/100) 16:51:24 executing program 3: socketpair$unix(0x1, 0x2, 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = open(&(0x7f0000000180)='./bus\x00', 0x151042, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/crypto\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x4000000000010046) 16:51:24 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000140)) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x11000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={0x1, 0x28, &(0x7f0000000240)}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) 16:51:24 executing program 2: 16:51:25 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000140)) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x11000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={0x1, 0x28, &(0x7f0000000240)}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) 16:51:25 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000001300)='net/igmp\x00') socket$inet_tcp(0x2, 0x1, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_open_pts(r1, 0x2) sendfile(r4, r0, 0x0, 0x6f0a77bd) 16:51:25 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0xc, 0x121041) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000000c0)={0x0, 0x0, 0x0, {0x0, 0x100000000000001}, {0x20, 0x2}}) write$evdev(r0, 0x0, 0x0) ioctl$EVIOCGKEY(r0, 0x80404518, &(0x7f0000000040)=""/100) 16:51:25 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x11000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f2, &(0x7f0000000000)='ip6gre0\x00') socket$kcm(0x29, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000001f40)={&(0x7f0000001f00)='./file0\x00'}, 0x10) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000040)='devices.allow\x00', 0x2, 0x0) 16:51:25 executing program 3: socketpair$unix(0x1, 0x2, 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = open(&(0x7f0000000180)='./bus\x00', 0x151042, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/crypto\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x4000000000010046) 16:51:25 executing program 2: 16:51:25 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000140)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x11000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={0x1, 0x28, &(0x7f0000000240)}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) 16:51:25 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0xc, 0x121041) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000000c0)={0x0, 0x0, 0x0, {0x0, 0x100000000000001}, {0x20, 0x2}}) write$evdev(r0, 0x0, 0x0) ioctl$EVIOCGKEY(r0, 0x80404518, &(0x7f0000000040)=""/100) 16:51:25 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000001300)='net/igmp\x00') socket$inet_tcp(0x2, 0x1, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_open_pts(r1, 0x2) sendfile(r4, r0, 0x0, 0x6f0a77bd) 16:51:25 executing program 2: 16:51:25 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000140)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x11000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={0x1, 0x28, &(0x7f0000000240)}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) 16:51:25 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x11000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f2, &(0x7f0000000000)='ip6gre0\x00') socket$kcm(0x29, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000001f40)={&(0x7f0000001f00)='./file0\x00'}, 0x10) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000040)='devices.allow\x00', 0x2, 0x0) 16:51:25 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0xc, 0x121041) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000000c0)={0x0, 0x0, 0x0, {0x0, 0x100000000000001}, {0x20, 0x2}}) write$evdev(r0, &(0x7f0000000040), 0x2b8) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f0000000040)=""/100) 16:51:25 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) r1 = dup2(0xffffffffffffffff, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f0000000180)='./bus\x00', 0x151042, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/crypto\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x4000000000010046) 16:51:25 executing program 2: 16:51:25 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000140)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x11000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={0x1, 0x28, &(0x7f0000000240)}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) 16:51:25 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0xc, 0x121041) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000000c0)={0x0, 0x0, 0x0, {0x0, 0x100000000000001}, {0x20, 0x2}}) write$evdev(r0, &(0x7f0000000040), 0x2b8) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f0000000040)=""/100) 16:51:25 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x11000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f2, &(0x7f0000000000)='ip6gre0\x00') socket$kcm(0x29, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000001f40)={&(0x7f0000001f00)='./file0\x00'}, 0x10) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000040)='devices.allow\x00', 0x2, 0x0) 16:51:25 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000001300)='net/igmp\x00') socket$inet_tcp(0x2, 0x1, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_open_pts(r1, 0x2) sendfile(r4, r0, 0x0, 0x6f0a77bd) 16:51:25 executing program 2: 16:51:25 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) r1 = dup2(0xffffffffffffffff, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f0000000180)='./bus\x00', 0x151042, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/crypto\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x4000000000010046) 16:51:25 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000140)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x11000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={0x1, 0x28, &(0x7f0000000240)}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) 16:51:25 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x11000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f2, &(0x7f0000000000)='ip6gre0\x00') socket$kcm(0x29, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000001f40)={&(0x7f0000001f00)='./file0\x00'}, 0x10) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000040)='devices.allow\x00', 0x2, 0x0) 16:51:25 executing program 2: 16:51:25 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0xc, 0x121041) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000000c0)={0x0, 0x0, 0x0, {0x0, 0x100000000000001}, {0x20, 0x2}}) write$evdev(r0, &(0x7f0000000040), 0x2b8) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f0000000040)=""/100) 16:51:25 executing program 4: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x11000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f2, &(0x7f0000000000)='ip6gre0\x00') socket$kcm(0x29, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000001f40)={&(0x7f0000001f00)='./file0\x00'}, 0x10) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000040)='devices.allow\x00', 0x2, 0x0) 16:51:25 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000140)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x11000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={0x1, 0x28, &(0x7f0000000240)}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) 16:51:25 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0xc, 0x121041) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000000c0)={0x0, 0x0, 0x0, {0x0, 0x100000000000001}, {0x20, 0x2}}) write$evdev(r0, &(0x7f0000000040), 0x2b8) ioctl$EVIOCGKEY(r0, 0x80404518, 0x0) 16:51:25 executing program 2: 16:51:25 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000001300)='net/igmp\x00') setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f00000000c0)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_open_pts(r1, 0x2) sendfile(r4, r0, 0x0, 0x6f0a77bd) 16:51:25 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) r1 = dup2(0xffffffffffffffff, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f0000000180)='./bus\x00', 0x151042, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/crypto\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x4000000000010046) 16:51:25 executing program 2: 16:51:25 executing program 4: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x11000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f2, &(0x7f0000000000)='ip6gre0\x00') socket$kcm(0x29, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000001f40)={&(0x7f0000001f00)='./file0\x00'}, 0x10) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000040)='devices.allow\x00', 0x2, 0x0) 16:51:25 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000140)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x11000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={0x1, 0x28, &(0x7f0000000240)}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) 16:51:25 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0xc, 0x121041) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000000c0)={0x0, 0x0, 0x0, {0x0, 0x100000000000001}, {0x20, 0x2}}) write$evdev(r0, &(0x7f0000000040), 0x2b8) ioctl$EVIOCGKEY(r0, 0x80404518, 0x0) 16:51:25 executing program 2: 16:51:26 executing program 4: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x11000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f2, &(0x7f0000000000)='ip6gre0\x00') socket$kcm(0x29, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000001f40)={&(0x7f0000001f00)='./file0\x00'}, 0x10) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000040)='devices.allow\x00', 0x2, 0x0) 16:51:26 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000001300)='net/igmp\x00') setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f00000000c0)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_open_pts(r1, 0x2) sendfile(r4, r0, 0x0, 0x6f0a77bd) 16:51:26 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000140)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100), 0x4}, 0x11000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={0x1, 0x28, &(0x7f0000000240)}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) 16:51:26 executing program 2: 16:51:26 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0xc, 0x121041) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000000c0)={0x0, 0x0, 0x0, {0x0, 0x100000000000001}, {0x20, 0x2}}) write$evdev(r0, &(0x7f0000000040), 0x2b8) ioctl$EVIOCGKEY(r0, 0x80404518, 0x0) 16:51:26 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup2(r0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f0000000180)='./bus\x00', 0x151042, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/crypto\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x4000000000010046) 16:51:26 executing program 2: 16:51:26 executing program 0: 16:51:26 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000140)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100), 0x4}, 0x11000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={0x1, 0x28, &(0x7f0000000240)}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) 16:51:26 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x11000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f2, &(0x7f0000000000)='ip6gre0\x00') socket$kcm(0x29, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000001f40)={&(0x7f0000001f00)='./file0\x00'}, 0x10) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000040)='devices.allow\x00', 0x2, 0x0) 16:51:26 executing program 2: 16:51:26 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000001300)='net/igmp\x00') setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f00000000c0)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_open_pts(r1, 0x2) sendfile(r4, r0, 0x0, 0x6f0a77bd) 16:51:26 executing program 0: 16:51:26 executing program 2: 16:51:26 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup2(r0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f0000000180)='./bus\x00', 0x151042, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/crypto\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x4000000000010046) 16:51:26 executing program 0: 16:51:26 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000140)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100), 0x4}, 0x11000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={0x1, 0x28, &(0x7f0000000240)}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) 16:51:26 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect(r0, &(0x7f0000000000)=@in={0x10, 0x2}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x105, &(0x7f0000000040)=ANY=[@ANYBLOB="2f061d18", @ANYRES32=0x0], &(0x7f0000000080)=0x8) getsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x2, &(0x7f00000000c0)={r1}, &(0x7f0000000100)=0x14) getsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x1, &(0x7f0000000140)={r2}, &(0x7f0000000180)=0x10) 16:51:26 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f00000000c0)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_open_pts(r1, 0x2) sendfile(r4, 0xffffffffffffffff, 0x0, 0x6f0a77bd) 16:51:26 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x11000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f2, &(0x7f0000000000)='ip6gre0\x00') socket$kcm(0x29, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000001f40)={&(0x7f0000001f00)='./file0\x00'}, 0x10) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000040)='devices.allow\x00', 0x2, 0x0) 16:51:26 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r0, &(0x7f0000000040)={0x10, 0x2}, 0x10) 16:51:26 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup2(r0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f0000000180)='./bus\x00', 0x151042, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/crypto\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x4000000000010046) 16:51:26 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) r1 = fcntl$dupfd(r0, 0x0, r0) connect$inet(r1, &(0x7f0000000180)={0x10, 0x2}, 0x10) 16:51:26 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000140)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x4}, 0x11000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={0x1, 0x28, &(0x7f0000000240)}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) 16:51:26 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f00000000c0)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_open_pts(r1, 0x2) sendfile(r4, 0xffffffffffffffff, 0x0, 0x6f0a77bd) 16:51:26 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect(r0, &(0x7f0000000180)=@in={0x10, 0x2}, 0x10) 16:51:26 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x11000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f2, &(0x7f0000000000)='ip6gre0\x00') socket$kcm(0x29, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000001f40)={&(0x7f0000001f00)='./file0\x00'}, 0x10) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000040)='devices.allow\x00', 0x2, 0x0) 16:51:26 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x25, &(0x7f00000000c0)=ANY=[@ANYBLOB="01005b"], &(0x7f0000000080)=0x8) 16:51:26 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_int(r0, 0x29, 0x1b, &(0x7f00000001c0), 0x4) bind$inet6(r0, &(0x7f0000000000)={0xfffffffffffffed6, 0x1c}, 0x1c) 16:51:26 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000140)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x4}, 0x11000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={0x1, 0x28, &(0x7f0000000240)}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) 16:51:26 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f00000000c0)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_open_pts(r1, 0x2) sendfile(r4, 0xffffffffffffffff, 0x0, 0x6f0a77bd) 16:51:26 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r2 = open(&(0x7f0000000180)='./bus\x00', 0x151042, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/crypto\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x4000000000010046) 16:51:26 executing program 2: 16:51:26 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000140)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x4}, 0x11000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={0x1, 0x28, &(0x7f0000000240)}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) 16:51:26 executing program 0: 16:51:27 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet_sctp(0x2, 0x5, 0x84) connect(r1, &(0x7f0000000000)=@in={0x10, 0x2}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x105, &(0x7f0000000040)={0x1, [0x0]}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x108, &(0x7f0000000000)={r2}, &(0x7f0000000040)=0x18) 16:51:27 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(0x0, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f2, &(0x7f0000000000)='ip6gre0\x00') socket$kcm(0x29, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000001f40)={&(0x7f0000001f00)='./file0\x00'}, 0x10) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000040)='devices.allow\x00', 0x2, 0x0) 16:51:27 executing program 5: r0 = syz_open_procfs(0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f00000000c0)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_open_pts(r2, 0x2) sendfile(r5, r0, 0x0, 0x6f0a77bd) 16:51:27 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r2 = open(&(0x7f0000000180)='./bus\x00', 0x151042, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/crypto\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x4000000000010046) 16:51:27 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect(r0, &(0x7f0000000000)=@in={0x10, 0x2}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x105, &(0x7f0000000040)={0x1, [0x0]}, &(0x7f0000000080)=0x8) r1 = fcntl$dupfd(r0, 0x0, r0) getsockopt$inet_sctp_SCTP_MAXSEG(r1, 0x84, 0xe, &(0x7f0000000180), &(0x7f00000001c0)=0x8) 16:51:27 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect(r0, &(0x7f0000000000)=@in={0x10, 0x2}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x105, &(0x7f0000000040)={0x1, [0x0]}, &(0x7f0000000080)=0x8) 16:51:27 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000140)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100)}, 0x11000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={0x1, 0x28, &(0x7f0000000240)}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) 16:51:27 executing program 5: r0 = syz_open_procfs(0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f00000000c0)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_open_pts(r2, 0x2) sendfile(r5, r0, 0x0, 0x6f0a77bd) 16:51:27 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r0, 0x84, 0x16, &(0x7f0000000240), 0x8) 16:51:27 executing program 2: 16:51:27 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000140)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100)}, 0x11000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={0x1, 0x28, &(0x7f0000000240)}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) 16:51:27 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(0x0, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f2, &(0x7f0000000000)='ip6gre0\x00') socket$kcm(0x29, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000001f40)={&(0x7f0000001f00)='./file0\x00'}, 0x10) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000040)='devices.allow\x00', 0x2, 0x0) 16:51:27 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r2 = open(&(0x7f0000000180)='./bus\x00', 0x151042, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/crypto\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x4000000000010046) 16:51:27 executing program 2: 16:51:27 executing program 5: r0 = syz_open_procfs(0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f00000000c0)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_open_pts(r2, 0x2) sendfile(r5, r0, 0x0, 0x6f0a77bd) 16:51:27 executing program 0: 16:51:27 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000140)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100)}, 0x11000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={0x1, 0x28, &(0x7f0000000240)}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) 16:51:27 executing program 2: 16:51:27 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(0x0, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f2, &(0x7f0000000000)='ip6gre0\x00') socket$kcm(0x29, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000001f40)={&(0x7f0000001f00)='./file0\x00'}, 0x10) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000040)='devices.allow\x00', 0x2, 0x0) 16:51:27 executing program 0: 16:51:27 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000001300)='net/igmp\x00') socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f00000000c0)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_open_pts(r1, 0x2) sendfile(r4, r0, 0x0, 0x6f0a77bd) 16:51:27 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) r3 = open(&(0x7f0000000180)='./bus\x00', 0x151042, 0x0) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/crypto\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x4000000000010046) 16:51:27 executing program 2: 16:51:27 executing program 0: 16:51:27 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000140)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={0x1, 0x28, &(0x7f0000000240)}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) 16:51:27 executing program 2: 16:51:27 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x11000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f2, &(0x7f0000000000)='ip6gre0\x00') socket$kcm(0x29, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000001f40)={&(0x7f0000001f00)='./file0\x00'}, 0x10) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000040)='devices.allow\x00', 0x2, 0x0) 16:51:27 executing program 0: 16:51:27 executing program 2: 16:51:27 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) r3 = open(&(0x7f0000000180)='./bus\x00', 0x151042, 0x0) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/crypto\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x4000000000010046) 16:51:27 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000140)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={0x1, 0x28, &(0x7f0000000240)}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) 16:51:27 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000001300)='net/igmp\x00') socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f00000000c0)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_open_pts(r1, 0x2) sendfile(r4, r0, 0x0, 0x6f0a77bd) 16:51:27 executing program 0: 16:51:27 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x11000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f2, &(0x7f0000000000)='ip6gre0\x00') socket$kcm(0x29, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000001f40)={&(0x7f0000001f00)='./file0\x00'}, 0x10) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000040)='devices.allow\x00', 0x2, 0x0) 16:51:27 executing program 2: 16:51:27 executing program 0: ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, &(0x7f0000000100)={0x8, 0x4, 0x0, 0x0, 0x0, "518c84afb48b94ad1c6071658fb8638700a109"}) r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x5, 0x8, 0x7, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x1c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000480)={r0, &(0x7f0000000100), &(0x7f00000004c0)=@udp6=r1}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000080)={r0, &(0x7f0000847f95), 0x0}, 0x20) 16:51:27 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) r3 = open(&(0x7f0000000180)='./bus\x00', 0x151042, 0x0) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/crypto\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x4000000000010046) 16:51:27 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000140)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={0x1, 0x28, &(0x7f0000000240)}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) 16:51:27 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x401, &(0x7f0000000040)=0x0) io_submit(r1, 0x1, &(0x7f00000016c0)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) io_submit(r1, 0x1, &(0x7f0000000480)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}]) 16:51:28 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000002440)={0x2020}, 0x2020) read$FUSE(r0, &(0x7f00000048c0)={0x2020}, 0x2020) 16:51:28 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000001300)='net/igmp\x00') socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f00000000c0)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_open_pts(r1, 0x2) sendfile(r4, r0, 0x0, 0x6f0a77bd) 16:51:28 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x11000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f2, &(0x7f0000000000)='ip6gre0\x00') socket$kcm(0x29, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000001f40)={&(0x7f0000001f00)='./file0\x00'}, 0x10) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000040)='devices.allow\x00', 0x2, 0x0) 16:51:28 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000140)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x11000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={0x1, 0x28, &(0x7f0000000240)}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) 16:51:28 executing program 2: r0 = socket(0xa, 0x2, 0x0) sendmmsg$unix(r0, &(0x7f000000cd80)=[{0x0, 0x0, 0x0}], 0x1, 0x0) connect$packet(r0, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) 16:51:28 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = open(0x0, 0x151042, 0x0) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/crypto\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x4000000000010046) 16:51:28 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000140)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x11000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={0x1, 0x28, &(0x7f0000000240)}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) 16:51:28 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) sendmmsg$nfc_llcp(r0, &(0x7f0000000380)=[{&(0x7f0000000000)={0x27, 0x1, 0x0, 0x0, 0x0, 0x0, "27805fc120fe5127553439627f7578e92a19a9a49ee472e29fe8e19cedb080ba0c05b29ec2bedaa30ed3fd36a6ba3ca97f0f8f5a2f765f374ac40f9671bbf7"}, 0x60, &(0x7f0000000240)=[{&(0x7f0000000080)="d32e04a008df938b16aea148986f", 0xe}], 0x1}], 0x1, 0x60) 16:51:28 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000001300)='net/igmp\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, 0x0, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_open_pts(r2, 0x2) sendfile(r5, r0, 0x0, 0x6f0a77bd) 16:51:28 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x11000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f2, &(0x7f0000000000)='ip6gre0\x00') socket$kcm(0x29, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000001f40)={&(0x7f0000001f00)='./file0\x00'}, 0x10) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000040)='devices.allow\x00', 0x2, 0x0) 16:51:28 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = open(0x0, 0x151042, 0x0) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/crypto\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x4000000000010046) 16:51:28 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000140)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x11000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={0x1, 0x28, &(0x7f0000000240)}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) 16:51:28 executing program 0: keyctl$update(0x11, 0x0, 0x0, 0x0) 16:51:28 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendto(r0, 0x0, 0x0, 0x0, &(0x7f0000000340)=@l2tp6={0xa, 0x0, 0x0, @dev}, 0x17) 16:51:28 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = open(0x0, 0x151042, 0x0) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/crypto\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x4000000000010046) 16:51:28 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x11000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f2, &(0x7f0000000000)='ip6gre0\x00') socket$kcm(0x29, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000001f40)={&(0x7f0000001f00)='./file0\x00'}, 0x10) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000040)='devices.allow\x00', 0x2, 0x0) 16:51:28 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000001300)='net/igmp\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, 0x0, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_open_pts(r2, 0x2) sendfile(r5, r0, 0x0, 0x6f0a77bd) 16:51:28 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000140)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x11000, 0x0, 0x0, 0x9}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={0x1, 0x28, &(0x7f0000000240)}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) 16:51:28 executing program 0: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000012c0)='/dev/snd/seq\x00', 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r0, 0xc08c5335, &(0x7f0000001300)={0x0, 0x0, 0x0, 'queue0\x00'}) 16:51:29 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000040)=""/233, 0x1a, 0xe9, 0x1}, 0x20) 16:51:29 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000140)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x11000, 0x0, 0x0, 0x9}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={0x1, 0x28, &(0x7f0000000240)}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) 16:51:29 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x11000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f2, &(0x7f0000000000)='ip6gre0\x00') socket$kcm(0x29, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000001f40)={&(0x7f0000001f00)='./file0\x00'}, 0x10) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000040)='devices.allow\x00', 0x2, 0x0) 16:51:29 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/crypto\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x4000000000010046) 16:51:29 executing program 0: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000012c0)='/dev/snd/seq\x00', 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r0, 0xc08c5335, &(0x7f0000001300)={0x0, 0x0, 0x0, 'queue0\x00'}) 16:51:29 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000001300)='net/igmp\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, 0x0, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_open_pts(r2, 0x2) sendfile(r5, r0, 0x0, 0x6f0a77bd) 16:51:29 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendto(r0, &(0x7f0000000280)='bG', 0x2, 0x0, &(0x7f0000000340)=@l2tp6={0xa, 0x0, 0x0, @dev}, 0x80) 16:51:29 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/crypto\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x4000000000010046) 16:51:29 executing program 0: pselect6(0x40, &(0x7f0000002700), 0x0, 0x0, &(0x7f00000027c0)={0x0, 0x3938700}, 0x0) 16:51:29 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000140)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x11000, 0x0, 0x0, 0x9}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={0x1, 0x28, &(0x7f0000000240)}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) 16:51:29 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x11000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f2, &(0x7f0000000000)='ip6gre0\x00') socket$kcm(0x29, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000001f40)={&(0x7f0000001f00)='./file0\x00'}, 0x10) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000040)='devices.allow\x00', 0x2, 0x0) 16:51:29 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000000)={'team0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x2, 0x6, @link_local}, 0x10) 16:51:29 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/crypto\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x4000000000010046) 16:51:29 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000001300)='net/igmp\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f00000000c0)={0x0, {{0x2, 0x0, @multicast2}}}, 0x88) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_open_pts(r2, 0x2) sendfile(r5, r0, 0x0, 0x6f0a77bd) 16:51:29 executing program 0: r0 = socket(0x2b, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8930, &(0x7f00000008c0)={'team0\x00'}) 16:51:29 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCDELRT(r0, 0x890b, &(0x7f0000000100)={0x0, @in={0x2, 0x0, @private}, @l2={0x1f, 0x0, @none}, @in={0x2, 0x0, @private=0xa010101}}) 16:51:29 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = open(&(0x7f0000000180)='./bus\x00', 0x151042, 0x0) r4 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(r3, r4, 0x0, 0x4000000000010046) 16:51:29 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x11000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f2, &(0x7f0000000000)='ip6gre0\x00') socket$kcm(0x29, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000001f40)={&(0x7f0000001f00)='./file0\x00'}, 0x10) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000040)='devices.allow\x00', 0x2, 0x0) 16:51:29 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000004c0)={0x0, 0x76, 0xfa00, {0x0, &(0x7f0000000040)}}, 0x20) 16:51:29 executing program 2: r0 = socket(0x23, 0x2, 0x0) bind$isdn(r0, 0x0, 0x0) 16:51:29 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000140)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x11000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={0x1, 0x28, &(0x7f0000000240)}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) 16:51:29 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000001300)='net/igmp\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f00000000c0)={0x0, {{0x2, 0x0, @multicast2}}}, 0x88) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_open_pts(r2, 0x2) sendfile(r5, r0, 0x0, 0x6f0a77bd) 16:51:29 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = open(&(0x7f0000000180)='./bus\x00', 0x151042, 0x0) r4 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(r3, r4, 0x0, 0x4000000000010046) 16:51:29 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendto(r0, &(0x7f0000000000)='\aG!R', 0x4, 0x0, &(0x7f0000000340)=@l2tp6={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x80) 16:51:29 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000d4f4655fd4f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000b8c5c4d1b3cf4b38ab2e2967fb770ff3010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011500)="ed41000000080000d4f4655fd4f4655fd4f4655f00000000000004004000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x2080}, {&(0x7f0000011800)="ed41000000080000d4f4655fd4f4655fd4f4655f0000000000000200400000000000daf12dbc00000af301000400000000000000000000000100000050", 0x3d, 0x2580}, {&(0x7f0000011b00)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c6530", 0x39, 0x8000}, {&(0x7f0000012400)="504d4d00504d4dff", 0x8, 0x20000}], 0x0, &(0x7f0000000140)=ANY=[]) lstat(&(0x7f0000000240)='./file0/file0\x00', &(0x7f00000002c0)) 16:51:29 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000140)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x11000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={0x1, 0x28, &(0x7f0000000240)}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) 16:51:29 executing program 0: syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000004001000000c", 0x15, 0x8000}, {&(0x7f0000000340)="10c4645f010000000100000001040000040000000b0000000020000000000000020000000000000073e8f48f7c01b7ede68fff20a64e7034607920b4b873599ebc4e53c011c8e11099f2f8afb940812e6831e117eba538ac86f64af4e795366fe29fa8015fd8d6b3832ecc366c4b1aa71e0c0f0fcf7450179093a36402a651502c132af37257216752943eacf53978815af432432d70", 0x96, 0xb200}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:51:29 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000140)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x11000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={0x1, 0x28, &(0x7f0000000240)}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) 16:51:29 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x11000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f2, &(0x7f0000000000)='ip6gre0\x00') socket$kcm(0x29, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000001f40)={&(0x7f0000001f00)='./file0\x00'}, 0x10) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000040)='devices.allow\x00', 0x2, 0x0) 16:51:29 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = open(&(0x7f0000000180)='./bus\x00', 0x151042, 0x0) r4 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(r3, r4, 0x0, 0x4000000000010046) [ 162.793887] ERROR: (device loop0): xtSearch: XT_GETPAGE: xtree page corrupt [ 162.793887] 16:51:29 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000001300)='net/igmp\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f00000000c0)={0x0, {{0x2, 0x0, @multicast2}}}, 0x88) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_open_pts(r2, 0x2) sendfile(r5, r0, 0x0, 0x6f0a77bd) 16:51:29 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000140)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x11000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={0x1, 0x28, &(0x7f0000000240)}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) 16:51:29 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) open(&(0x7f0000000180)='./bus\x00', 0x151042, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/crypto\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r3, 0x0, 0x4000000000010046) 16:51:29 executing program 2: r0 = socket(0x2b, 0x1, 0x0) sendmsg$IPVS_CMD_DEL_DAEMON(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x14}, 0x14}}, 0xfc39511a3dc111de) [ 162.843864] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 162.869237] ERROR: (device loop0): xtSearch: XT_GETPAGE: xtree page corrupt [ 162.869237] 16:51:29 executing program 0: syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000004001000000c", 0x15, 0x8000}, {&(0x7f0000000340)="10c4645f010000000100000001040000040000000b0000000020000000000000020000000000000073e8f48f7c01b7ede68fff20a64e7034607920b4b873599ebc4e53c011c8e11099f2f8afb940812e6831e117eba538ac86f64af4e795366fe29fa8015fd8d6b3832ecc366c4b1aa71e0c0f0fcf7450179093a36402a651502c132af37257216752943eacf53978815af432432d70", 0x96, 0xb200}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:51:29 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000001300)='net/igmp\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f00000000c0)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_open_pts(r2, 0x2) sendfile(r5, r0, 0x0, 0x6f0a77bd) 16:51:29 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_mreqn(r0, 0x0, 0x19, 0x0, &(0x7f0000000040)) 16:51:29 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000140)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x11000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={0x1, 0x28, &(0x7f0000000240)}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) 16:51:30 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100), 0x4}, 0x11000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f2, &(0x7f0000000000)='ip6gre0\x00') socket$kcm(0x29, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000001f40)={&(0x7f0000001f00)='./file0\x00'}, 0x10) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000040)='devices.allow\x00', 0x2, 0x0) 16:51:30 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000001300)='net/igmp\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f00000000c0)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_open_pts(r2, 0x2) sendfile(r5, r0, 0x0, 0x6f0a77bd) 16:51:30 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) open(&(0x7f0000000180)='./bus\x00', 0x151042, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/crypto\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r3, 0x0, 0x4000000000010046) [ 163.114520] ERROR: (device loop0): xtSearch: XT_GETPAGE: xtree page corrupt [ 163.114520] 16:51:30 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000140)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x11000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={0x1, 0x28, &(0x7f0000000240)}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) 16:51:30 executing program 2: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f00000022c0)={0x2020}, 0x2020) 16:51:30 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) open(&(0x7f0000000180)='./bus\x00', 0x151042, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/crypto\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r3, 0x0, 0x4000000000010046) 16:51:30 executing program 0: syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000004001000000c", 0x15, 0x8000}, {&(0x7f0000000340)="10c4645f010000000100000001040000040000000b0000000020000000000000020000000000000073e8f48f7c01b7ede68fff20a64e7034607920b4b873599ebc4e53c011c8e11099f2f8afb940812e6831e117eba538ac86f64af4e795366fe29fa8015fd8d6b3832ecc366c4b1aa71e0c0f0fcf7450179093a36402a651502c132af37257216752943eacf53978815af432432d70", 0x96, 0xb200}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:51:30 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000001300)='net/igmp\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f00000000c0)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_open_pts(r2, 0x2) sendfile(r5, r0, 0x0, 0x6f0a77bd) 16:51:30 executing program 2: r0 = socket(0x11, 0x800000003, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000180)={'syztnl1\x00', &(0x7f0000000040)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) 16:51:30 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100), 0x4}, 0x11000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f2, &(0x7f0000000000)='ip6gre0\x00') socket$kcm(0x29, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000001f40)={&(0x7f0000001f00)='./file0\x00'}, 0x10) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000040)='devices.allow\x00', 0x2, 0x0) 16:51:30 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000140)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x11000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x0, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={0x1, 0x28, &(0x7f0000000240)}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) 16:51:30 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = open(&(0x7f0000000180)='./bus\x00', 0x151042, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/crypto\x00', 0x0, 0x0) sendfile(r3, 0xffffffffffffffff, 0x0, 0x4000000000010046) 16:51:30 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000001300)='net/igmp\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f00000000c0)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_open_pts(r2, 0x2) sendfile(r5, r0, 0x0, 0x6f0a77bd) [ 163.343140] ERROR: (device loop0): xtSearch: XT_GETPAGE: xtree page corrupt [ 163.343140] 16:51:30 executing program 0: syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000004001000000c", 0x15, 0x8000}, {&(0x7f0000000340)="10c4645f010000000100000001040000040000000b0000000020000000000000020000000000000073e8f48f7c01b7ede68fff20a64e7034607920b4b873599ebc4e53c011c8e11099f2f8afb940812e6831e117eba538ac86f64af4e795366fe29fa8015fd8d6b3832ecc366c4b1aa71e0c0f0fcf7450179093a36402a651502c132af37257216752943eacf53978815af432432d70", 0x96, 0xb200}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:51:30 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = open(&(0x7f0000000180)='./bus\x00', 0x151042, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/crypto\x00', 0x0, 0x0) sendfile(r3, 0xffffffffffffffff, 0x0, 0x4000000000010046) 16:51:30 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000140)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x11000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x0, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={0x1, 0x28, &(0x7f0000000240)}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) 16:51:30 executing program 2: renameat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, 0x0) 16:51:30 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100), 0x4}, 0x11000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f2, &(0x7f0000000000)='ip6gre0\x00') socket$kcm(0x29, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000001f40)={&(0x7f0000001f00)='./file0\x00'}, 0x10) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000040)='devices.allow\x00', 0x2, 0x0) 16:51:30 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000001300)='net/igmp\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f00000000c0)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_open_pts(r2, 0x2) sendfile(r5, r0, 0x0, 0x6f0a77bd) [ 163.625112] ERROR: (device loop0): xtSearch: XT_GETPAGE: xtree page corrupt [ 163.625112] 16:51:30 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000140)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x11000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x0, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={0x1, 0x28, &(0x7f0000000240)}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) 16:51:30 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = open(&(0x7f0000000180)='./bus\x00', 0x151042, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/crypto\x00', 0x0, 0x0) sendfile(r3, 0xffffffffffffffff, 0x0, 0x4000000000010046) 16:51:30 executing program 2: r0 = socket(0x25, 0x1, 0x0) setsockopt$XDP_TX_RING(r0, 0x11b, 0x3, 0x0, 0x0) 16:51:30 executing program 0: syz_mount_image$jfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000004001000000c", 0x15, 0x8000}, {&(0x7f0000000340)="10c4645f010000000100000001040000040000000b0000000020000000000000020000000000000073e8f48f7c01b7ede68fff20a64e7034607920b4b873599ebc4e53c011c8e11099f2f8afb940812e6831e117eba538ac86f64af4e795366fe29fa8015fd8d6b3832ecc366c4b1aa71e0c0f0fcf7450179093a36402a651502c132af37257216752943eacf53978815af432432d70", 0x96, 0xb200}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:51:30 executing program 2: keyctl$update(0x2, 0x0, &(0x7f0000001700)="c4", 0x1) 16:51:30 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000140)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x11000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x0, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={0x1, 0x28, &(0x7f0000000240)}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) 16:51:30 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000001300)='net/igmp\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f00000000c0)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_open_pts(r2, 0x2) sendfile(r5, r0, 0x0, 0x6f0a77bd) 16:51:30 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = open(&(0x7f0000000180)='./bus\x00', 0x151042, 0x0) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/crypto\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x0) 16:51:30 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x4}, 0x11000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f2, &(0x7f0000000000)='ip6gre0\x00') socket$kcm(0x29, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000001f40)={&(0x7f0000001f00)='./file0\x00'}, 0x10) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000040)='devices.allow\x00', 0x2, 0x0) 16:51:30 executing program 0: syz_mount_image$jfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000004001000000c", 0x15, 0x8000}, {&(0x7f0000000340)="10c4645f010000000100000001040000040000000b0000000020000000000000020000000000000073e8f48f7c01b7ede68fff20a64e7034607920b4b873599ebc4e53c011c8e11099f2f8afb940812e6831e117eba538ac86f64af4e795366fe29fa8015fd8d6b3832ecc366c4b1aa71e0c0f0fcf7450179093a36402a651502c132af37257216752943eacf53978815af432432d70", 0x96, 0xb200}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:51:30 executing program 2: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_AVC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001300)={0x7ffff000}, 0x10}}, 0x0) 16:51:30 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000140)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x11000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x0, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={0x1, 0x28, &(0x7f0000000240)}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) 16:51:30 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000001300)='net/igmp\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f00000000c0)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_open_pts(r2, 0x2) sendfile(r5, r0, 0x0, 0x6f0a77bd) 16:51:31 executing program 0: syz_mount_image$jfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000004001000000c", 0x15, 0x8000}, {&(0x7f0000000340)="10c4645f010000000100000001040000040000000b0000000020000000000000020000000000000073e8f48f7c01b7ede68fff20a64e7034607920b4b873599ebc4e53c011c8e11099f2f8afb940812e6831e117eba538ac86f64af4e795366fe29fa8015fd8d6b3832ecc366c4b1aa71e0c0f0fcf7450179093a36402a651502c132af37257216752943eacf53978815af432432d70", 0x96, 0xb200}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:51:31 executing program 2: io_setup(0x10000, &(0x7f0000000180)=0x0) io_destroy(r0) 16:51:31 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000140)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x11000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x0, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={0x1, 0x28, &(0x7f0000000240)}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) 16:51:31 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000001300)='net/igmp\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f00000000c0)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_open_pts(r2, 0x2) sendfile(r5, r0, 0x0, 0x6f0a77bd) 16:51:31 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = open(&(0x7f0000000180)='./bus\x00', 0x151042, 0x0) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/crypto\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x0) 16:51:31 executing program 0: syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', 0x0, 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000004001000000c", 0x15, 0x8000}, {&(0x7f0000000340)="10c4645f010000000100000001040000040000000b0000000020000000000000020000000000000073e8f48f7c01b7ede68fff20a64e7034607920b4b873599ebc4e53c011c8e11099f2f8afb940812e6831e117eba538ac86f64af4e795366fe29fa8015fd8d6b3832ecc366c4b1aa71e0c0f0fcf7450179093a36402a651502c132af37257216752943eacf53978815af432432d70", 0x96, 0xb200}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:51:31 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = open(&(0x7f0000000180)='./bus\x00', 0x151042, 0x0) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/crypto\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x0) 16:51:31 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000001300)='net/igmp\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f00000000c0)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_open_pts(r2, 0x2) sendfile(r5, r0, 0x0, 0x6f0a77bd) 16:51:31 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x4}, 0x11000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f2, &(0x7f0000000000)='ip6gre0\x00') socket$kcm(0x29, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000001f40)={&(0x7f0000001f00)='./file0\x00'}, 0x10) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000040)='devices.allow\x00', 0x2, 0x0) 16:51:31 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000140)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x11000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2000000003, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={0x1, 0x28, &(0x7f0000000240)}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) 16:51:31 executing program 2: r0 = syz_open_dev$binderN(&(0x7f0000000080)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000400)={0x8, 0x0, &(0x7f0000000240)=[@acquire], 0x2, 0x0, 0x0}) 16:51:31 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000140)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x11000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2000000003, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={0x1, 0x28, &(0x7f0000000240)}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) 16:51:31 executing program 0: syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', 0x0, 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000004001000000c", 0x15, 0x8000}, {&(0x7f0000000340)="10c4645f010000000100000001040000040000000b0000000020000000000000020000000000000073e8f48f7c01b7ede68fff20a64e7034607920b4b873599ebc4e53c011c8e11099f2f8afb940812e6831e117eba538ac86f64af4e795366fe29fa8015fd8d6b3832ecc366c4b1aa71e0c0f0fcf7450179093a36402a651502c132af37257216752943eacf53978815af432432d70", 0x96, 0xb200}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:51:31 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000140)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x11000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2000000003, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={0x1, 0x28, &(0x7f0000000240)}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) [ 164.630056] binder: 12870:12873 ioctl c0306201 20000400 returned -14 16:51:31 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 16:51:31 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000001300)='net/igmp\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f00000000c0)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_open_pts(r2, 0x2) sendfile(r5, r0, 0x0, 0x6f0a77bd) 16:51:31 executing program 3: syz_open_dev$rtc(&(0x7f0000000000)='/dev/rtc#\x00', 0x7fffffff, 0x0) 16:51:31 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000140)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x11000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) 16:51:31 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x4}, 0x11000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f2, &(0x7f0000000000)='ip6gre0\x00') socket$kcm(0x29, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000001f40)={&(0x7f0000001f00)='./file0\x00'}, 0x10) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000040)='devices.allow\x00', 0x2, 0x0) 16:51:31 executing program 0: syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', 0x0, 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000004001000000c", 0x15, 0x8000}, {&(0x7f0000000340)="10c4645f010000000100000001040000040000000b0000000020000000000000020000000000000073e8f48f7c01b7ede68fff20a64e7034607920b4b873599ebc4e53c011c8e11099f2f8afb940812e6831e117eba538ac86f64af4e795366fe29fa8015fd8d6b3832ecc366c4b1aa71e0c0f0fcf7450179093a36402a651502c132af37257216752943eacf53978815af432432d70", 0x96, 0xb200}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:51:31 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000140)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x11000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) 16:51:31 executing program 2: r0 = socket(0x2a, 0x2, 0x0) getsockname(r0, 0x0, &(0x7f0000000140)) 16:51:31 executing program 3: r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/adsp1\x00', 0x0, 0x0) ioctl$SOUND_MIXER_READ_VOLUME(r0, 0x541b, 0x0) 16:51:31 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000001300)='net/igmp\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f00000000c0)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_open_pts(r2, 0x2) sendfile(r5, r0, 0x0, 0x6f0a77bd) 16:51:31 executing program 0: syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[]) 16:51:31 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000140)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x11000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) 16:51:31 executing program 2: r0 = socket(0x23, 0x5, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, 0x0, 0x0) 16:51:32 executing program 0: syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[]) 16:51:32 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100)}, 0x11000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f2, &(0x7f0000000000)='ip6gre0\x00') socket$kcm(0x29, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000001f40)={&(0x7f0000001f00)='./file0\x00'}, 0x10) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000040)='devices.allow\x00', 0x2, 0x0) 16:51:32 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, 0x0, &(0x7f0000000280)) 16:51:32 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000001300)='net/igmp\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f00000000c0)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_open_pts(r2, 0x2) sendfile(r5, r0, 0x0, 0x6f0a77bd) 16:51:32 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000140)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x11000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={0x1, 0x0, 0x0}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) 16:51:32 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, 0x0) 16:51:32 executing program 2: syz_mount_image$xfs(&(0x7f0000000780)='xfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000001d80), 0x8045, &(0x7f0000001f40)={[{@pquota='pquota'}, {@sysvgroups='sysvgroups'}, {@uqnoenforce='uqnoenforce'}, {@nolargeio='nolargeio'}, {@inode32='inode32'}, {@swalloc='swalloc'}], [{@dont_measure='dont_measure'}]}) 16:51:32 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000023c0)=[@text32={0x20, 0x0}], 0x1, 0x0, 0x0, 0xffffffffffffff91) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f0000000140)="b9800000c03500400000665c0f5d0202f5fbfb20e00f074b064000c463576522f766470fc774a6a6f30fbcf726660f388077694f4f0f5c19db3a9af342d8868680000066b82001c4220d2d4f5d40d8ff66ba2000ed", 0x55}], 0x1, 0x58, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fdd000/0x18000)=nil, &(0x7f00000001c0)=[@text16={0x10, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 16:51:32 executing program 0: syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[]) 16:51:32 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000140)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x11000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={0x1, 0x0, 0x0}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) 16:51:32 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000001300)='net/igmp\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f00000000c0)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) socketpair$unix(0x1, 0x5, 0x0, 0x0) r3 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_open_pts(r2, 0x2) sendfile(r4, r0, 0x0, 0x6f0a77bd) 16:51:32 executing program 0: syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000004001000000c", 0x15, 0x8000}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:51:32 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100)}, 0x11000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f2, &(0x7f0000000000)='ip6gre0\x00') socket$kcm(0x29, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000001f40)={&(0x7f0000001f00)='./file0\x00'}, 0x10) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000040)='devices.allow\x00', 0x2, 0x0) [ 165.362436] XFS (loop2): unknown mount option [dont_measure]. 16:51:32 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000140)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x11000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={0x1, 0x0, 0x0}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) [ 165.457059] XFS (loop2): unknown mount option [dont_measure]. 16:51:32 executing program 3: r0 = socket(0xa, 0x2, 0x0) getsockopt$MISDN_TIME_STAMP(r0, 0x11, 0x1, 0x0, 0x0) 16:51:32 executing program 0: syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000004001000000c", 0x15, 0x8000}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:51:32 executing program 2: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r1, &(0x7f00000005c0)={0x67446698, 0x0, 0x0, 0x0, 0x0, "1d"}, 0x11) read$FUSE(r0, &(0x7f0000001600)={0x2020}, 0x10) 16:51:32 executing program 3: r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000240)={0x0, 0x9, 0x1, {0xb, @pix={0x0, 0x1f}}}) ioctl$VIDIOC_EXPBUF(r0, 0xc0405610, &(0x7f0000000000)={0xb, 0x0, 0x0, 0x0, 0xffffffffffffffff}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r1, 0x40086200, 0x0) 16:51:32 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000001300)='net/igmp\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f00000000c0)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) socketpair$unix(0x1, 0x5, 0x0, 0x0) r3 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_open_pts(r2, 0x2) sendfile(r4, r0, 0x0, 0x6f0a77bd) 16:51:32 executing program 2: r0 = add_key(&(0x7f00000004c0)='id_resolver\x00', &(0x7f0000000500)={'syz', 0x3}, &(0x7f0000000680)=';', 0x1, 0xfffffffffffffffc) keyctl$get_security(0x11, r0, 0x0, 0x0) 16:51:32 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100)}, 0x11000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f2, &(0x7f0000000000)='ip6gre0\x00') socket$kcm(0x29, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000001f40)={&(0x7f0000001f00)='./file0\x00'}, 0x10) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000040)='devices.allow\x00', 0x2, 0x0) 16:51:32 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000140)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x11000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={0x1, 0x28, &(0x7f0000000240)}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) 16:51:32 executing program 3: r0 = socket(0x2b, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8906, 0x0) 16:51:32 executing program 0: syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000004001000000c", 0x15, 0x8000}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:51:32 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_buf(r0, 0x0, 0x30, 0x0, &(0x7f0000000100)) 16:51:32 executing program 2: r0 = request_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)='*[),-\x00', 0xfffffffffffffffe) r1 = request_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x1}, &(0x7f0000000140)='\x00', r0) request_key(&(0x7f0000000340)='asymmetric\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000240)='\x00', r1) 16:51:32 executing program 3: r0 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000002100)='/dev/nvme-fabrics\x00', 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) 16:51:32 executing program 0: syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000004001000000c", 0x15, 0x8000}, {0x0, 0x0, 0xb200}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:51:32 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000440)='SEG6\x00') sendmsg$SEG6_CMD_SET_TUNSRC(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000001c0)={0x28, r1, 0x201, 0x0, 0x0, {}, [@SEG6_ATTR_DST={0x14, 0x8, @remote}]}, 0x28}}, 0x0) 16:51:32 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100)}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f2, &(0x7f0000000000)='ip6gre0\x00') socket$kcm(0x29, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000001f40)={&(0x7f0000001f00)='./file0\x00'}, 0x10) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000040)='devices.allow\x00', 0x2, 0x0) 16:51:32 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000001300)='net/igmp\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f00000000c0)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) socketpair$unix(0x1, 0x5, 0x0, 0x0) r3 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_open_pts(r2, 0x2) sendfile(r4, r0, 0x0, 0x6f0a77bd) 16:51:32 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000140)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x11000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={0x1, 0x28, &(0x7f0000000240)}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) 16:51:32 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)=@RTM_NEWNSID={0x1c, 0x58, 0x1, 0x0, 0x0, {}, [@NETNSA_NSID={0x8, 0x1, 0x4}]}, 0x1c}}, 0x0) 16:51:32 executing program 3: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendto(r0, &(0x7f0000000280)='bG', 0x2, 0x4000000, &(0x7f0000000340)=@l2tp6={0xa, 0x0, 0x0, @dev}, 0x80) [ 166.040851] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. 16:51:33 executing program 0: syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000004001000000c", 0x15, 0x8000}, {0x0, 0x0, 0xb200}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:51:33 executing program 2: r0 = socket$l2tp(0x2, 0x2, 0x73) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc0c89425, &(0x7f0000001240)={"f4da782e09d54e3a0e22f4ded6239a5c"}) 16:51:33 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000140)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x11000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={0x1, 0x28, &(0x7f0000000240)}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) 16:51:33 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000001300)='net/igmp\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f00000000c0)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r3 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_open_pts(r2, 0x2) sendfile(r4, r0, 0x0, 0x6f0a77bd) 16:51:33 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8906, 0x0) 16:51:33 executing program 0: syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000004001000000c", 0x15, 0x8000}, {0x0, 0x0, 0xb200}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:51:33 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100)}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f2, &(0x7f0000000000)='ip6gre0\x00') socket$kcm(0x29, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000001f40)={&(0x7f0000001f00)='./file0\x00'}, 0x10) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000040)='devices.allow\x00', 0x2, 0x0) 16:51:33 executing program 3: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000001000)='/dev/rfkill\x00', 0x0, 0x0) write$rfkill(r0, 0x0, 0x0) 16:51:33 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={0x0, 0xffffff7f}}, 0x0) 16:51:33 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000140)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x11000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={0x1, 0x28, &(0x7f0000000240)}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) 16:51:33 executing program 3: syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x2, 0x4040) 16:51:33 executing program 0: syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000004001000000c", 0x15, 0x8000}, {&(0x7f0000000340), 0x0, 0xb200}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:51:33 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x9, 0x1, 0x0, 0x3}, 0x40) 16:51:33 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000001300)='net/igmp\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f00000000c0)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r3 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_open_pts(r2, 0x2) sendfile(r4, r0, 0x0, 0x6f0a77bd) 16:51:33 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000140)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x11000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={0x1, 0x28, &(0x7f0000000240)}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) 16:51:33 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100)}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f2, &(0x7f0000000000)='ip6gre0\x00') socket$kcm(0x29, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000001f40)={&(0x7f0000001f00)='./file0\x00'}, 0x10) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000040)='devices.allow\x00', 0x2, 0x0) 16:51:33 executing program 3: r0 = syz_usbip_server_init(0x0) write$usbip_server(r0, &(0x7f0000000000)=@ret_unlink, 0x30) 16:51:33 executing program 2: add_key$keyring(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000400)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) 16:51:33 executing program 0: syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000004001000000c", 0x15, 0x8000}, {&(0x7f0000000340), 0x0, 0xb200}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:51:33 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000140)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x11000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={0x1, 0x28, &(0x7f0000000240)}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) 16:51:33 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000001300)='net/igmp\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f00000000c0)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r3 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_open_pts(r2, 0x2) sendfile(r4, r0, 0x0, 0x6f0a77bd) [ 166.648978] vhci_hcd: Failed attach request for unsupported USB speed: UNKNOWN 16:51:33 executing program 0: syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000004001000000c", 0x15, 0x8000}, {&(0x7f0000000340), 0x0, 0xb200}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:51:33 executing program 2: syz_read_part_table(0x0, 0x2, &(0x7f0000001380)=[{0x0, 0x0, 0x51f}, {&(0x7f0000000240)="bdfcb769f2108d0fa2ec88f62be6fc56f8cd8664f8edb0cf047e849c5c06f2af65855c4babc09706cfd6fe404416f41d6adfca4572eed8025e7a88ef0f390a2cdb386b9dd9bd6dc3f2442d2cad678f60e2234f980d2c7c8b639dda20c9dae81ca1ea9ff37c24d7c770a63aeb5303a1135c1ade8e88c401d6556e1abd5979567a0f763fc8e86db46ac911a05fb3d14fe41387134db0b872a8e570199cc579e96bcab682caa7ad706330f2ed98bc0470d98b8122c686934547152ed89a727c74dfc1e2d2df474912ab3ae902ec15368ae98fee3acee03943e9edd3760be471fb53979be8ba1dc2d8f4bb963cf740876020291c035d8b0adb0f6ecebfa7192775cfa2c962d845e97e9fb535d5d0189539ab65e61eefd4d4cf576f2a2dacaf2bcba1c0d9b37ffa2e910a2bf8686e4271080e4702997bdc4117878f09d9f3f17579484dbd02510a3b87aa20ded9c6ec2b2cca980a797ea6c85e352c794cd1a94877c2d8a586c5ce5938495f300c28661459ad56a4152c8dfcd633d5766d788c658d16ca1106eca7a43f5350c9acfa532c4657a4ff0fae032b50438b4739bd5a7708c108d1769947014c999f1b86c95a7bc28393b1de61ef5feb02a62210d83046dd8071bcf9a570f71b74362302dbe66ec16816a73854b38d04c225b1b68f63fb42761f56740c7a1c1cb339fb556b57", 0x1ed, 0x1}]) 16:51:33 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100)}, 0x11000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f2, &(0x7f0000000000)='ip6gre0\x00') socket$kcm(0x29, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000001f40)={&(0x7f0000001f00)='./file0\x00'}, 0x10) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000040)='devices.allow\x00', 0x2, 0x0) 16:51:33 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000001300)='net/igmp\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f00000000c0)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r4 = syz_open_pts(r2, 0x2) sendfile(r4, r0, 0x0, 0x6f0a77bd) 16:51:33 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000140)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x11000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={0x1, 0x28, &(0x7f0000000240)}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) [ 166.878200] Dev loop2: unable to read RDB block 5 [ 166.885016] loop2: AHDI p1 p2 p3 p4 [ 166.890644] loop2: partition table partially beyond EOD, truncated [ 166.899468] loop2: p1 start 587389926 is beyond EOD, truncated [ 166.906203] loop2: p2 start 2365899301 is beyond EOD, truncated [ 166.914007] loop2: p3 start 1450445946 is beyond EOD, truncated 16:51:33 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000140)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x11000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={0x1, 0x28, &(0x7f0000000240)}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) 16:51:33 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000001300)='net/igmp\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f00000000c0)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r4 = syz_open_pts(r2, 0x2) sendfile(r4, r0, 0x0, 0x6f0a77bd) 16:51:34 executing program 3: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) ioctl$NBD_SET_SIZE_BLOCKS(r0, 0xc0481273, 0x0) 16:51:34 executing program 0: syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000004001000000c", 0x15, 0x8000}, {&(0x7f0000000340)="10c4645f010000000100000001040000040000000b0000000020000000000000020000000000000073e8f48f7c01b7ede68fff20a64e7034607920b4b873599ebc4e53c011c8e11099f2f8", 0x4b, 0xb200}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:51:34 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100)}, 0x11000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f2, &(0x7f0000000000)='ip6gre0\x00') socket$kcm(0x29, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000001f40)={&(0x7f0000001f00)='./file0\x00'}, 0x10) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000040)='devices.allow\x00', 0x2, 0x0) 16:51:34 executing program 2: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_mreqn(r0, 0x0, 0x3, 0x0, &(0x7f0000000100)) 16:51:34 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000001300)='net/igmp\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f00000000c0)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r4 = syz_open_pts(r2, 0x2) sendfile(r4, r0, 0x0, 0x6f0a77bd) 16:51:34 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000140)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x11000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={0x1, 0x28, &(0x7f0000000240)}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) [ 167.187750] vhci_hcd: Failed attach request for unsupported USB speed: UNKNOWN 16:51:34 executing program 2: r0 = socket$l2tp(0x2, 0x2, 0x73) sendmmsg$sock(r0, &(0x7f0000001ac0)=[{{&(0x7f00000001c0)=@l2tp6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, 0x80, 0x0, 0x500}}], 0x1, 0x0) [ 167.293319] ERROR: (device loop0): xtSearch: XT_GETPAGE: xtree page corrupt [ 167.293319] 16:51:34 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000140)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x11000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={0x1, 0x28, &(0x7f0000000240)}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) 16:51:34 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x70, 0x0, &(0x7f0000000040)) 16:51:34 executing program 0: syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000004001000000c", 0x15, 0x8000}, {&(0x7f0000000340)="10c4645f010000000100000001040000040000000b0000000020000000000000020000000000000073e8f48f7c01b7ede68fff20a64e7034607920b4b873599ebc4e53c011c8e11099f2f8", 0x4b, 0xb200}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:51:34 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000001300)='net/igmp\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f00000000c0)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x0) r5 = syz_open_pts(r2, 0x2) sendfile(r5, r0, 0x0, 0x6f0a77bd) 16:51:34 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100)}, 0x11000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f2, &(0x7f0000000000)='ip6gre0\x00') socket$kcm(0x29, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000001f40)={&(0x7f0000001f00)='./file0\x00'}, 0x10) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000040)='devices.allow\x00', 0x2, 0x0) 16:51:34 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000002400)={0x0, 0x0, &(0x7f00000023c0)={&(0x7f0000002380)=@ipv4_getrule={0x1c}, 0x1c}, 0x300}, 0x0) 16:51:34 executing program 2: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_RD_TIME(r0, 0x80247009, 0x0) 16:51:34 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000140)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x11000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={0x1, 0x28, &(0x7f0000000240)}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) 16:51:34 executing program 3: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000015c0), 0x0, &(0x7f0000003780)) [ 167.558279] ERROR: (device loop0): xtSearch: XT_GETPAGE: xtree page corrupt [ 167.558279] 16:51:34 executing program 2: syz_open_dev$rtc(&(0x7f0000000000)='/dev/rtc#\x00', 0x7fffffff, 0x2) 16:51:34 executing program 0: syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000004001000000c", 0x15, 0x8000}, {&(0x7f0000000340)="10c4645f010000000100000001040000040000000b0000000020000000000000020000000000000073e8f48f7c01b7ede68fff20a64e7034607920b4b873599ebc4e53c011c8e11099f2f8", 0x4b, 0xb200}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:51:34 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000140)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x11000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={0x1, 0x28, &(0x7f0000000240)}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) 16:51:34 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000001300)='net/igmp\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f00000000c0)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x0) r5 = syz_open_pts(r2, 0x2) sendfile(r5, r0, 0x0, 0x6f0a77bd) 16:51:34 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {}]}]}}, &(0x7f0000000180)=""/233, 0x36, 0xe9, 0x1}, 0x20) 16:51:34 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000140)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x11000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={0x1, 0x28, &(0x7f0000000240)}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x0, 0x2000000003, 0x0, &(0x7f00000005c0)) 16:51:34 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100)}, 0x11000, 0x0, 0x0, 0x9}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f2, &(0x7f0000000000)='ip6gre0\x00') socket$kcm(0x29, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000001f40)={&(0x7f0000001f00)='./file0\x00'}, 0x10) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000040)='devices.allow\x00', 0x2, 0x0) 16:51:34 executing program 3: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) ioctl$NBD_SET_SIZE_BLOCKS(r0, 0x127f, 0x0) [ 167.807380] ERROR: (device loop0): xtSearch: XT_GETPAGE: xtree page corrupt [ 167.807380] 16:51:34 executing program 2: r0 = socket(0xa, 0x5, 0x0) sendmmsg$unix(r0, &(0x7f000000cd80)=[{&(0x7f0000000000)=@abs, 0x6e, 0x0, 0x0, &(0x7f0000000740)=[@cred={{0xf, 0x1, 0x2, {0xffffffffffffffff, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c}}], 0x40}], 0x1, 0x0) 16:51:34 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000140)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x11000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={0x1, 0x28, &(0x7f0000000240)}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x0, 0x2000000003, 0x0, &(0x7f00000005c0)) 16:51:34 executing program 3: r0 = socket$inet6_sctp(0xa, 0x3, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x3a, 0x64, 0x0, 0x0) 16:51:34 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000001300)='net/igmp\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f00000000c0)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x0) r5 = syz_open_pts(r2, 0x2) sendfile(r5, r0, 0x0, 0x6f0a77bd) 16:51:34 executing program 0: syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000004001000000c", 0x15, 0x8000}, {&(0x7f0000000340)="10c4645f010000000100000001040000040000000b0000000020000000000000020000000000000073e8f48f7c01b7ede68fff20a64e7034607920b4b873599ebc4e53c011c8e11099f2f8afb940812e6831e117eba538ac86f64af4e795366fe29fa8015fd8d6b3832ecc366c4b1aa71e", 0x71, 0xb200}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:51:34 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x3, 0x0) ioctl$VIDIOC_EXPBUF(r0, 0xc0405610, &(0x7f0000000040)) 16:51:34 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100)}, 0x11000, 0x0, 0x0, 0x9}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f2, &(0x7f0000000000)='ip6gre0\x00') socket$kcm(0x29, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000001f40)={&(0x7f0000001f00)='./file0\x00'}, 0x10) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000040)='devices.allow\x00', 0x2, 0x0) 16:51:34 executing program 3: r0 = socket(0x22, 0x2, 0x1) accept4$packet(r0, 0x0, 0x0, 0x0) 16:51:34 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000140)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x11000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={0x1, 0x28, &(0x7f0000000240)}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x0, 0x2000000003, 0x0, &(0x7f00000005c0)) [ 168.066316] ERROR: (device loop0): xtSearch: XT_GETPAGE: xtree page corrupt [ 168.066316] 16:51:35 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000001300)='net/igmp\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f00000000c0)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_open_pts(0xffffffffffffffff, 0x2) sendfile(r5, r0, 0x0, 0x6f0a77bd) 16:51:35 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f00000001c0)={0xe, 0x18, 0xfa00, @id_tos={&(0x7f0000000000), r1, 0x0, 0x0, 0x1}}, 0x20) 16:51:35 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r3, &(0x7f00000003c0)={0xa, 0x0, 0x0, @mcast2, 0x7}, 0x3e) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000100)='batadv0\x00', 0x10) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x100000, 0x0) 16:51:35 executing program 0: syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000004001000000c", 0x15, 0x8000}, {&(0x7f0000000340)="10c4645f010000000100000001040000040000000b0000000020000000000000020000000000000073e8f48f7c01b7ede68fff20a64e7034607920b4b873599ebc4e53c011c8e11099f2f8afb940812e6831e117eba538ac86f64af4e795366fe29fa8015fd8d6b3832ecc366c4b1aa71e", 0x71, 0xb200}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:51:35 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000001300)='net/igmp\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f00000000c0)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_open_pts(0xffffffffffffffff, 0x2) sendfile(r5, r0, 0x0, 0x6f0a77bd) 16:51:35 executing program 3: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendto(r0, &(0x7f0000000000)='\aG!R', 0x5c4, 0x0, &(0x7f0000000340)=@l2tp6={0xa, 0x0, 0x0, @remote, 0x3}, 0x80) 16:51:35 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100)}, 0x11000, 0x0, 0x0, 0x9}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f2, &(0x7f0000000000)='ip6gre0\x00') socket$kcm(0x29, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000001f40)={&(0x7f0000001f00)='./file0\x00'}, 0x10) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000040)='devices.allow\x00', 0x2, 0x0) [ 168.275931] ERROR: (device loop0): xtSearch: XT_GETPAGE: xtree page corrupt [ 168.275931] 16:51:35 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000140)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x11000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={0x1, 0x28, &(0x7f0000000240)}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x0, 0x0, &(0x7f00000005c0)) 16:51:35 executing program 0: syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000004001000000c", 0x15, 0x8000}, {&(0x7f0000000340)="10c4645f010000000100000001040000040000000b0000000020000000000000020000000000000073e8f48f7c01b7ede68fff20a64e7034607920b4b873599ebc4e53c011c8e11099f2f8afb940812e6831e117eba538ac86f64af4e795366fe29fa8015fd8d6b3832ecc366c4b1aa71e", 0x71, 0xb200}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:51:35 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xa0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 16:51:35 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000001300)='net/igmp\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f00000000c0)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_open_pts(0xffffffffffffffff, 0x2) sendfile(r5, r0, 0x0, 0x6f0a77bd) [ 168.506030] ERROR: (device loop0): xtSearch: XT_GETPAGE: xtree page corrupt [ 168.506030] 16:51:35 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000140)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x11000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={0x1, 0x28, &(0x7f0000000240)}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x0, 0x0, &(0x7f00000005c0)) 16:51:35 executing program 3: r0 = socket(0xa, 0x5, 0x0) sendmmsg$unix(r0, &(0x7f000000cd80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000740)=[@cred={{0x1c, 0x84, 0x5, {0xffffffffffffffff, 0xffffffffffffffff, 0xee00}}}], 0x20}], 0x1, 0x0) 16:51:35 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100)}, 0x11000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f2, &(0x7f0000000000)='ip6gre0\x00') socket$kcm(0x29, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000001f40)={&(0x7f0000001f00)='./file0\x00'}, 0x10) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000040)='devices.allow\x00', 0x2, 0x0) 16:51:35 executing program 2: r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, r0) r2 = add_key(&(0x7f0000000080)='id_resolver\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000002340)='=', 0x1, r1) keyctl$search(0x1d, r2, 0x0, &(0x7f0000002400)={'syz', 0x0}, 0x0) 16:51:35 executing program 0: syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000004001000000c", 0x15, 0x8000}, {&(0x7f0000000340)="10c4645f010000000100000001040000040000000b0000000020000000000000020000000000000073e8f48f7c01b7ede68fff20a64e7034607920b4b873599ebc4e53c011c8e11099f2f8afb940812e6831e117eba538ac86f64af4e795366fe29fa8015fd8d6b3832ecc366c4b1aa71e0c0f0fcf7450179093a36402a651502c132af3", 0x84, 0xb200}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:51:35 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000140)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x11000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={0x1, 0x28, &(0x7f0000000240)}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x0, 0x0, &(0x7f00000005c0)) 16:51:35 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000002280)={0x10, 0x6}, 0x10) 16:51:35 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000001300)='net/igmp\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f00000000c0)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_open_pts(r2, 0x0) sendfile(r5, r0, 0x0, 0x6f0a77bd) 16:51:35 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100)}, 0x11000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f2, &(0x7f0000000000)='ip6gre0\x00') socket$kcm(0x29, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000001f40)={&(0x7f0000001f00)='./file0\x00'}, 0x10) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000040)='devices.allow\x00', 0x2, 0x0) 16:51:36 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000140)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x11000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={0x1, 0x28, &(0x7f0000000240)}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, 0x0) 16:51:36 executing program 2: r0 = socket(0x22, 0x2, 0x1) recvfrom$rxrpc(r0, 0x0, 0x0, 0x40000001, 0x0, 0x0) 16:51:36 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000001300)='net/igmp\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f00000000c0)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_open_pts(r2, 0x0) sendfile(r5, r0, 0x0, 0x6f0a77bd) [ 169.075471] ERROR: (device loop0): xtSearch: XT_GETPAGE: xtree page corrupt [ 169.075471] 16:51:36 executing program 3: keyctl$search(0x5, 0x0, &(0x7f00000023c0)='dns_resolver\x00', 0x0, 0x0) 16:51:36 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100)}, 0x11000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f2, &(0x7f0000000000)='ip6gre0\x00') socket$kcm(0x29, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000001f40)={&(0x7f0000001f00)='./file0\x00'}, 0x10) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000040)='devices.allow\x00', 0x2, 0x0) 16:51:36 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) sendmmsg$nfc_llcp(r0, &(0x7f0000000380)=[{&(0x7f0000000000)={0x27, 0x8, 0x0, 0x0, 0x0, 0x0, "27805fc120fe5127553439627f7578e92a19a9a49ee472e29fe8e19cedb080ba0c05b29ec2bedaa30ed3fd36a6ba3ca97f0f8f5a2f765f374ac40f9671bbf7"}, 0x60, 0x0}], 0x1, 0x0) 16:51:36 executing program 0: syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000004001000000c", 0x15, 0x8000}, {&(0x7f0000000340)="10c4645f010000000100000001040000040000000b0000000020000000000000020000000000000073e8f48f7c01b7ede68fff20a64e7034607920b4b873599ebc4e53c011c8e11099f2f8afb940812e6831e117eba538ac86f64af4e795366fe29fa8015fd8d6b3832ecc366c4b1aa71e0c0f0fcf7450179093a36402a651502c132af3", 0x84, 0xb200}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:51:36 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000140)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x11000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={0x1, 0x28, &(0x7f0000000240)}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, 0x0) 16:51:36 executing program 3: socketpair(0x10, 0x2, 0xfff, &(0x7f00000000c0)) 16:51:36 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000001300)='net/igmp\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f00000000c0)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_open_pts(r2, 0x0) sendfile(r5, r0, 0x0, 0x6f0a77bd) 16:51:36 executing program 2: faccessat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) [ 169.302302] ERROR: (device loop0): xtSearch: XT_GETPAGE: xtree page corrupt [ 169.302302] 16:51:36 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000140)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x11000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={0x1, 0x28, &(0x7f0000000240)}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, 0x0) 16:51:36 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100)}, 0x11000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f2, &(0x7f0000000000)='ip6gre0\x00') socket$kcm(0x29, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000001f40)={&(0x7f0000001f00)='./file0\x00'}, 0x10) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000040)='devices.allow\x00', 0x2, 0x0) 16:51:36 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x1c, r1, 0x1}, 0x1c}}, 0x0) 16:51:36 executing program 0: syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000004001000000c", 0x15, 0x8000}, {&(0x7f0000000340)="10c4645f010000000100000001040000040000000b0000000020000000000000020000000000000073e8f48f7c01b7ede68fff20a64e7034607920b4b873599ebc4e53c011c8e11099f2f8afb940812e6831e117eba538ac86f64af4e795366fe29fa8015fd8d6b3832ecc366c4b1aa71e0c0f0fcf7450179093a36402a651502c132af3", 0x84, 0xb200}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:51:36 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendto(r0, &(0x7f0000000280)='bG', 0x2, 0x0, &(0x7f0000000340)=@l2tp6={0xa, 0x0, 0x0, @dev, 0xdc05}, 0x80) 16:51:36 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000001300)='net/igmp\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f00000000c0)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) syz_open_pts(r2, 0x2) sendfile(0xffffffffffffffff, r0, 0x0, 0x6f0a77bd) 16:51:36 executing program 2: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snd/seq\x00', 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000080)={{0x5}, 'port1\x00'}) [ 169.482171] ERROR: (device loop0): xtSearch: XT_GETPAGE: xtree page corrupt [ 169.482171] 16:51:36 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x21, 0x0, 0x0) 16:51:36 executing program 0: syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000004001000000c", 0x15, 0x8000}, {&(0x7f0000000340)="10c4645f010000000100000001040000040000000b0000000020000000000000020000000000000073e8f48f7c01b7ede68fff20a64e7034607920b4b873599ebc4e53c011c8e11099f2f8afb940812e6831e117eba538ac86f64af4e795366fe29fa8015fd8d6b3832ecc366c4b1aa71e0c0f0fcf7450179093a36402a651502c132af37257216752943eacf5", 0x8d, 0xb200}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:51:36 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100)}, 0x11000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f2, &(0x7f0000000000)='ip6gre0\x00') socket$kcm(0x29, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000001f40)={&(0x7f0000001f00)='./file0\x00'}, 0x10) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000040)='devices.allow\x00', 0x2, 0x0) 16:51:36 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000001300)='net/igmp\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f00000000c0)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) syz_open_pts(r2, 0x2) sendfile(0xffffffffffffffff, r0, 0x0, 0x6f0a77bd) 16:51:36 executing program 1: r0 = socket(0x10, 0x2, 0x0) sendto$netrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 16:51:36 executing program 3: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vfio/vfio\x00', 0x0, 0x0) ioctl$VFIO_GET_API_VERSION(r0, 0x3b64) 16:51:36 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CIPSOV4_C_ADD(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) dup3(r0, r1, 0x0) 16:51:36 executing program 1: r0 = socket(0x2a, 0x2, 0x0) sendmsg$IPCTNL_MSG_CT_GET(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={0x0}}, 0x4000841) 16:51:36 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000001300)='net/igmp\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f00000000c0)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) syz_open_pts(r2, 0x2) sendfile(0xffffffffffffffff, r0, 0x0, 0x6f0a77bd) [ 169.762251] ERROR: (device loop0): xtSearch: XT_GETPAGE: xtree page corrupt [ 169.762251] 16:51:36 executing program 2: prctl$PR_SET_SECUREBITS(0x18, 0xb414afb404c75d80) 16:51:36 executing program 3: r0 = socket(0x23, 0x2, 0x0) accept$unix(r0, 0x0, 0x0) 16:51:36 executing program 0: syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000004001000000c", 0x15, 0x8000}, {&(0x7f0000000340)="10c4645f010000000100000001040000040000000b0000000020000000000000020000000000000073e8f48f7c01b7ede68fff20a64e7034607920b4b873599ebc4e53c011c8e11099f2f8afb940812e6831e117eba538ac86f64af4e795366fe29fa8015fd8d6b3832ecc366c4b1aa71e0c0f0fcf7450179093a36402a651502c132af37257216752943eacf5", 0x8d, 0xb200}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:51:36 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000000)={'team0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @link_local}, 0x10) 16:51:36 executing program 5: syz_open_procfs(0x0, &(0x7f0000001300)='net/igmp\x00') r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f00000000c0)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_open_pts(r1, 0x2) sendfile(r4, 0xffffffffffffffff, 0x0, 0x6f0a77bd) 16:51:36 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100)}, 0x11000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f2, &(0x7f0000000000)='ip6gre0\x00') socket$kcm(0x29, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000001f40)={&(0x7f0000001f00)='./file0\x00'}, 0x10) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000040)='devices.allow\x00', 0x2, 0x0) 16:51:36 executing program 2: r0 = socket(0x2b, 0x1, 0x0) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(r0, 0x84, 0x4, 0x0, 0x0) [ 169.993647] device team0 entered promiscuous mode [ 170.001590] ERROR: (device loop0): xtSearch: XT_GETPAGE: xtree page corrupt [ 170.001590] [ 170.017522] device team_slave_0 entered promiscuous mode [ 170.023781] device team_slave_1 entered promiscuous mode 16:51:36 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000280)={'ip6tnl0\x00', &(0x7f0000000200)={'syztnl0\x00', 0x0, 0x29, 0x0, 0x0, 0x0, 0x0, @empty, @private0}}) [ 170.044337] device team0 left promiscuous mode [ 170.050591] device team_slave_0 left promiscuous mode [ 170.061420] device team_slave_1 left promiscuous mode 16:51:37 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000040)=[@in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4}], 0x1c) 16:51:37 executing program 0: syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000004001000000c", 0x15, 0x8000}, {&(0x7f0000000340)="10c4645f010000000100000001040000040000000b0000000020000000000000020000000000000073e8f48f7c01b7ede68fff20a64e7034607920b4b873599ebc4e53c011c8e11099f2f8afb940812e6831e117eba538ac86f64af4e795366fe29fa8015fd8d6b3832ecc366c4b1aa71e0c0f0fcf7450179093a36402a651502c132af37257216752943eacf5", 0x8d, 0xb200}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 170.183066] device team0 entered promiscuous mode [ 170.188627] device team_slave_0 entered promiscuous mode [ 170.203772] device team_slave_1 entered promiscuous mode 16:51:37 executing program 5: syz_open_procfs(0x0, &(0x7f0000001300)='net/igmp\x00') r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f00000000c0)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_open_pts(r1, 0x2) sendfile(r4, 0xffffffffffffffff, 0x0, 0x6f0a77bd) [ 170.234497] device team0 left promiscuous mode [ 170.239601] device team_slave_0 left promiscuous mode [ 170.252744] device team_slave_1 left promiscuous mode 16:51:37 executing program 3: r0 = socket(0xa, 0x2, 0x0) sendmsg$IPSET_CMD_DEL(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0, 0xcc}}, 0x0) sendmmsg$unix(r0, &(0x7f0000000080)=[{0x0, 0x0, 0x0}], 0x1, 0x0) 16:51:37 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$gtp(&(0x7f00000001c0)='gtp\x00') sendmsg$GTP_CMD_NEWPDP(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000200)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@GTPA_NET_NS_FD={0x8}]}, 0x1c}}, 0x0) 16:51:37 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100)}, 0x11000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x0, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f2, &(0x7f0000000000)='ip6gre0\x00') socket$kcm(0x29, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000001f40)={&(0x7f0000001f00)='./file0\x00'}, 0x10) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000040)='devices.allow\x00', 0x2, 0x0) [ 170.278287] ERROR: (device loop0): xtSearch: XT_GETPAGE: xtree page corrupt [ 170.278287] 16:51:37 executing program 0: syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000004001000000c", 0x15, 0x8000}, {&(0x7f0000000340)="10c4645f010000000100000001040000040000000b0000000020000000000000020000000000000073e8f48f7c01b7ede68fff20a64e7034607920b4b873599ebc4e53c011c8e11099f2f8afb940812e6831e117eba538ac86f64af4e795366fe29fa8015fd8d6b3832ecc366c4b1aa71e0c0f0fcf7450179093a36402a651502c132af37257216752943eacf53978815af4", 0x92, 0xb200}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:51:37 executing program 3: r0 = socket(0x2a, 0x2, 0x0) sendto$packet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) 16:51:37 executing program 5: syz_open_procfs(0x0, &(0x7f0000001300)='net/igmp\x00') r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f00000000c0)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_open_pts(r1, 0x2) sendfile(r4, 0xffffffffffffffff, 0x0, 0x6f0a77bd) 16:51:37 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f00000000c0)=@abs={0x1}, 0x6e) 16:51:37 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100)}, 0x11000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x0, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f2, &(0x7f0000000000)='ip6gre0\x00') socket$kcm(0x29, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000001f40)={&(0x7f0000001f00)='./file0\x00'}, 0x10) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000040)='devices.allow\x00', 0x2, 0x0) [ 170.423829] ERROR: (device loop0): xtSearch: XT_GETPAGE: xtree page corrupt [ 170.423829] 16:51:37 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@ptr]}}, &(0x7f0000000040)=""/233, 0x26, 0xe9, 0x1}, 0xfa) 16:51:37 executing program 2: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) ioctl$NBD_SET_SIZE_BLOCKS(r0, 0x1261, 0x0) 16:51:37 executing program 0: syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000004001000000c", 0x15, 0x8000}, {&(0x7f0000000340)="10c4645f010000000100000001040000040000000b0000000020000000000000020000000000000073e8f48f7c01b7ede68fff20a64e7034607920b4b873599ebc4e53c011c8e11099f2f8afb940812e6831e117eba538ac86f64af4e795366fe29fa8015fd8d6b3832ecc366c4b1aa71e0c0f0fcf7450179093a36402a651502c132af37257216752943eacf53978815af4", 0x92, 0xb200}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:51:37 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000001300)='net/igmp\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f00000000c0)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_open_pts(r2, 0x2) sendfile(r5, r0, 0x0, 0x0) 16:51:37 executing program 3: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/rfkill\x00', 0x1, 0x0) write$rfkill(r0, &(0x7f0000000600)={0x12, 0x0, 0x2}, 0x8) 16:51:37 executing program 1: r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, r0) r2 = add_key(&(0x7f0000000080)='id_resolver\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000002340)='=', 0x1, r1) keyctl$search(0x10, r2, 0x0, 0x0, 0x0) 16:51:37 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100)}, 0x11000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x0, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f2, &(0x7f0000000000)='ip6gre0\x00') socket$kcm(0x29, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000001f40)={&(0x7f0000001f00)='./file0\x00'}, 0x10) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000040)='devices.allow\x00', 0x2, 0x0) 16:51:38 executing program 2: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) ioctl$NBD_SET_SIZE_BLOCKS(r0, 0x401870cc, 0x0) 16:51:38 executing program 3: prctl$PR_SET_SECUREBITS(0x59616d61, 0xdaffffffffffffff) [ 171.060567] ERROR: (device loop0): xtSearch: XT_GETPAGE: xtree page corrupt [ 171.060567] 16:51:38 executing program 1: socketpair(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000980), 0x4) 16:51:38 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000001300)='net/igmp\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f00000000c0)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_open_pts(r2, 0x2) sendfile(r5, r0, 0x0, 0x0) 16:51:38 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100)}, 0x11000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x0, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f2, &(0x7f0000000000)='ip6gre0\x00') socket$kcm(0x29, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000001f40)={&(0x7f0000001f00)='./file0\x00'}, 0x10) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000040)='devices.allow\x00', 0x2, 0x0) 16:51:38 executing program 0: syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000004001000000c", 0x15, 0x8000}, {&(0x7f0000000340)="10c4645f010000000100000001040000040000000b0000000020000000000000020000000000000073e8f48f7c01b7ede68fff20a64e7034607920b4b873599ebc4e53c011c8e11099f2f8afb940812e6831e117eba538ac86f64af4e795366fe29fa8015fd8d6b3832ecc366c4b1aa71e0c0f0fcf7450179093a36402a651502c132af37257216752943eacf53978815af4", 0x92, 0xb200}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:51:38 executing program 2: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 16:51:38 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000400)='/dev/fuse\x00', 0x2, 0x0) write$FUSE_OPEN(r0, 0x0, 0xaa4939ed1771ae5d) [ 171.196546] sctp: [Deprecated]: syz-executor.1 (pid 13612) Use of int in max_burst socket option deprecated. [ 171.196546] Use struct sctp_assoc_value instead 16:51:38 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100)}, 0x11000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x0, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f2, &(0x7f0000000000)='ip6gre0\x00') socket$kcm(0x29, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000001f40)={&(0x7f0000001f00)='./file0\x00'}, 0x10) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000040)='devices.allow\x00', 0x2, 0x0) 16:51:38 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000001300)='net/igmp\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f00000000c0)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_open_pts(r2, 0x2) sendfile(r5, r0, 0x0, 0x0) 16:51:38 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x16, 0x0, 0x2, 0xff5}, 0x40) 16:51:38 executing program 2: socket$inet6_sctp(0xa, 0xdf99b8375d4e98fc, 0x84) [ 171.300761] ERROR: (device loop0): xtSearch: XT_GETPAGE: xtree page corrupt [ 171.300761] [ 171.310881] sctp: [Deprecated]: syz-executor.1 (pid 13623) Use of int in max_burst socket option deprecated. [ 171.310881] Use struct sctp_assoc_value instead 16:51:38 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100)}, 0x11000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x0, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f2, &(0x7f0000000000)='ip6gre0\x00') socket$kcm(0x29, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000001f40)={&(0x7f0000001f00)='./file0\x00'}, 0x10) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000040)='devices.allow\x00', 0x2, 0x0) 16:51:38 executing program 3: r0 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) r1 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000180)={0x8}) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000180)={0x8}) 16:51:38 executing program 1: setuid(0xee00) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) 16:51:38 executing program 0: syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000004001000000c", 0x15, 0x8000}, {&(0x7f0000000340)="10c4645f010000000100000001040000040000000b0000000020000000000000020000000000000073e8f48f7c01b7ede68fff20a64e7034607920b4b873599ebc4e53c011c8e11099f2f8afb940812e6831e117eba538ac86f64af4e795366fe29fa8015fd8d6b3832ecc366c4b1aa71e0c0f0fcf7450179093a36402a651502c132af37257216752943eacf53978815af43243", 0x94, 0xb200}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:51:38 executing program 2: r0 = socket(0x2b, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8942, &(0x7f00000008c0)={'team0\x00'}) 16:51:38 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100)}, 0x11000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2000000003, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f2, &(0x7f0000000000)='ip6gre0\x00') socket$kcm(0x29, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000001f40)={&(0x7f0000001f00)='./file0\x00'}, 0x10) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000040)='devices.allow\x00', 0x2, 0x0) 16:51:38 executing program 3: r0 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) r1 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000180)={0x8}) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000180)={0x8}) 16:51:38 executing program 5: r0 = socket(0x2a, 0x2, 0x0) sendto$packet(r0, 0x0, 0xffff0000, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) 16:51:38 executing program 1: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) ioctl$SOUND_MIXER_READ_VOLUME(r0, 0x4004481e, &(0x7f00000001c0)) [ 171.534786] ERROR: (device loop0): xtSearch: XT_GETPAGE: xtree page corrupt [ 171.534786] 16:51:38 executing program 3: r0 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) r1 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000180)={0x8}) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000180)={0x8}) 16:51:38 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x8, &(0x7f0000000000)=[@in={0x2, 0x0, @empty}], 0x10) 16:51:38 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100)}, 0x11000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2000000003, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f2, &(0x7f0000000000)='ip6gre0\x00') socket$kcm(0x29, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000001f40)={&(0x7f0000001f00)='./file0\x00'}, 0x10) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000040)='devices.allow\x00', 0x2, 0x0) 16:51:38 executing program 0: syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000004001000000c", 0x15, 0x8000}, {&(0x7f0000000340)="10c4645f010000000100000001040000040000000b0000000020000000000000020000000000000073e8f48f7c01b7ede68fff20a64e7034607920b4b873599ebc4e53c011c8e11099f2f8afb940812e6831e117eba538ac86f64af4e795366fe29fa8015fd8d6b3832ecc366c4b1aa71e0c0f0fcf7450179093a36402a651502c132af37257216752943eacf53978815af43243", 0x94, 0xb200}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:51:38 executing program 1: syz_emit_ethernet(0xe, &(0x7f0000000040)={@dev, @broadcast, @void}, 0x0) 16:51:38 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x6, 0x4, 0x2, 0xffffffff, 0x0, 0x1}, 0x40) 16:51:38 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100)}, 0x11000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2000000003, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f2, &(0x7f0000000000)='ip6gre0\x00') socket$kcm(0x29, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000001f40)={&(0x7f0000001f00)='./file0\x00'}, 0x10) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000040)='devices.allow\x00', 0x2, 0x0) 16:51:38 executing program 3: r0 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) r1 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000180)={0x8}) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000180)={0x8}) 16:51:38 executing program 1: syz_mount_image$btrfs(&(0x7f0000001dc0)='btrfs\x00', &(0x7f0000001e00)='./file0\x00', 0x0, 0x0, &(0x7f0000002f00), 0x0, &(0x7f0000002f80)={[{@subvolid={'subvolid'}}]}) 16:51:38 executing program 2: pipe(&(0x7f0000000380)={0xffffffffffffffff}) ioctl$SNDCTL_SEQ_GETTIME(r0, 0x80045113, &(0x7f0000000000)) r1 = socket$packet(0x11, 0x3, 0x300) read$FUSE(0xffffffffffffffff, &(0x7f00000003c0)={0x2020}, 0x2020) ioctl$sock_SIOCDELRT(r1, 0x890b, &(0x7f0000000100)={0x0, @in={0x2, 0x4e22, @loopback}, @sco={0x1f, @none}, @nl=@unspec, 0xfffd, 0x0, 0x0, 0x0, 0x118}) socket$nl_crypto(0x10, 0x3, 0x15) socket$nl_generic(0x10, 0x3, 0x10) 16:51:38 executing program 5: syz_open_dev$usbfs(&(0x7f00000005c0)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0) 16:51:38 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100)}, 0x11000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f2, &(0x7f0000000000)='ip6gre0\x00') socket$kcm(0x29, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000001f40)={&(0x7f0000001f00)='./file0\x00'}, 0x10) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000040)='devices.allow\x00', 0x2, 0x0) 16:51:38 executing program 3: r0 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) creat(&(0x7f00000001c0)='./bus\x00', 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000180)={0x8}) [ 171.815541] ERROR: (device loop0): xtSearch: XT_GETPAGE: xtree page corrupt [ 171.815541] 16:51:38 executing program 2: pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f00000005c0)={0x67446698, 0x0, 0x0, 0x0, 0x0, "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"}, 0x200015c1) 16:51:38 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100)}, 0x11000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f2, &(0x7f0000000000)='ip6gre0\x00') socket$kcm(0x29, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000001f40)={&(0x7f0000001f00)='./file0\x00'}, 0x10) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000040)='devices.allow\x00', 0x2, 0x0) 16:51:38 executing program 0: syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000004001000000c", 0x15, 0x8000}, {&(0x7f0000000340)="10c4645f010000000100000001040000040000000b0000000020000000000000020000000000000073e8f48f7c01b7ede68fff20a64e7034607920b4b873599ebc4e53c011c8e11099f2f8afb940812e6831e117eba538ac86f64af4e795366fe29fa8015fd8d6b3832ecc366c4b1aa71e0c0f0fcf7450179093a36402a651502c132af37257216752943eacf53978815af43243", 0x94, 0xb200}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:51:38 executing program 5: r0 = socket(0x1, 0x5, 0x0) connect$unix(r0, &(0x7f0000000280)=@abs={0x1}, 0x5a) 16:51:38 executing program 3: r0 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) creat(&(0x7f00000001c0)='./bus\x00', 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000180)={0x8}) 16:51:38 executing program 1: lremovexattr(&(0x7f0000002280)='.\x00', &(0x7f00000022c0)=@known='trusted.overlay.redirect\x00') 16:51:38 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100)}, 0x11000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f2, &(0x7f0000000000)='ip6gre0\x00') socket$kcm(0x29, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000001f40)={&(0x7f0000001f00)='./file0\x00'}, 0x10) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000040)='devices.allow\x00', 0x2, 0x0) 16:51:39 executing program 3: r0 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) creat(&(0x7f00000001c0)='./bus\x00', 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000180)={0x8}) 16:51:39 executing program 5: faccessat(0xffffffffffffff9c, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000001180)=[{0x0}], 0x0, &(0x7f00000011c0)={[{@shortname_winnt='shortname=winnt'}, {@rodir='rodir'}, {@shortname_winnt='shortname=winnt'}], [{@smackfsroot={'smackfsroot', 0x3d, 'trusted.overlay.redirect\x00'}}, {@subj_role={'subj_role', 0x3d, ':'}}, {@uid_eq={'uid'}}]}) r0 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000001280)='/dev/ocfs2_control\x00', 0x20000, 0x0) accept(r0, 0x0, &(0x7f0000004100)) [ 172.089931] ERROR: (device loop0): xtSearch: XT_GETPAGE: xtree page corrupt [ 172.089931] 16:51:39 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100)}, 0x11000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f2, &(0x7f0000000000)='ip6gre0\x00') socket$kcm(0x29, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000001f40)={&(0x7f0000001f00)='./file0\x00'}, 0x10) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000040)='devices.allow\x00', 0x2, 0x0) 16:51:39 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@array]}}, &(0x7f0000000040)=""/225, 0x1000000, 0xe1, 0x1}, 0x20) 16:51:39 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100)}, 0x11000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f2, &(0x7f0000000000)='ip6gre0\x00') socket$kcm(0x29, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000001f40)={&(0x7f0000001f00)='./file0\x00'}, 0x10) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000040)='devices.allow\x00', 0x2, 0x0) [ 172.207705] FAT-fs (loop5): Unrecognized mount option "smackfsroot=trusted.overlay.redirect" or missing value 16:51:39 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x82, 0x0, &(0x7f0000000040)) 16:51:39 executing program 3: r0 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000180)={0x8}) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000180)={0x8}) 16:51:39 executing program 0: syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000004001000000c", 0x15, 0x8000}, {&(0x7f0000000340)="10c4645f010000000100000001040000040000000b0000000020000000000000020000000000000073e8f48f7c01b7ede68fff20a64e7034607920b4b873599ebc4e53c011c8e11099f2f8afb940812e6831e117eba538ac86f64af4e795366fe29fa8015fd8d6b3832ecc366c4b1aa71e0c0f0fcf7450179093a36402a651502c132af37257216752943eacf53978815af432432d", 0x95, 0xb200}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:51:39 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@array={0x0, 0x0, 0x0, 0x4}]}}, &(0x7f0000000040)=""/225, 0x32, 0xe1, 0x1}, 0x20) 16:51:39 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100)}, 0x11000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f2, &(0x7f0000000000)='ip6gre0\x00') socket$kcm(0x29, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000001f40)={&(0x7f0000001f00)='./file0\x00'}, 0x10) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000040)='devices.allow\x00', 0x2, 0x0) 16:51:39 executing program 1: socket(0x1a, 0x0, 0x0) 16:51:39 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x13, 0x2, &(0x7f00000001c0)=@raw=[@call, @exit], &(0x7f0000000040)='syzkaller\x00', 0x6, 0x96, &(0x7f0000000240)=""/150, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 16:51:39 executing program 3: r0 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000180)={0x8}) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000180)={0x8}) 16:51:39 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100)}, 0x11000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f2, &(0x7f0000000000)='ip6gre0\x00') socket$kcm(0x29, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000001f40)={&(0x7f0000001f00)='./file0\x00'}, 0x10) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000040)='devices.allow\x00', 0x2, 0x0) 16:51:39 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x11, 0x4, 0x0, 0x4}, 0x40) [ 172.873783] ERROR: (device loop0): xtSearch: XT_GETPAGE: xtree page corrupt [ 172.873783] 16:51:39 executing program 2: getresuid(&(0x7f0000001240), 0x0, 0x0) 16:51:39 executing program 3: r0 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000180)={0x8}) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000180)={0x8}) 16:51:39 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000080)={'batadv_slave_1\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x6, 0x3, &(0x7f0000000080)=@framed, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 16:51:39 executing program 0: syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000004001000000c", 0x15, 0x8000}, {&(0x7f0000000340)="10c4645f010000000100000001040000040000000b0000000020000000000000020000000000000073e8f48f7c01b7ede68fff20a64e7034607920b4b873599ebc4e53c011c8e11099f2f8afb940812e6831e117eba538ac86f64af4e795366fe29fa8015fd8d6b3832ecc366c4b1aa71e0c0f0fcf7450179093a36402a651502c132af37257216752943eacf53978815af432432d", 0x95, 0xb200}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:51:39 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100)}, 0x11000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f2, &(0x7f0000000000)='ip6gre0\x00') socket$kcm(0x29, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000001f40)={&(0x7f0000001f00)='./file0\x00'}, 0x10) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000040)='devices.allow\x00', 0x2, 0x0) 16:51:39 executing program 5: mmap$snddsp_status(&(0x7f0000ffb000/0x3000)=nil, 0x1000, 0x0, 0x53544f1ed0c14637, 0xffffffffffffffff, 0x82000000) 16:51:40 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendto(r0, &(0x7f0000000280)='bG', 0x2, 0x0, &(0x7f0000000340)=@l2tp6={0xa, 0x0, 0x0, @dev={0xfe, 0x17}}, 0x80) [ 173.061200] ERROR: (device loop0): xtSearch: XT_GETPAGE: xtree page corrupt [ 173.061200] 16:51:40 executing program 3: r0 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000180)={0x8}) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000180)={0x8}) 16:51:40 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000000)={'team0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x4, 0x6, @link_local}, 0x10) 16:51:40 executing program 1: r0 = socket(0xa, 0x2, 0x0) connect$rxrpc(r0, &(0x7f0000000000)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}}, 0x24) 16:51:40 executing program 0: syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000004001000000c", 0x15, 0x8000}, {&(0x7f0000000340)="10c4645f010000000100000001040000040000000b0000000020000000000000020000000000000073e8f48f7c01b7ede68fff20a64e7034607920b4b873599ebc4e53c011c8e11099f2f8afb940812e6831e117eba538ac86f64af4e795366fe29fa8015fd8d6b3832ecc366c4b1aa71e0c0f0fcf7450179093a36402a651502c132af37257216752943eacf53978815af432432d", 0x95, 0xb200}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:51:40 executing program 2: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000002280)={0x10, 0x4}, 0x10) 16:51:40 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100)}, 0x11000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f2, &(0x7f0000000000)='ip6gre0\x00') socket$kcm(0x29, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000001f40)={&(0x7f0000001f00)='./file0\x00'}, 0x10) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000040)='devices.allow\x00', 0x2, 0x0) 16:51:40 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000580)={0x0, @in6={{0xa, 0x0, 0x0, @mcast1}}}, &(0x7f0000000640)=0x98) 16:51:40 executing program 1: r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, r0) keyctl$clear(0x7, r0) keyctl$search(0x3, r1, 0x0, 0x0, 0x0) 16:51:40 executing program 3: r0 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000180)={0x8}) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000180)={0x8}) [ 173.266895] ERROR: (device loop0): xtSearch: XT_GETPAGE: xtree page corrupt [ 173.266895] 16:51:40 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) connect$bt_l2cap(r0, &(0x7f00000003c0)={0x1f, 0xed7, @none, 0x0, 0x2}, 0xe) 16:51:40 executing program 5: request_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)='*[),-\x00', 0xfffffffffffffffe) 16:51:40 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100)}, 0x11000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f2, &(0x7f0000000000)='ip6gre0\x00') socket$kcm(0x29, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000001f40)={&(0x7f0000001f00)='./file0\x00'}, 0x10) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000040)='devices.allow\x00', 0x2, 0x0) 16:51:40 executing program 0: syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000004001000000c", 0x15, 0x8000}, {&(0x7f0000000340)="10c4645f010000000100000001040000040000000b0000000020000000000000020000000000000073e8f48f7c01b7ede68fff20a64e7034607920b4b873599ebc4e53c011c8e11099f2f8afb940812e6831e117eba538ac86f64af4e795366fe29fa8015fd8d6b3832ecc366c4b1aa71e0c0f0fcf7450179093a36402a651502c132af37257216752943eacf53978815af432432d70", 0x96}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:51:40 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendto(r0, &(0x7f0000000000)='\aG!R', 0x4, 0x0, &(0x7f0000000340)=@l2tp6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10]}}, 0x80) 16:51:40 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) shutdown(r0, 0x1) connect$bt_l2cap(r0, &(0x7f0000000000)={0x1f, 0x0, @fixed={[], 0x10}}, 0xe) sendmmsg$inet(r0, &(0x7f0000003f00)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2a0}}], 0x500, 0x0) 16:51:40 executing program 3: r0 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000180)={0x8}) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000180)={0x8}) 16:51:40 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_mreqn(r0, 0x0, 0x7, 0x0, &(0x7f0000000040)) 16:51:40 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100)}, 0x11000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f2, &(0x7f0000000000)='ip6gre0\x00') socket$kcm(0x29, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000001f40)={&(0x7f0000001f00)='./file0\x00'}, 0x10) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000040)='devices.allow\x00', 0x2, 0x0) 16:51:40 executing program 2: r0 = syz_open_dev$binderN(&(0x7f0000000180)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x541b, 0x0) 16:51:40 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) shutdown(r0, 0x1) connect$bt_l2cap(r0, &(0x7f0000000000)={0x1f, 0x0, @fixed={[], 0x10}}, 0xe) sendmmsg$inet(r0, &(0x7f0000003f00)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2a0}}], 0x500, 0x0) 16:51:40 executing program 5: r0 = socket(0x2b, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8932, &(0x7f00000008c0)={'team0\x00'}) 16:51:40 executing program 3: r0 = creat(0x0, 0x0) r1 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000180)={0x8}) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000180)={0x8}) 16:51:40 executing program 0: syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000004001000000c", 0x15, 0x8000}, {&(0x7f0000000340)="10c4645f010000000100000001040000040000000b0000000020000000000000020000000000000073e8f48f7c01b7ede68fff20a64e7034607920b4b873599ebc4e53c011c8e11099f2f8afb940812e6831e117eba538ac86f64af4e795366fe29fa8015fd8d6b3832ecc366c4b1aa71e0c0f0fcf7450179093a36402a651502c132af37257216752943eacf53978815af432432d70", 0x96}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 173.613027] binder: 13855:13859 ioctl 541b 0 returned -22 16:51:40 executing program 2: socket(0x26, 0x5, 0x80000001) 16:51:40 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) shutdown(r0, 0x1) connect$bt_l2cap(r0, &(0x7f0000000000)={0x1f, 0x0, @fixed={[], 0x10}}, 0xe) sendmmsg$inet(r0, &(0x7f0000003f00)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2a0}}], 0x500, 0x0) 16:51:40 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100)}, 0x11000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f2, &(0x7f0000000000)='ip6gre0\x00') socket$kcm(0x29, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000001f40)={&(0x7f0000001f00)='./file0\x00'}, 0x10) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000040)='devices.allow\x00', 0x2, 0x0) 16:51:40 executing program 5: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f00000000c0)='ns/pid\x00') syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000040)='ns/pid_for_children\x00') 16:51:40 executing program 3: r0 = creat(0x0, 0x0) r1 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000180)={0x8}) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000180)={0x8}) 16:51:40 executing program 0: syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000004001000000c", 0x15, 0x8000}, {&(0x7f0000000340)="10c4645f010000000100000001040000040000000b0000000020000000000000020000000000000073e8f48f7c01b7ede68fff20a64e7034607920b4b873599ebc4e53c011c8e11099f2f8afb940812e6831e117eba538ac86f64af4e795366fe29fa8015fd8d6b3832ecc366c4b1aa71e0c0f0fcf7450179093a36402a651502c132af37257216752943eacf53978815af432432d70", 0x96}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:51:40 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) shutdown(r0, 0x1) connect$bt_l2cap(r0, &(0x7f0000000000)={0x1f, 0x0, @fixed={[], 0x10}}, 0xe) sendmmsg$inet(r0, &(0x7f0000003f00)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2a0}}], 0x500, 0x0) 16:51:40 executing program 3: r0 = creat(0x0, 0x0) r1 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000180)={0x8}) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000180)={0x8}) 16:51:40 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100)}, 0x11000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x0, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f2, &(0x7f0000000000)='ip6gre0\x00') socket$kcm(0x29, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000001f40)={&(0x7f0000001f00)='./file0\x00'}, 0x10) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000040)='devices.allow\x00', 0x2, 0x0) 16:51:40 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x14, 0x17, 0xa, 0x101}, 0x14}}, 0x0) clock_gettime(0x0, &(0x7f0000003940)={0x0, 0x0}) recvmmsg(r0, &(0x7f0000003800)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000003740)=[{0x0, 0x2}, {&(0x7f0000003500)=""/216, 0xd8}], 0x7ffff000}}], 0x2, 0x0, &(0x7f0000003980)={0x0, r1+10000000}) 16:51:40 executing program 2: r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000000)="d80350957edb7cf534831bea6ed27854b985fc76192183cac7e053f88a67ff6d3463dea4b6916478cd", 0x29) 16:51:40 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) shutdown(r0, 0x1) sendmmsg$inet(r0, &(0x7f0000003f00)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2a0}}], 0x500, 0x0) 16:51:40 executing program 0: syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000340)="10c4645f010000000100000001040000040000000b0000000020000000000000020000000000000073e8f48f7c01b7ede68fff20a64e7034607920b4b873599ebc4e53c011c8e11099f2f8afb940812e6831e117eba538ac86f64af4e795366fe29fa8015fd8d6b3832ecc366c4b1aa71e0c0f0fcf7450179093a36402a651502c132af37257216752943eacf53978815af432432d70", 0x96, 0xb200}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:51:40 executing program 3: r0 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) r1 = creat(0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000180)={0x8}) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000180)={0x8}) 16:51:40 executing program 2: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_DESTROY(r0, &(0x7f0000000200), 0x4) 16:51:40 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$packet(0x11, 0x3, 0x300) sendto(r0, &(0x7f0000000000)='\aG!R', 0x4, 0x0, &(0x7f0000000340)=@l2tp6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10]}, 0x7}, 0x80) 16:51:41 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) shutdown(r0, 0x1) sendmmsg$inet(r0, &(0x7f0000003f00)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2a0}}], 0x500, 0x0) 16:51:41 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100)}, 0x11000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x0, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f2, &(0x7f0000000000)='ip6gre0\x00') socket$kcm(0x29, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000001f40)={&(0x7f0000001f00)='./file0\x00'}, 0x10) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000040)='devices.allow\x00', 0x2, 0x0) 16:51:41 executing program 0: syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000340)="10c4645f010000000100000001040000040000000b0000000020000000000000020000000000000073e8f48f7c01b7ede68fff20a64e7034607920b4b873599ebc4e53c011c8e11099f2f8afb940812e6831e117eba538ac86f64af4e795366fe29fa8015fd8d6b3832ecc366c4b1aa71e0c0f0fcf7450179093a36402a651502c132af37257216752943eacf53978815af432432d70", 0x96, 0xb200}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:51:41 executing program 3: r0 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) r1 = creat(0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000180)={0x8}) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000180)={0x8}) 16:51:41 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x2, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) 16:51:41 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) shutdown(r0, 0x1) sendmmsg$inet(r0, &(0x7f0000003f00)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2a0}}], 0x500, 0x0) 16:51:41 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$rxrpc(r0, &(0x7f0000000040)=@in6={0xa, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x2]}}}, 0x24) 16:51:41 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100)}, 0x11000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x0, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f2, &(0x7f0000000000)='ip6gre0\x00') socket$kcm(0x29, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000001f40)={&(0x7f0000001f00)='./file0\x00'}, 0x10) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000040)='devices.allow\x00', 0x2, 0x0) 16:51:41 executing program 5: r0 = syz_open_dev$binderN(&(0x7f0000000000)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000040)={0x10, 0x0, &(0x7f0000000100)=[@request_death={0x40406301}], 0x0, 0x0, 0x0}) 16:51:41 executing program 0: syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000340)="10c4645f010000000100000001040000040000000b0000000020000000000000020000000000000073e8f48f7c01b7ede68fff20a64e7034607920b4b873599ebc4e53c011c8e11099f2f8afb940812e6831e117eba538ac86f64af4e795366fe29fa8015fd8d6b3832ecc366c4b1aa71e0c0f0fcf7450179093a36402a651502c132af37257216752943eacf53978815af432432d70", 0x96, 0xb200}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:51:41 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f00000002c0)='ethtool\x00') sendmsg$ETHTOOL_MSG_CHANNELS_GET(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000400)={0x2c, r1, 0x1, 0x0, 0x0, {0x2}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan0\x00'}]}]}, 0x2c}}, 0x0) 16:51:41 executing program 3: r0 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) r1 = creat(0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000180)={0x8}) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000180)={0x8}) 16:51:41 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) connect$bt_l2cap(r0, &(0x7f0000000000)={0x1f, 0x0, @fixed={[], 0x10}}, 0xe) sendmmsg$inet(r0, &(0x7f0000003f00)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2a0}}], 0x500, 0x0) 16:51:41 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) sendmmsg$nfc_llcp(r0, &(0x7f0000000380)=[{&(0x7f0000000000)={0x27, 0x1, 0x0, 0x0, 0x0, 0x0, "27805fc120fe5127553439627f7578e92a19a9a49ee472e29fe8e19cedb080ba0c05b29ec2bedaa30ed3fd36a6ba3ca97f0f8f5a2f765f374ac40f9671bbf7"}, 0x60, &(0x7f0000000240)=[{&(0x7f0000000080)="d32e04a008df938b16aea14888a8", 0xe}], 0x1}], 0x1, 0x0) 16:51:41 executing program 0: syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{0x0, 0x0, 0x8000}, {&(0x7f0000000340)="10c4645f010000000100000001040000040000000b0000000020000000000000020000000000000073e8f48f7c01b7ede68fff20a64e7034607920b4b873599ebc4e53c011c8e11099f2f8afb940812e6831e117eba538ac86f64af4e795366fe29fa8015fd8d6b3832ecc366c4b1aa71e0c0f0fcf7450179093a36402a651502c132af37257216752943eacf53978815af432432d70", 0x96, 0xb200}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:51:41 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100)}, 0x11000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x0, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f2, &(0x7f0000000000)='ip6gre0\x00') socket$kcm(0x29, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000001f40)={&(0x7f0000001f00)='./file0\x00'}, 0x10) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000040)='devices.allow\x00', 0x2, 0x0) 16:51:41 executing program 3: r0 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) creat(&(0x7f00000001c0)='./bus\x00', 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000180)={0x8}) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000180)={0x8}) 16:51:41 executing program 5: r0 = socket(0x2a, 0x2, 0x0) bind$x25(r0, &(0x7f0000000000)={0x9, @remote={[], 0x3}}, 0x12) 16:51:41 executing program 2: r0 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @dev}, 0x0, {0x2, 0x0, @multicast2}, 'nr0\x00'}) 16:51:41 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x7, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x40) 16:51:41 executing program 0: syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{0x0, 0x0, 0x8000}, {&(0x7f0000000340)="10c4645f010000000100000001040000040000000b0000000020000000000000020000000000000073e8f48f7c01b7ede68fff20a64e7034607920b4b873599ebc4e53c011c8e11099f2f8afb940812e6831e117eba538ac86f64af4e795366fe29fa8015fd8d6b3832ecc366c4b1aa71e0c0f0fcf7450179093a36402a651502c132af37257216752943eacf53978815af432432d70", 0x96, 0xb200}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:51:41 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100)}, 0x11000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x0, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f2, &(0x7f0000000000)='ip6gre0\x00') socket$kcm(0x29, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000001f40)={&(0x7f0000001f00)='./file0\x00'}, 0x10) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000040)='devices.allow\x00', 0x2, 0x0) 16:51:41 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) getpeername$unix(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$video4linux(0x0, 0x51, 0x400000) socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000240), &(0x7f0000000280)=0x4) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, 0x0, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) 16:51:41 executing program 3: r0 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) creat(&(0x7f00000001c0)='./bus\x00', 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000180)={0x8}) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000180)={0x8}) [ 174.704691] sctp: [Deprecated]: syz-executor.5 (pid 14001) Use of int in maxseg socket option. [ 174.704691] Use struct sctp_assoc_value instead [ 174.726417] sctp: [Deprecated]: syz-executor.5 (pid 14004) Use of int in maxseg socket option. [ 174.726417] Use struct sctp_assoc_value instead 16:51:42 executing program 3: r0 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) creat(&(0x7f00000001c0)='./bus\x00', 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000180)={0x8}) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000180)={0x8}) 16:51:42 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0xb, 0x2, &(0x7f00000001c0)=@raw=[@call={0x85, 0x0, 0x0, 0x1c}, @exit], &(0x7f0000000040)='syzkaller\x00', 0x6, 0x96, &(0x7f0000000240)=""/150, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 16:51:42 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100)}, 0x11000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x0, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f2, &(0x7f0000000000)='ip6gre0\x00') socket$kcm(0x29, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000001f40)={&(0x7f0000001f00)='./file0\x00'}, 0x10) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000040)='devices.allow\x00', 0x2, 0x0) 16:51:42 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) connect$bt_l2cap(r0, &(0x7f0000000000)={0x1f, 0x0, @fixed={[], 0x10}}, 0xe) sendmmsg$inet(r0, &(0x7f0000003f00)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2a0}}], 0x500, 0x0) 16:51:42 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000002400)={0xffffffffffffffff}) bind$unix(r0, 0x0, 0x0) 16:51:42 executing program 0: syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{0x0, 0x0, 0x8000}, {&(0x7f0000000340)="10c4645f010000000100000001040000040000000b0000000020000000000000020000000000000073e8f48f7c01b7ede68fff20a64e7034607920b4b873599ebc4e53c011c8e11099f2f8afb940812e6831e117eba538ac86f64af4e795366fe29fa8015fd8d6b3832ecc366c4b1aa71e0c0f0fcf7450179093a36402a651502c132af37257216752943eacf53978815af432432d70", 0x96, 0xb200}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:51:42 executing program 3: r0 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) r1 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000180)={0x8}) 16:51:42 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmmsg(r0, &(0x7f0000005540)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000001340)=""/4067, 0xfe3}], 0x1, 0x0, 0x0, 0x1f4}}], 0xfc, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x170) 16:51:42 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x7fffff7a}]}) gettid() syz_read_part_table(0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x3, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6}]}) 16:51:42 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100)}, 0x11000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f2, &(0x7f0000000000)='ip6gre0\x00') socket$kcm(0x29, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000001f40)={&(0x7f0000001f00)='./file0\x00'}, 0x10) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000040)='devices.allow\x00', 0x2, 0x0) 16:51:42 executing program 0: syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x8000}, {&(0x7f0000000340)="10c4645f010000000100000001040000040000000b0000000020000000000000020000000000000073e8f48f7c01b7ede68fff20a64e7034607920b4b873599ebc4e53c011c8e11099f2f8afb940812e6831e117eba538ac86f64af4e795366fe29fa8015fd8d6b3832ecc366c4b1aa71e0c0f0fcf7450179093a36402a651502c132af37257216752943eacf53978815af432432d70", 0x96, 0xb200}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:51:42 executing program 3: r0 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) r1 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000180)={0x8}) 16:51:42 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100)}, 0x11000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f2, &(0x7f0000000000)='ip6gre0\x00') socket$kcm(0x29, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000001f40)={&(0x7f0000001f00)='./file0\x00'}, 0x10) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000040)='devices.allow\x00', 0x2, 0x0) 16:51:42 executing program 3: r0 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) r1 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000180)={0x8}) 16:51:42 executing program 3: r0 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) r1 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000180)) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000180)={0x8}) 16:51:43 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) connect$bt_l2cap(r0, &(0x7f0000000000)={0x1f, 0x0, @fixed={[], 0x10}}, 0xe) sendmmsg$inet(r0, &(0x7f0000003f00)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2a0}}], 0x500, 0x0) 16:51:43 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100)}, 0x11000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f2, &(0x7f0000000000)='ip6gre0\x00') socket$kcm(0x29, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000001f40)={&(0x7f0000001f00)='./file0\x00'}, 0x10) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000040)='devices.allow\x00', 0x2, 0x0) 16:51:43 executing program 2: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000840)='/dev/loop-control\x00', 0x20000, 0x0) 16:51:43 executing program 0: syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x8000}, {&(0x7f0000000340)="10c4645f010000000100000001040000040000000b0000000020000000000000020000000000000073e8f48f7c01b7ede68fff20a64e7034607920b4b873599ebc4e53c011c8e11099f2f8afb940812e6831e117eba538ac86f64af4e795366fe29fa8015fd8d6b3832ecc366c4b1aa71e0c0f0fcf7450179093a36402a651502c132af37257216752943eacf53978815af432432d70", 0x96, 0xb200}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:51:43 executing program 0: syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x8000}, {&(0x7f0000000340)="10c4645f010000000100000001040000040000000b0000000020000000000000020000000000000073e8f48f7c01b7ede68fff20a64e7034607920b4b873599ebc4e53c011c8e11099f2f8afb940812e6831e117eba538ac86f64af4e795366fe29fa8015fd8d6b3832ecc366c4b1aa71e0c0f0fcf7450179093a36402a651502c132af37257216752943eacf53978815af432432d70", 0x96, 0xb200}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:51:43 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) sendmmsg$nfc_llcp(r0, &(0x7f0000000380)=[{&(0x7f0000000000)={0x27, 0x3, 0x0, 0x0, 0x0, 0x0, "27805fc120fe5127553439627f7578e92a19a9a49ee472e29fe8e19cedb080ba0c05b29ec2bedaa30ed3fd36a6ba3ca97f0f8f5a2f765f374ac40f9671bbf7"}, 0x60, 0x0}], 0x1, 0x0) 16:51:43 executing program 3: r0 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) r1 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000180)) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000180)={0x8}) 16:51:43 executing program 2: syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x3bb, 0x40000) 16:51:43 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100)}, 0x11000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f2, &(0x7f0000000000)='ip6gre0\x00') socket$kcm(0x29, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000001f40)={&(0x7f0000001f00)='./file0\x00'}, 0x10) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000040)='devices.allow\x00', 0x2, 0x0) 16:51:43 executing program 2: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) ioctl$NBD_SET_SIZE_BLOCKS(r0, 0x125e, 0x960000) 16:51:43 executing program 3: r0 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) r1 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000180)) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000180)={0x8}) 16:51:43 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100)}, 0x11000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f2, &(0x7f0000000000)='ip6gre0\x00') socket$kcm(0x29, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000001f40)={&(0x7f0000001f00)='./file0\x00'}, 0x10) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000040)='devices.allow\x00', 0x2, 0x0) 16:51:43 executing program 1: shutdown(0xffffffffffffffff, 0x1) connect$bt_l2cap(0xffffffffffffffff, &(0x7f0000000000)={0x1f, 0x0, @fixed={[], 0x10}}, 0xe) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000003f00)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2a0}}], 0x500, 0x0) 16:51:43 executing program 5: perf_event_open(&(0x7f00000003c0)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) creat(0x0, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000880)=ANY=[], 0x83) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = fanotify_init(0x0, 0x0) fanotify_mark(r2, 0x2000000000000011, 0x2, r1, 0x0) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)) setreuid(0x0, 0x0) sendto$netrom(r0, &(0x7f0000000440), 0x0, 0x84, 0x0, 0x0) syz_open_dev$mouse(0x0, 0xffff, 0x515081) 16:51:43 executing program 0: syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a46533101000000607600", 0xb, 0x8000}, {&(0x7f0000000340)="10c4645f010000000100000001040000040000000b0000000020000000000000020000000000000073e8f48f7c01b7ede68fff20a64e7034607920b4b873599ebc4e53c011c8e11099f2f8afb940812e6831e117eba538ac86f64af4e795366fe29fa8015fd8d6b3832ecc366c4b1aa71e0c0f0fcf7450179093a36402a651502c132af37257216752943eacf53978815af432432d70", 0x96, 0xb200}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:51:43 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100)}, 0x11000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f2, &(0x7f0000000000)='ip6gre0\x00') socket$kcm(0x29, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000001f40)={&(0x7f0000001f00)='./file0\x00'}, 0x10) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000040)='devices.allow\x00', 0x2, 0x0) 16:51:43 executing program 3: creat(&(0x7f00000001c0)='./bus\x00', 0x0) r0 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000180)={0x8}) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000180)={0x8}) 16:51:43 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) sendmmsg$nfc_llcp(r0, &(0x7f0000000380)=[{&(0x7f0000000000)={0x27, 0x1, 0x0, 0x0, 0x0, 0x0, "27805fc120fe5127553439627f7578e92a19a9a49ee472e29fe8e19cedb080ba0c05b29ec2bedaa30ed3fd36a6ba3ca97f0f8f5a2f765f374ac40f9671bbf7"}, 0x60, &(0x7f0000000240)=[{0x0}, {&(0x7f0000000180)=',', 0x1}], 0x2}], 0x1, 0x0) 16:51:43 executing program 2: pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={0x0, 0x3938700}, 0x0) 16:51:43 executing program 3: creat(&(0x7f00000001c0)='./bus\x00', 0x0) r0 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000180)={0x8}) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000180)={0x8}) 16:51:43 executing program 0: syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a46533101000000607600", 0xb, 0x8000}, {&(0x7f0000000340)="10c4645f010000000100000001040000040000000b0000000020000000000000020000000000000073e8f48f7c01b7ede68fff20a64e7034607920b4b873599ebc4e53c011c8e11099f2f8afb940812e6831e117eba538ac86f64af4e795366fe29fa8015fd8d6b3832ecc366c4b1aa71e0c0f0fcf7450179093a36402a651502c132af37257216752943eacf53978815af432432d70", 0x96, 0xb200}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:51:44 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100)}, 0x11000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f2, 0x0) socket$kcm(0x29, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000001f40)={&(0x7f0000001f00)='./file0\x00'}, 0x10) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000040)='devices.allow\x00', 0x2, 0x0) 16:51:44 executing program 1: shutdown(0xffffffffffffffff, 0x1) connect$bt_l2cap(0xffffffffffffffff, &(0x7f0000000000)={0x1f, 0x0, @fixed={[], 0x10}}, 0xe) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000003f00)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2a0}}], 0x500, 0x0) 16:51:44 executing program 3: creat(&(0x7f00000001c0)='./bus\x00', 0x0) r0 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000180)={0x8}) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000180)={0x8}) 16:51:44 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100)}, 0x11000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f2, 0x0) socket$kcm(0x29, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000001f40)={&(0x7f0000001f00)='./file0\x00'}, 0x10) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000040)='devices.allow\x00', 0x2, 0x0) 16:51:44 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getpeername$packet(r0, 0x0, 0x0) 16:51:44 executing program 0: syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a46533101000000607600", 0xb, 0x8000}, {&(0x7f0000000340)="10c4645f010000000100000001040000040000000b0000000020000000000000020000000000000073e8f48f7c01b7ede68fff20a64e7034607920b4b873599ebc4e53c011c8e11099f2f8afb940812e6831e117eba538ac86f64af4e795366fe29fa8015fd8d6b3832ecc366c4b1aa71e0c0f0fcf7450179093a36402a651502c132af37257216752943eacf53978815af432432d70", 0x96, 0xb200}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:51:44 executing program 1: shutdown(0xffffffffffffffff, 0x1) connect$bt_l2cap(0xffffffffffffffff, &(0x7f0000000000)={0x1f, 0x0, @fixed={[], 0x10}}, 0xe) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000003f00)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2a0}}], 0x500, 0x0) 16:51:44 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x7, 0x0, 0x0, 0x0, 0x226, 0x1}, 0x40) 16:51:44 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100)}, 0x11000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f2, 0x0) socket$kcm(0x29, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000001f40)={&(0x7f0000001f00)='./file0\x00'}, 0x10) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000040)='devices.allow\x00', 0x2, 0x0) 16:51:44 executing program 3: r0 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) r1 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000180)={0x8}) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, 0x0) 16:51:44 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) shutdown(r0, 0x1) connect$bt_l2cap(r0, &(0x7f0000000000)={0x1f, 0x0, @fixed={[], 0x10}}, 0xe) sendmmsg$inet(r0, &(0x7f0000003f00)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2a0}}], 0x500, 0x0) 16:51:44 executing program 3: r0 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) r1 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000180)={0x8}) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, 0x0) 16:51:44 executing program 0: syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000004", 0x10, 0x8000}, {&(0x7f0000000340)="10c4645f010000000100000001040000040000000b0000000020000000000000020000000000000073e8f48f7c01b7ede68fff20a64e7034607920b4b873599ebc4e53c011c8e11099f2f8afb940812e6831e117eba538ac86f64af4e795366fe29fa8015fd8d6b3832ecc366c4b1aa71e0c0f0fcf7450179093a36402a651502c132af37257216752943eacf53978815af432432d70", 0x96, 0xb200}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:51:44 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0xb, 0x2, &(0x7f00000001c0)=@raw=[@call={0x85, 0x0, 0x0, 0x21}, @exit], &(0x7f0000000040)='syzkaller\x00', 0x6, 0x96, &(0x7f0000000240)=""/150, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 16:51:44 executing program 2: socket(0x3, 0x0, 0x3ff) 16:51:44 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100)}, 0x11000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f2, &(0x7f0000000000)='ip6gre0\x00') socket$kcm(0x29, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000040)='devices.allow\x00', 0x2, 0x0) 16:51:44 executing program 3: r0 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) r1 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000180)={0x8}) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, 0x0) 16:51:44 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) shutdown(r0, 0x1) connect$bt_l2cap(r0, &(0x7f0000000000)={0x1f, 0x0, @fixed={[], 0x10}}, 0xe) sendmmsg$inet(r0, &(0x7f0000003f00)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2a0}}], 0x500, 0x0) 16:51:44 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000027c0)='/dev/dri/card#\x00', 0x200, 0x0) ioctl$DRM_IOCTL_MODE_PAGE_FLIP(r0, 0xc01864b0, &(0x7f0000000000)={0x0, 0x0, 0xd, 0x7fffffff}) 16:51:44 executing program 5: socket$inet6_sctp(0xa, 0x10026d29b0bdd2c8, 0x84) 16:51:44 executing program 0: syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000004", 0x10, 0x8000}, {&(0x7f0000000340)="10c4645f010000000100000001040000040000000b0000000020000000000000020000000000000073e8f48f7c01b7ede68fff20a64e7034607920b4b873599ebc4e53c011c8e11099f2f8afb940812e6831e117eba538ac86f64af4e795366fe29fa8015fd8d6b3832ecc366c4b1aa71e0c0f0fcf7450179093a36402a651502c132af37257216752943eacf53978815af432432d70", 0x96, 0xb200}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:51:44 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) shutdown(r0, 0x1) connect$bt_l2cap(r0, &(0x7f0000000000)={0x1f, 0x0, @fixed={[], 0x10}}, 0xe) sendmmsg$inet(r0, &(0x7f0000003f00)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2a0}}], 0x500, 0x0) 16:51:45 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 16:51:45 executing program 3: r0 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) r1 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000180)={0x8}) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000180)) 16:51:45 executing program 5: r0 = socket$kcm(0x29, 0x2, 0x0) sendmsg$NL80211_CMD_DEL_MPATH(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}}, 0x400c0c0) 16:51:45 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) shutdown(0xffffffffffffffff, 0x1) connect$bt_l2cap(r0, &(0x7f0000000000)={0x1f, 0x0, @fixed={[], 0x10}}, 0xe) sendmmsg$inet(r0, &(0x7f0000003f00)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2a0}}], 0x500, 0x0) 16:51:45 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100)}, 0x11000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f2, &(0x7f0000000000)='ip6gre0\x00') socket$kcm(0x29, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000040)='devices.allow\x00', 0x2, 0x0) 16:51:45 executing program 3: r0 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) r1 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000180)={0x8}) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000180)) 16:51:45 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={0x0, &(0x7f0000000080)=""/165, 0x0, 0xa5}, 0x20) 16:51:45 executing program 0: syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000004", 0x10, 0x8000}, {&(0x7f0000000340)="10c4645f010000000100000001040000040000000b0000000020000000000000020000000000000073e8f48f7c01b7ede68fff20a64e7034607920b4b873599ebc4e53c011c8e11099f2f8afb940812e6831e117eba538ac86f64af4e795366fe29fa8015fd8d6b3832ecc366c4b1aa71e0c0f0fcf7450179093a36402a651502c132af37257216752943eacf53978815af432432d70", 0x96, 0xb200}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:51:45 executing program 2: r0 = socket(0x23, 0x5, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0xc0189436, &(0x7f0000000040)={'team0\x00'}) 16:51:45 executing program 3: r0 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) r1 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000180)={0x8}) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000180)) 16:51:45 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x89, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x800000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 16:51:45 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100)}, 0x11000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f2, &(0x7f0000000000)='ip6gre0\x00') socket$kcm(0x29, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000040)='devices.allow\x00', 0x2, 0x0) 16:51:45 executing program 0: syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000004001000", 0x13, 0x8000}, {&(0x7f0000000340)="10c4645f010000000100000001040000040000000b0000000020000000000000020000000000000073e8f48f7c01b7ede68fff20a64e7034607920b4b873599ebc4e53c011c8e11099f2f8afb940812e6831e117eba538ac86f64af4e795366fe29fa8015fd8d6b3832ecc366c4b1aa71e0c0f0fcf7450179093a36402a651502c132af37257216752943eacf53978815af432432d70", 0x96, 0xb200}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:51:45 executing program 2: perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000880)=ANY=[], 0x83) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = fanotify_init(0x0, 0x0) fanotify_mark(r2, 0x2000000000000011, 0x2, r1, 0x0) 16:51:45 executing program 3: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) ioctl$NBD_SET_SIZE_BLOCKS(r0, 0x5460, 0x0) 16:51:45 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) shutdown(0xffffffffffffffff, 0x1) connect$bt_l2cap(r0, &(0x7f0000000000)={0x1f, 0x0, @fixed={[], 0x10}}, 0xe) sendmmsg$inet(r0, &(0x7f0000003f00)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2a0}}], 0x500, 0x0) 16:51:45 executing program 5: r0 = socket(0x25, 0x5, 0x0) setsockopt$X25_QBITINCL(r0, 0x106, 0x1, 0x0, 0x0) 16:51:45 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {0x0}}, 0x18) 16:51:45 executing program 0: syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000004001000", 0x13, 0x8000}, {&(0x7f0000000340)="10c4645f010000000100000001040000040000000b0000000020000000000000020000000000000073e8f48f7c01b7ede68fff20a64e7034607920b4b873599ebc4e53c011c8e11099f2f8afb940812e6831e117eba538ac86f64af4e795366fe29fa8015fd8d6b3832ecc366c4b1aa71e0c0f0fcf7450179093a36402a651502c132af37257216752943eacf53978815af432432d70", 0x96, 0xb200}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:51:45 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100)}, 0x11000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f2, &(0x7f0000000000)='ip6gre0\x00') socket$kcm(0x29, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000001f40)={0x0}, 0x10) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000040)='devices.allow\x00', 0x2, 0x0) 16:51:45 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x18, 0x3, &(0x7f00000001c0)=@raw=[@call={0x85, 0x0, 0x0, 0x7d}, @alu={0x4, 0x1, 0x0, 0x0, 0xa}, @exit], &(0x7f0000000040)='syzkaller\x00', 0x6, 0x96, &(0x7f0000000240)=""/150, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 16:51:46 executing program 3: r0 = socket(0x18, 0x0, 0x0) getsockname$inet(r0, 0x0, &(0x7f0000000040)) 16:51:46 executing program 0: syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000004001000", 0x13, 0x8000}, {&(0x7f0000000340)="10c4645f010000000100000001040000040000000b0000000020000000000000020000000000000073e8f48f7c01b7ede68fff20a64e7034607920b4b873599ebc4e53c011c8e11099f2f8afb940812e6831e117eba538ac86f64af4e795366fe29fa8015fd8d6b3832ecc366c4b1aa71e0c0f0fcf7450179093a36402a651502c132af37257216752943eacf53978815af432432d70", 0x96, 0xb200}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:51:46 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendto(r0, &(0x7f0000000280)='bG', 0x2, 0xfe80, &(0x7f0000000340)=@l2tp6={0xa, 0x0, 0x0, @dev}, 0x80) 16:51:46 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100)}, 0x11000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f2, &(0x7f0000000000)='ip6gre0\x00') socket$kcm(0x29, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000001f40)={0x0}, 0x10) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000040)='devices.allow\x00', 0x2, 0x0) 16:51:46 executing program 2: perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000880)=ANY=[], 0x83) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = fanotify_init(0x0, 0x0) fanotify_mark(r2, 0x2000000000000011, 0x2, r1, 0x0) 16:51:46 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000000)={'team0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @link_local}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000180)={r1, 0x1, 0x6}, 0x10) [ 179.351340] device team0 entered promiscuous mode [ 179.356820] device team_slave_0 entered promiscuous mode [ 179.362900] device team_slave_1 entered promiscuous mode [ 179.372268] device team0 left promiscuous mode [ 179.379075] device team_slave_0 left promiscuous mode [ 179.385759] device team_slave_1 left promiscuous mode [ 179.407653] device team0 entered promiscuous mode [ 179.413055] device team_slave_0 entered promiscuous mode [ 179.421144] device team_slave_1 entered promiscuous mode [ 179.429035] device team0 left promiscuous mode [ 179.434475] device team_slave_0 left promiscuous mode [ 179.447677] device team_slave_1 left promiscuous mode 16:51:46 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) shutdown(0xffffffffffffffff, 0x1) connect$bt_l2cap(r0, &(0x7f0000000000)={0x1f, 0x0, @fixed={[], 0x10}}, 0xe) sendmmsg$inet(r0, &(0x7f0000003f00)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2a0}}], 0x500, 0x0) 16:51:46 executing program 0: syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a46533101000000607600000000000400100000", 0x14, 0x8000}, {&(0x7f0000000340)="10c4645f010000000100000001040000040000000b0000000020000000000000020000000000000073e8f48f7c01b7ede68fff20a64e7034607920b4b873599ebc4e53c011c8e11099f2f8afb940812e6831e117eba538ac86f64af4e795366fe29fa8015fd8d6b3832ecc366c4b1aa71e0c0f0fcf7450179093a36402a651502c132af37257216752943eacf53978815af432432d70", 0x96, 0xb200}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:51:46 executing program 5: pselect6(0x40, &(0x7f00000001c0), 0x0, 0x0, &(0x7f0000000280)={0x0, 0x3938700}, 0x0) 16:51:46 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100)}, 0x11000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f2, &(0x7f0000000000)='ip6gre0\x00') socket$kcm(0x29, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000001f40)={0x0}, 0x10) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000040)='devices.allow\x00', 0x2, 0x0) 16:51:46 executing program 3: r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f00000000c0)='ns/pid\x00') ioctl$NS_GET_PARENT(r0, 0x40305829, 0x0) 16:51:46 executing program 3: r0 = socket(0x23, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x89b0, &(0x7f0000000040)={'ip6tnl0\x00', @ifru_data=&(0x7f0000000000)="f6fe3f796ebaca3e20149e1653c73d4be39f3b847041cc26dbf10974d590e232"}) 16:51:46 executing program 0: syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a46533101000000607600000000000400100000", 0x14, 0x8000}, {&(0x7f0000000340)="10c4645f010000000100000001040000040000000b0000000020000000000000020000000000000073e8f48f7c01b7ede68fff20a64e7034607920b4b873599ebc4e53c011c8e11099f2f8afb940812e6831e117eba538ac86f64af4e795366fe29fa8015fd8d6b3832ecc366c4b1aa71e0c0f0fcf7450179093a36402a651502c132af37257216752943eacf53978815af432432d70", 0x96, 0xb200}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:51:46 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000021c0)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@ldst={0x3}], &(0x7f00000002c0)='syzkaller\x00', 0x3, 0x87, &(0x7f0000002080)=""/135, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 16:51:46 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100)}, 0x11000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f2, &(0x7f0000000000)='ip6gre0\x00') socket$kcm(0x29, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000001f40)={&(0x7f0000001f00)='./file0\x00'}, 0x10) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000040)='devices.allow\x00', 0x2, 0x0) 16:51:46 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) sendmmsg$nfc_llcp(r0, &(0x7f0000004780)=[{&(0x7f0000000000)={0x27, 0x1, 0x0, 0x0, 0x0, 0x0, "27805fc120fe5127553439627f7578e92a19a9a49ee472e29fe8e19cedb080ba0c05b29ec2bedaa30ed3fd36a6ba3ca97f0f8f5a2f765f374ac40f9671bbf7"}, 0x60, &(0x7f0000000240)=[{&(0x7f0000000080)="ea2e04a028df938b16aea148986f", 0xe}], 0x1}, {&(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "02a45c76cee6ed5347794d6801416f9ba5da7a141e9829755d22b51308380c4eef3e643f896687102885f01015be75e902501ecaff2fa1f2e33d5f7ddc47c9"}, 0x60, 0x0, 0x0, 0x0, 0x0, 0x2400c004}], 0x2, 0x0) 16:51:47 executing program 2: syz_mount_image$afs(&(0x7f0000000000)='afs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)={[{@dyn='dyn'}]}) syz_mount_image$udf(&(0x7f0000000140)='udf\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)) 16:51:47 executing program 0: syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a46533101000000607600000000000400100000", 0x14, 0x8000}, {&(0x7f0000000340)="10c4645f010000000100000001040000040000000b0000000020000000000000020000000000000073e8f48f7c01b7ede68fff20a64e7034607920b4b873599ebc4e53c011c8e11099f2f8afb940812e6831e117eba538ac86f64af4e795366fe29fa8015fd8d6b3832ecc366c4b1aa71e0c0f0fcf7450179093a36402a651502c132af37257216752943eacf53978815af432432d70", 0x96, 0xb200}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:51:47 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) shutdown(r0, 0x0) connect$bt_l2cap(r0, &(0x7f0000000000)={0x1f, 0x0, @fixed={[], 0x10}}, 0xe) sendmmsg$inet(r0, &(0x7f0000003f00)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2a0}}], 0x500, 0x0) 16:51:47 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x18, 0x2, &(0x7f00000001c0)=@raw=[@call={0x85, 0x0, 0x0, 0x83}, @exit], &(0x7f0000000040)='syzkaller\x00', 0x6, 0x96, &(0x7f0000000240)=""/150, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 16:51:47 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x6, 0x0, 0x0, 0x0, 0x226, 0x1}, 0x40) 16:51:47 executing program 0: syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000004001000000c", 0x15}, {&(0x7f0000000340)="10c4645f010000000100000001040000040000000b0000000020000000000000020000000000000073e8f48f7c01b7ede68fff20a64e7034607920b4b873599ebc4e53c011c8e11099f2f8afb940812e6831e117eba538ac86f64af4e795366fe29fa8015fd8d6b3832ecc366c4b1aa71e0c0f0fcf7450179093a36402a651502c132af37257216752943eacf53978815af432432d70", 0x96, 0xb200}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:51:47 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendto(r0, &(0x7f0000000000)='\aG', 0x2, 0xfe80, &(0x7f0000000340)=@l2tp6={0xa, 0x0, 0x0, @remote, 0x6}, 0x80) 16:51:47 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100)}, 0x11000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f2, &(0x7f0000000000)='ip6gre0\x00') socket$kcm(0x29, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000001f40)={&(0x7f0000001f00)='./file0\x00'}, 0x10) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) openat$cgroup_devices(0xffffffffffffffff, 0x0, 0x2, 0x0) 16:51:47 executing program 5: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000015c0), 0x0, &(0x7f0000003780)={[], [{@uid_eq={'uid'}}]}) 16:51:47 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x14, 0x0, 0x8, 0xbe0d, 0x0, 0x1}, 0x40) 16:51:47 executing program 0: syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000004001000000c", 0x15}, {&(0x7f0000000340)="10c4645f010000000100000001040000040000000b0000000020000000000000020000000000000073e8f48f7c01b7ede68fff20a64e7034607920b4b873599ebc4e53c011c8e11099f2f8afb940812e6831e117eba538ac86f64af4e795366fe29fa8015fd8d6b3832ecc366c4b1aa71e0c0f0fcf7450179093a36402a651502c132af37257216752943eacf53978815af432432d70", 0x96, 0xb200}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:51:47 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000100)=[@in6={0xa, 0x4e23, 0x0, @private0}, @in6={0xa, 0x4e23, 0x0, @private1}], 0x38) 16:51:47 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) shutdown(r0, 0x0) connect$bt_l2cap(0xffffffffffffffff, &(0x7f0000000000)={0x1f, 0x0, @fixed={[], 0x10}}, 0xe) sendmmsg$inet(r0, &(0x7f0000003f00)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2a0}}], 0x500, 0x0) 16:51:47 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000004c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000140)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x0, @private1}, r1}}, 0x38) 16:51:47 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) shutdown(r0, 0x0) connect$bt_l2cap(0xffffffffffffffff, &(0x7f0000000000)={0x1f, 0x0, @fixed={[], 0x10}}, 0xe) sendmmsg$inet(r0, &(0x7f0000003f00)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2a0}}], 0x500, 0x0) 16:51:47 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100)}, 0x11000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f2, &(0x7f0000000000)='ip6gre0\x00') socket$kcm(0x29, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000001f40)={&(0x7f0000001f00)='./file0\x00'}, 0x10) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) openat$cgroup_devices(0xffffffffffffffff, 0x0, 0x2, 0x0) 16:51:47 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000002400)) 16:51:47 executing program 0: syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000004001000000c", 0x15}, {&(0x7f0000000340)="10c4645f010000000100000001040000040000000b0000000020000000000000020000000000000073e8f48f7c01b7ede68fff20a64e7034607920b4b873599ebc4e53c011c8e11099f2f8afb940812e6831e117eba538ac86f64af4e795366fe29fa8015fd8d6b3832ecc366c4b1aa71e0c0f0fcf7450179093a36402a651502c132af37257216752943eacf53978815af432432d70", 0x96, 0xb200}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:51:47 executing program 3: r0 = socket(0x25, 0x5, 0x0) recvmmsg(r0, &(0x7f0000000700)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 16:51:48 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) shutdown(r0, 0x0) connect$bt_l2cap(0xffffffffffffffff, &(0x7f0000000000)={0x1f, 0x0, @fixed={[], 0x10}}, 0xe) sendmmsg$inet(r0, &(0x7f0000003f00)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2a0}}], 0x500, 0x0) 16:51:48 executing program 5: socket(0x23, 0x0, 0x1000000) 16:51:48 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) shutdown(r0, 0x0) connect$bt_l2cap(r0, 0x0, 0x0) sendmmsg$inet(r0, &(0x7f0000003f00)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2a0}}], 0x500, 0x0) 16:51:48 executing program 0: syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000004001000000c", 0x15, 0x8000}, {&(0x7f0000000340)="10c4645f010000000100000001040000040000000b0000000020000000000000020000000000000073e8f48f7c01b7ede68fff20a64e7034607920b4b873599ebc4e53c011c8e11099f2f8afb940812e6831e117eba538ac86f64af4e795366fe29fa8015fd8d6b3832ecc366c4b1aa71e0c0f0fcf7450179093a36402a651502c132af37257216752943eacf53978815af432432d70", 0x96, 0xb200}], 0x0, 0x0) 16:51:48 executing program 2: socket(0x1, 0x0, 0x401) 16:51:48 executing program 3: pipe2$9p(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RREADDIR(r0, &(0x7f00000001c0)=ANY=[], 0x49) 16:51:48 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) shutdown(r0, 0x0) connect$bt_l2cap(r0, 0x0, 0x0) sendmmsg$inet(r0, &(0x7f0000003f00)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2a0}}], 0x500, 0x0) 16:51:48 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100)}, 0x11000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f2, &(0x7f0000000000)='ip6gre0\x00') socket$kcm(0x29, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000001f40)={&(0x7f0000001f00)='./file0\x00'}, 0x10) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) openat$cgroup_devices(0xffffffffffffffff, 0x0, 0x2, 0x0) 16:51:48 executing program 5: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) ioctl$NBD_SET_SIZE_BLOCKS(r0, 0x40101283, 0x0) 16:51:48 executing program 0: syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000004001000000c", 0x15, 0x8000}, {&(0x7f0000000340)="10c4645f010000000100000001040000040000000b0000000020000000000000020000000000000073e8f48f7c01b7ede68fff20a64e7034607920b4b873599ebc4e53c011c8e11099f2f8afb940812e6831e117eba538ac86f64af4e795366fe29fa8015fd8d6b3832ecc366c4b1aa71e0c0f0fcf7450179093a36402a651502c132af37257216752943eacf53978815af432432d70", 0x96, 0xb200}], 0x0, 0x0) 16:51:48 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000580)='/dev/bus/usb/00#/00#\x00', 0xda, 0x42) ioctl$USBDEVFS_RESETEP(r0, 0x80045515, &(0x7f0000000100)={0x1, 0x1}) 16:51:48 executing program 5: r0 = socket(0x2b, 0x1, 0x0) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r0, 0x6, 0xd, 0x0, 0x0) 16:51:48 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x26700, 0x0) 16:51:48 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) shutdown(r0, 0x0) connect$bt_l2cap(r0, 0x0, 0x0) sendmmsg$inet(r0, &(0x7f0000003f00)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2a0}}], 0x500, 0x0) 16:51:48 executing program 3: r0 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000002100)='/dev/nvme-fabrics\x00', 0x0, 0x0) mmap$binder(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1, 0x11, r0, 0x0) [ 181.818882] usb usb8: usbfs: process 14507 (syz-executor.3) did not claim interface 0 before use 16:51:48 executing program 0: syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000004001000000c", 0x15, 0x8000}, {&(0x7f0000000340)="10c4645f010000000100000001040000040000000b0000000020000000000000020000000000000073e8f48f7c01b7ede68fff20a64e7034607920b4b873599ebc4e53c011c8e11099f2f8afb940812e6831e117eba538ac86f64af4e795366fe29fa8015fd8d6b3832ecc366c4b1aa71e0c0f0fcf7450179093a36402a651502c132af37257216752943eacf53978815af432432d70", 0x96, 0xb200}], 0x0, 0x0) 16:51:48 executing program 5: mount$9p_fd(0xf0ffff, &(0x7f00000003c0)='.\x00', 0x0, 0x2400, 0x0) 16:51:48 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0xe22, 0x0, @empty}, 0x7d) syz_emit_ethernet(0x3e, &(0x7f0000000300)={@broadcast, @empty=[0x4], @void, {@ipv6={0x86dd, @udp={0x0, 0x6, "1f00", 0x8, 0x11, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @mcast2, {[], {0x0, 0xe22, 0x8}}}}}}, 0x0) 16:51:48 executing program 3: socket(0x22, 0x0, 0x8) 16:51:48 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) shutdown(r0, 0x0) connect$bt_l2cap(r0, &(0x7f0000000000)={0x1f, 0x0, @fixed}, 0xe) sendmmsg$inet(r0, &(0x7f0000003f00)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2a0}}], 0x500, 0x0) 16:51:48 executing program 2: r0 = socket(0x2b, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8913, &(0x7f00000008c0)={'team0\x00'}) 16:51:48 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$packet(r0, 0x0, 0xf) 16:51:48 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x0, 0xffff, 0x0, 0x1}, 0x40) 16:51:49 executing program 3: r0 = syz_open_dev$binderN(&(0x7f0000000280)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000380)={0x10, 0x0, &(0x7f00000002c0)=[@request_death], 0x0, 0x0, 0x0}) 16:51:49 executing program 2: fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x3) faccessat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x42) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file1\x00', 0x9, 0x2, &(0x7f0000001180)=[{&(0x7f0000000140)="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", 0x1000, 0x2}, {&(0x7f0000001140)="5dec1bfeb0100cb0e8690e8eff7f0886b22143117fd38890c35ab5aaa22ef0c394c1d41a0c08e49f40c1f13d381dea", 0x2f, 0x6}], 0x180080, 0x0) userfaultfd(0x400) 16:51:49 executing program 4: socketpair(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$nl_crypto(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={0x0}}, 0x0) 16:51:49 executing program 3: pipe2(&(0x7f0000000280), 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000300)) syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') syz_open_dev$video4linux(&(0x7f0000000100)='/dev/v4l-subdev#\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r1+30000000}, 0x0) 16:51:49 executing program 5: prctl$PR_SET_MM(0x23, 0xf, &(0x7f0000ffd000/0x1000)=nil) 16:51:49 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x365002, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(r0, 0xc008ae05, 0x0) 16:51:49 executing program 2: r0 = socket$l2tp(0x2, 0x2, 0x73) sendmmsg$sock(r0, &(0x7f0000001ac0)=[{{&(0x7f00000001c0)=@l2tp6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, 0x80, 0x0, 0x0, 0x0, 0x4800}}], 0x1, 0x0) 16:51:49 executing program 0: connect$x25(0xffffffffffffffff, 0x0, 0x0) 16:51:49 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) shutdown(r0, 0x0) connect$bt_l2cap(r0, &(0x7f0000000000)={0x1f, 0x0, @fixed}, 0xe) sendmmsg$inet(r0, &(0x7f0000003f00)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2a0}}], 0x500, 0x0) 16:51:49 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x77, 0x0, 0x0) 16:51:49 executing program 5: statx(0xffffffffffffff9c, 0x0, 0x800, 0x0, 0x0) 16:51:49 executing program 4: r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, r0) r2 = add_key(&(0x7f0000000080)='big_key\x00', &(0x7f0000000140)={'syz', 0x1}, &(0x7f00000000c0)='{', 0x1, r1) keyctl$search(0xb, r2, 0x0, 0x0, 0x0) 16:51:49 executing program 2: r0 = syz_open_dev$vcsu(&(0x7f0000000100)='/dev/vcsu#\x00', 0x0, 0x101c01) write$FUSE_INTERRUPT(r0, &(0x7f0000000140)={0x10}, 0xfffffdbd) getsockopt$inet_mreqn(r0, 0x0, 0x20, &(0x7f0000000180)={@empty, @empty, 0x0}, &(0x7f00000001c0)=0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x2, 0x1, 0xffff8001, 0x1ff, 0x0, r0, 0xffffffff, [], r1, r0, 0x1, 0x3}, 0x40) r2 = syz_open_dev$vcsu(&(0x7f00000020c0)='/dev/vcsu#\x00', 0x4, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vfio/vfio\x00', 0x0, 0x0) read$FUSE(r2, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000140)=@bpf_tracing={0x1a, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="180000000800000000000000030000008500000067000000"], &(0x7f0000000080)='syzkaller\x00', 0x3f, 0x0, 0x0, 0x41000, 0x9, [], r1, 0x17, r2, 0x8, &(0x7f00000000c0)={0x6, 0x1}, 0x8, 0x10, &(0x7f0000000100)={0x2, 0x8, 0xffff4b53, 0x800}, 0x10, 0x1440}, 0x78) r3 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x2) mmap$snddsp_control(&(0x7f0000ff9000/0x4000)=nil, 0x1000, 0x0, 0x11, r3, 0x83000000) r4 = syz_open_dev$vcsu(&(0x7f00000020c0)='/dev/vcsu#\x00', 0x4, 0x0) read$FUSE(r4, 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_STATUS64(r4, 0x80984120, &(0x7f00000002c0)) add_key$keyring(&(0x7f0000000200)='keyring\x00', &(0x7f0000000240)={'syz', 0x0}, 0x0, 0x0, 0x0) 16:51:49 executing program 0: r0 = socket$kcm(0x29, 0x2, 0x0) accept4$unix(r0, 0x0, 0x0, 0x0) 16:51:49 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8943, &(0x7f0000000280)={'vcan0\x00'}) 16:51:49 executing program 0: syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x2, &(0x7f00000018c0)=[{&(0x7f0000000780)='`', 0x1, 0x80000000}, {&(0x7f00000008c0)='@', 0x1}], 0x0, 0x0) 16:51:49 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = gettid() r2 = getpgrp(0x0) sendmmsg$unix(r0, &(0x7f00000001c0)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=[@cred={{0x1c, 0x1, 0x2, {r1, 0xee00, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r2, 0xee00}}}], 0x40}], 0x1, 0x0) 16:51:49 executing program 2: openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snd/seq\x00', 0x280) 16:51:49 executing program 5: syz_emit_ethernet(0x62, &(0x7f00000004c0)={@link_local, @link_local, @val={@void}, {@ipv6={0x86dd, @tipc_packet={0x0, 0x6, "d96a7e", 0x28, 0x6, 0x0, @mcast1, @remote, {[], @payload_named={{{{{0x28, 0x0, 0x0, 0x0, 0x0, 0xa}}}}}}}}}}, 0x0) 16:51:49 executing program 3: socket$inet(0x2, 0x80c, 0x0) 16:51:50 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) shutdown(r0, 0x0) connect$bt_l2cap(r0, &(0x7f0000000000)={0x1f, 0x0, @fixed}, 0xe) sendmmsg$inet(r0, &(0x7f0000003f00)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2a0}}], 0x500, 0x0) 16:51:50 executing program 2: sendmmsg$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0xbaed3cf2b4f12eb3) 16:51:50 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) sendmmsg$nfc_llcp(r0, &(0x7f0000000380)=[{&(0x7f0000000000)={0x27, 0x1, 0x0, 0x0, 0x0, 0x0, "27805fc120fe5127553439627f7578e92a19a9a49ee472e29fe8e19cedb080ba0c05b29ec2bedaa30ed3fd36a6ba3ca97f0f8f5a2f765f374ac40f9671bbf7"}, 0x60, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="10000008"], 0x10}], 0x1, 0x0) 16:51:50 executing program 3: io_setup(0x10000, &(0x7f0000000180)) io_setup(0x1a, &(0x7f0000000000)) 16:51:50 executing program 5: r0 = socket(0xa, 0x1, 0x0) connect$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="fede28b08537"}, 0x14) 16:51:50 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) ioctl$NBD_SET_SIZE_BLOCKS(r0, 0x125e, 0x536000) 16:51:50 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0xd, &(0x7f0000000980), 0x4) 16:51:50 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x6, 0x2}]}]}}, &(0x7f0000000180)=""/233, 0x2e, 0xe9, 0x1}, 0x20) 16:51:50 executing program 5: r0 = socket(0x11, 0x800000003, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000180)={'syztnl2\x00', &(0x7f0000000040)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}) 16:51:50 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000001180)=[{0x0}], 0x0, 0x0) 16:51:50 executing program 0: openat$nvme_fabrics(0xffffffffffffff9c, 0xfffffffffffffffd, 0x0, 0x0) [ 183.865555] sctp: [Deprecated]: syz-executor.2 (pid 14646) Use of int in maxseg socket option. [ 183.865555] Use struct sctp_assoc_value instead 16:51:50 executing program 2: r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f00000000c0)='ns/pid\x00') ioctl$NS_GET_PARENT(r0, 0xc020660b, 0x0) [ 184.128310] Bluetooth: hci5: command 0x0405 tx timeout 16:51:51 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) shutdown(r0, 0x0) connect$bt_l2cap(r0, &(0x7f0000000000)={0x1f, 0x0, @fixed={[], 0x10}}, 0xe) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000003f00)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2a0}}], 0x500, 0x0) 16:51:51 executing program 5: r0 = socket(0x2b, 0x1, 0x0) bind$nfc_llcp(r0, 0x0, 0x0) 16:51:51 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x18, 0x0, &(0x7f0000000040)) 16:51:51 executing program 2: syz_mount_image$udf(&(0x7f0000000000)='udf\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)='\x00BEA01', 0x6, 0x8000}, {&(0x7f0000000040)='\x00NSR02', 0x6, 0x8800}, {&(0x7f0000010300)="010002005f0001007b8ff001600000000100000000000000084c696e757855444600000000000000000000000000000000000000000000090100010003000300010000000100000008313233343536373831323334353637384c696e7578554446", 0x61, 0x18000}, {&(0x7f0000010400)="0000000000000019004f53544120436f6d7072657373656420556e69636f646500000000000000000000000000000000000000000000000000000000000000000000000000000000004f53544120436f6d7072657373656420556e69636f64650000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002a4c696e7578206d6b756466667300000000000000000004050000000000007810e4070913142c1a023848002a4c696e757820554446465300000000000000000000000405", 0xde, 0x180c0}, {&(0x7f0000010500)="000000000000000001", 0x9, 0x181e0}, {&(0x7f0000011400)="020002003700010077c9f00100010000004000006000000000400000e007", 0x1e, 0x40000}], 0x0, &(0x7f00000000c0)={[{@iocharset={'iocharset', 0x3d, 'iso8859-4'}}]}) 16:51:51 executing program 3: r0 = socket(0x2, 0x5, 0x0) sendmmsg$nfc_llcp(r0, &(0x7f0000006080)=[{&(0x7f0000000000)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "22363e0cf5a9182a000177eabef99494a4a17b4fb6a80b49f0b967f1cfb9b8adc5ec9e3ee87fbd2d7409c4429d4597bcc3af314b84b02db5d18d4f3cd59ad4"}, 0x60, &(0x7f0000000140)=[{&(0x7f0000000080)="af", 0x1}], 0x1, &(0x7f0000000340)={0x10}, 0x10}], 0x1, 0x0) 16:51:51 executing program 4: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$SIOCRSGCAUSE(r0, 0x89e0, &(0x7f00000000c0)) 16:51:51 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc0c89425, 0x0) 16:51:51 executing program 4: setuid(0xee00) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) 16:51:51 executing program 5: r0 = socket$kcm(0x29, 0x2, 0x0) recvmsg$kcm(r0, &(0x7f00000018c0)={0x0, 0x0, 0x0}, 0x0) sendmsg$NL80211_CMD_DEL_MPATH(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000340)={0x14, 0x0, 0x0, 0x0, 0x0, {{}, {@void, @void}}}, 0x14}}, 0x0) 16:51:51 executing program 0: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snd/seq\x00', 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000080)={{0x0, 0x7f}, 'port1\x00'}) [ 184.745813] UDF-fs: warning (device loop2): udf_load_vrs: No anchor found [ 184.792434] UDF-fs: Scanning with blocksize 512 failed 16:51:51 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) shutdown(r0, 0x0) connect$bt_l2cap(r0, &(0x7f0000000000)={0x1f, 0x0, @fixed={[], 0x10}}, 0xe) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000003f00)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2a0}}], 0x500, 0x0) 16:51:51 executing program 3: r0 = socket(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x89e0, 0x0) 16:51:51 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000200)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 16:51:51 executing program 0: request_key(&(0x7f0000000100)='pkcs7_test\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0xfffffffffffffff8) [ 184.834852] UDF-fs: warning (device loop2): udf_fill_super: No partition found (2) 16:51:51 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) shutdown(r0, 0x0) connect$bt_l2cap(r0, &(0x7f0000000000)={0x1f, 0x0, @fixed={[], 0x10}}, 0xe) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000003f00)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2a0}}], 0x500, 0x0) [ 184.934736] UDF-fs: warning (device loop2): udf_load_vrs: No anchor found [ 184.972663] UDF-fs: Scanning with blocksize 512 failed [ 184.989757] UDF-fs: warning (device loop2): udf_fill_super: No partition found (2) 16:51:51 executing program 2: syz_mount_image$udf(&(0x7f0000000000)='udf\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)='\x00BEA01', 0x6, 0x8000}, {&(0x7f0000000040)='\x00NSR02', 0x6, 0x8800}, {&(0x7f0000010300)="010002005f0001007b8ff001600000000100000000000000084c696e757855444600000000000000000000000000000000000000000000090100010003000300010000000100000008313233343536373831323334353637384c696e7578554446", 0x61, 0x18000}, {&(0x7f0000010400)="0000000000000019004f53544120436f6d7072657373656420556e69636f646500000000000000000000000000000000000000000000000000000000000000000000000000000000004f53544120436f6d7072657373656420556e69636f64650000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002a4c696e7578206d6b756466667300000000000000000004050000000000007810e4070913142c1a023848002a4c696e757820554446465300000000000000000000000405", 0xde, 0x180c0}, {&(0x7f0000010500)="000000000000000001", 0x9, 0x181e0}, {&(0x7f0000011400)="020002003700010077c9f00100010000004000006000000000400000e007", 0x1e, 0x40000}], 0x0, &(0x7f00000000c0)={[{@iocharset={'iocharset', 0x3d, 'iso8859-4'}}]}) 16:51:51 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000000180)={'wg1\x00'}) 16:51:51 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) shutdown(r0, 0x0) connect$bt_l2cap(r0, &(0x7f0000000000)={0x1f, 0x0, @fixed={[], 0x10}}, 0xe) sendmmsg$inet(r0, 0x0, 0x0, 0x0) 16:51:51 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000001740)={0x2020}, 0x2020) 16:51:51 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000380)='TIPCv2\x00') sendmsg$TIPC_NL_MON_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)={0x14, r1, 0x721}, 0x14}}, 0x0) [ 185.164529] UDF-fs: warning (device loop2): udf_load_vrs: No anchor found [ 185.173207] UDF-fs: Scanning with blocksize 512 failed [ 185.207774] UDF-fs: warning (device loop2): udf_fill_super: No partition found (2) 16:51:52 executing program 5: mlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) mbind(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x2, &(0x7f0000000000)=0x80000001, 0x2, 0x0) 16:51:52 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) accept$unix(r0, 0x0, 0x0) 16:51:52 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) shutdown(r0, 0x0) connect$bt_l2cap(r0, &(0x7f0000000000)={0x1f, 0x0, @fixed={[], 0x10}}, 0xe) sendmmsg$inet(r0, 0x0, 0x0, 0x0) 16:51:52 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x15, 0x0, &(0x7f0000000040)) 16:51:52 executing program 0: r0 = socket(0x2b, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x5411, &(0x7f00000008c0)={'team0\x00'}) 16:51:52 executing program 2: syz_mount_image$udf(&(0x7f0000000000)='udf\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)='\x00BEA01', 0x6, 0x8000}, {&(0x7f0000000040)='\x00NSR02', 0x6, 0x8800}, {&(0x7f0000010300)="010002005f0001007b8ff001600000000100000000000000084c696e757855444600000000000000000000000000000000000000000000090100010003000300010000000100000008313233343536373831323334353637384c696e7578554446", 0x61, 0x18000}, {&(0x7f0000010400)="0000000000000019004f53544120436f6d7072657373656420556e69636f646500000000000000000000000000000000000000000000000000000000000000000000000000000000004f53544120436f6d7072657373656420556e69636f64650000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002a4c696e7578206d6b756466667300000000000000000004050000000000007810e4070913142c1a023848002a4c696e757820554446465300000000000000000000000405", 0xde, 0x180c0}, {&(0x7f0000010500)="000000000000000001", 0x9, 0x181e0}, {&(0x7f0000011400)="020002003700010077c9f00100010000004000006000000000400000e007", 0x1e, 0x40000}], 0x0, &(0x7f00000000c0)={[{@iocharset={'iocharset', 0x3d, 'iso8859-4'}}]}) 16:51:52 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) shutdown(r0, 0x0) connect$bt_l2cap(r0, &(0x7f0000000000)={0x1f, 0x0, @fixed={[], 0x10}}, 0xe) sendmmsg$inet(r0, 0x0, 0x0, 0x0) 16:51:52 executing program 3: r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000240)={0x0, 0x9, 0x1, {0xb, @pix={0x0, 0x1f}}}) ioctl$VIDIOC_EXPBUF(r0, 0xc0405610, &(0x7f0000000000)={0xb, 0x0, 0x0, 0x0, 0xffffffffffffffff}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r1, 0x40046201, 0x0) 16:51:52 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFQNL_MSG_CONFIG(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000340)={0x14, 0x2, 0xa, 0x5}, 0x14}}, 0x0) [ 185.690047] UDF-fs: warning (device loop2): udf_load_vrs: No anchor found [ 185.725397] UDF-fs: Scanning with blocksize 512 failed 16:51:52 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x7c, 0x0, &(0x7f0000000040)) [ 185.738348] UDF-fs: warning (device loop2): udf_fill_super: No partition found (2) 16:51:52 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x7, 0x0, 0x0, 0x0, 0x408}, 0x40) 16:51:52 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000003940)={0x0, 0x0, &(0x7f0000003900)={&(0x7f0000000040)=ANY=[@ANYBLOB="3800000026001d03"], 0x38}}, 0x0) 16:51:52 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) shutdown(r0, 0x0) connect$bt_l2cap(r0, &(0x7f0000000000)={0x1f, 0x0, @fixed={[], 0x10}}, 0xe) sendmmsg$inet(r0, &(0x7f0000003f00), 0x0, 0x0) 16:51:52 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000000)={'team0\x00', 0x0}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @link_local}, 0x10) r2 = socket$packet(0x11, 0x3, 0x300) getsockopt$packet_int(r2, 0x107, 0xb, &(0x7f0000000040), &(0x7f0000000080)=0x4) 16:51:52 executing program 4: r0 = socket(0x18, 0x0, 0x1) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x80047453, 0x0) 16:51:52 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmmsg$sock(r0, &(0x7f0000001840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 16:51:52 executing program 2: syz_mount_image$udf(&(0x7f0000000000)='udf\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)='\x00BEA01', 0x6, 0x8000}, {&(0x7f0000000040)='\x00NSR02', 0x6, 0x8800}, {&(0x7f0000010300)="010002005f0001007b8ff001600000000100000000000000084c696e757855444600000000000000000000000000000000000000000000090100010003000300010000000100000008313233343536373831323334353637384c696e7578554446", 0x61, 0x18000}, {&(0x7f0000010400)="0000000000000019004f53544120436f6d7072657373656420556e69636f646500000000000000000000000000000000000000000000000000000000000000000000000000000000004f53544120436f6d7072657373656420556e69636f64650000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002a4c696e7578206d6b756466667300000000000000000004050000000000007810e4070913142c1a023848002a4c696e757820554446465300000000000000000000000405", 0xde, 0x180c0}, {&(0x7f0000010500)="000000000000000001", 0x9, 0x181e0}, {&(0x7f0000011400)="020002003700010077c9f00100010000004000006000000000400000e007", 0x1e, 0x40000}], 0x0, &(0x7f00000000c0)={[{@iocharset={'iocharset', 0x3d, 'iso8859-4'}}]}) [ 185.922994] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. 16:51:52 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) shutdown(r0, 0x0) connect$bt_l2cap(r0, &(0x7f0000000000)={0x1f, 0x0, @fixed={[], 0x10}}, 0xe) sendmmsg$inet(r0, &(0x7f0000003f00), 0x0, 0x0) 16:51:52 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000140)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000180)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0173c9495700000000000100000020000180160002"], 0x34}}, 0x0) 16:51:52 executing program 5: r0 = socket(0x2, 0x5, 0x0) ioctl$sock_SIOCDELRT(r0, 0x890c, &(0x7f0000000180)={0x0, @l2tp={0x2, 0x0, @remote}, @can, @ethernet={0x0, @link_local}}) 16:51:52 executing program 0: 16:51:52 executing program 4: [ 186.092231] UDF-fs: warning (device loop2): udf_load_vrs: No anchor found [ 186.127695] UDF-fs: Scanning with blocksize 512 failed 16:51:53 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8912, &(0x7f0000000280)={'vcan0\x00'}) 16:51:53 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={0x0, @bcast, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @bcast, 0x0, 0x4e, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @bcast, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null]}) 16:51:53 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) shutdown(r0, 0x0) connect$bt_l2cap(r0, &(0x7f0000000000)={0x1f, 0x0, @fixed={[], 0x10}}, 0xe) sendmmsg$inet(r0, &(0x7f0000003f00), 0x0, 0x0) 16:51:53 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000180)=""/233, 0x2e, 0xe9, 0x1}, 0x20) 16:51:53 executing program 3: r0 = socket(0x2b, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8946, &(0x7f00000008c0)={'team0\x00'}) [ 186.220341] UDF-fs: warning (device loop2): udf_fill_super: No partition found (2) 16:51:53 executing program 5: request_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0) 16:51:53 executing program 2: syz_mount_image$udf(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)='\x00BEA01', 0x6, 0x8000}, {&(0x7f0000000040)='\x00NSR02', 0x6, 0x8800}, {&(0x7f0000010300)="010002005f0001007b8ff001600000000100000000000000084c696e757855444600000000000000000000000000000000000000000000090100010003000300010000000100000008313233343536373831323334353637384c696e7578554446", 0x61, 0x18000}, {&(0x7f0000010400)="0000000000000019004f53544120436f6d7072657373656420556e69636f646500000000000000000000000000000000000000000000000000000000000000000000000000000000004f53544120436f6d7072657373656420556e69636f64650000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002a4c696e7578206d6b756466667300000000000000000004050000000000007810e4070913142c1a023848002a4c696e757820554446465300000000000000000000000405", 0xde, 0x180c0}, {&(0x7f0000010500)="000000000000000001", 0x9, 0x181e0}, {&(0x7f0000011400)="020002003700010077c9f00100010000004000006000000000400000e007", 0x1e, 0x40000}], 0x0, &(0x7f00000000c0)={[{@iocharset={'iocharset', 0x3d, 'iso8859-4'}}]}) 16:51:53 executing program 4: r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f00000000c0)='ns/pid\x00') ioctl$NS_GET_PARENT(r0, 0x2, 0x0) 16:51:53 executing program 0: r0 = socket(0x2b, 0x1, 0x0) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 16:51:53 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000040)={'vlan0\x00', @ifru_addrs=@rc={0x1f, @none}}) 16:51:53 executing program 3: r0 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_HW_REFINE(r0, 0xc2604110, &(0x7f0000002bc0)={0x0, [[0x92980000], [0xfffffff8], [0x2000]], [], [{0x0, 0x100}, {0x0, 0x4}, {0x0, 0x7}, {0x0, 0x600}]}) 16:51:53 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x9a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 16:51:53 executing program 4: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rfkill\x00', 0x0, 0x0) read$rfkill(r0, 0x0, 0x0) 16:51:53 executing program 3: r0 = socket(0x2b, 0x1, 0x1) sendmsg$L2TP_CMD_SESSION_DELETE(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x20000000) 16:51:53 executing program 0: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, r0) add_key(&(0x7f0000000280)='encrypted\x00', &(0x7f00000002c0)={'syz', 0x2}, 0x0, 0x0, r1) 16:51:53 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@ptr]}}, &(0x7f0000000040)=""/233, 0x26, 0xe9, 0x8}, 0x20) 16:51:53 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001180)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="b5eed4af01db22b7c134010000007a15", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) read$alg(r1, &(0x7f0000001480)=""/4096, 0x1000) writev(r1, &(0x7f0000000580)=[{&(0x7f00000002c0)="573c8c7bde40e2d804772a60c2f49b5296ebbbbb0c2225be32", 0x19}, {&(0x7f0000000300)="86ea340e31566e3bfc209410a94cca5ea945e47f33aa2009dca6454207a050", 0x1f}, {&(0x7f0000000480)="028b3d11e4c5f4108a53891e7847cc8b2f6e5137a26193e78e6fc2ef0fabe6fef373f5654201bcb3d3a6bc85b27f4db01844e416ae142eda68a115022992b37d3d5b65ca0a5ebd1143af6ad1637372a43b7908da1c872faceb454ea27f036f1e8ef4768b5d13d12ce15e6c15aa4757d94f9203cda060d6231e82ae8b1d9dad2219d3f57a3af93180594b99a0d4c3c734a5371613773a8e9a0b1a417dc0990377ddc9bb6eb0093648dcee54511c7974025588f3d576e48392c21cca8a8c45e25fb2d27e5ee797831b99a2e57353", 0xcd}, {&(0x7f0000000340)="9e5b639aeba9ba0760d409c74ce1496fcbc8c3090ec64b9875fcb289821c204c697f6005003c1a4c0dbc078f1fd8d6efb989e0db8924", 0x36}, {&(0x7f0000000380)="941b458057bd02df42c1882fceedee9dd5", 0x11}, {&(0x7f0000002480)="75b10d4017a2e0aa1c9cd03f10cf5b5dffb0f57c50eeb3a0d5046d87ff2ef73520aebf911453ea45e8877c694155c0f8dd424117f9ec0dff0fc3ca6d50c2c9a987df728eca63d946cf85b13da14823df9624fdfd333e48c6fbd0da0cb6d9283ece4613b71331603b008b4340b5e90a25501a15c8b9525386f986045695cf36d9bbfcc05bebb1f35a49172cd5f92d338ec8083d914260b1f614a7125b097577f2e2c1843a0573b1c78a74ffd8c8b754cce78b549ac004c8f772a35d2efefcda03000d5fd991069d7544f1fc7385d099245f8a98ed612626b625306f2ad006ede9e7ade5966d89ca6726d94ffe6e164165eca263f071d8e5ee2135c34228b67032eca3e81b377e4d040d0ecfc7a14c419caa6a4d60d7035e9bb63fc28e713b217ae4e9e404aea75cef9cf5997e304cf855de66923fc5bf74f4218fccbe71e2a59c15aa45cc540ad0d3f3204d1df76e3b1075120ee1df02053ad9b71420009058cec5951770f299814983afa481c83b8ba78b7f5f579b29e0756adbf3e556b7139cd8cd57702e835db2430bc9b3c06633a94c60373963c6ce7b8af50272249cad36fde6963207cebdc5c8408870c71e1fbe4abb11163ed314129eae92828654d4f2790aa527903a3ec129f2fda9c79fd09ecb35b396efa57ed804dffd17b503903227d66861a8cfd62fec6d0d5e7f2122675dea026d8a43ffaeeab89c6bc9f9a387484c54366ecfc07d713dcf66289c0901972342437fd269f6bf146ea3d0699822e51a361624e11124e74fb4be40fabe3d9b3053636426bf990ae8025585c06bd12ccd1f1b1fa148986e42a061dab663fd59178a878edd399fc0e2bd22343357b1c283532583c0ac22d6a9f625ef5bee577fba11685fa639564ef036a4afbf70ac564b1173ab866ec9fce645353a16b0f0de19e4515c3c836d750e7819768a0fbb89beee029d3c0d9e003c33a3ba477b435afbe4ca715094b996a34d3f49ef5dee055d7224489e0e159de2ee486c9079250c8ed35e7ae4c138482d489279fd798c9a8b909f48e300c7ef30b5f744e891583b6568abc15ac6ebd6fec917d4f7140428e22408e13c0b8a23ea9065231dc58b139ce7153a37c73220cf6bce6203a00a0ef7fdd34a1c48aee8bc88f473698df7ad7d07973c4a973655567985c42ee4a5ea81c7c0ed2e8de57359e7706cc725587390be91f4058f6ace3285c9174ae94fa04232c205dce247ae8fa95e6e75cf011b0fe32b28e25b62619938686011d5d24164bec00fbc96d54be76e67f0a7144f12e88ad7321f7a9058c9a5b717e0b3c69b23e6395b2d0f778dc32c6f88b29a85ce979fce04a277e655155c3334131641d8726bd663f29917693a24157ad597e96e64b50e4e291379f091c744ff7f2d51f263ff01e2d896054311e109f8aca6c5ecd2c5f366175e8bbdf2a3d993f11f8f3fd29770797f1f8f2c5f6f9036f4b65ec039f962dbf54ea938b66c16b9f80f3f96b8c4774f79f9f0251e79326e33a16c3fc28eed79c8f44c8de6d33df7049cb5ce15dfb067137984a463b5f9a6e795428fecef5104ecdd779e10c5b069104e6da4c8c62c61b48201a79e99ae66214b8173e286b2946fd3a15b1c337ac80797b41b5125070c3a0743b1165778631e4e710394c723e6cf56a0bd4d3df4275c78411d3204aa787bb7e9d2f92a7f6e7bdd0ddd25ab741695cdcf594ae560a2df635c0821bd238eb0c54e904c3a4c8f226b95fceadbca7c9c48e708a0dfd3d4eb81ed3480d86095bdf3105f36c6025bb06f0b6bd7b45c3d65450c14bc2b589308672f84dad4623073b55fc7f1965e210f357a8a239c08c00e39b532799eb97f93e2bbbb335e4200ea0bec8b27fed8a7321d1bce69173f5c11b2411e6eb0f22fe7bf3cf8d062d6d07a8fe47d42dd1826885dd71a36c1a00a2dfe50836d7a89f0baecbe24b3f5d08e0f7700612e75e8ce2e9b610a8bdd016428e7a3d1126cfcb1062c5a7870b6d0cedc1dbb5de310a6e455fe453123e96251a4705c9a2b9c1ca747c339f2ca55b55273b5c9faa5beaabb4cb4ebd1dbc3f9af08e5861c58c342ca57ca7e4f10e7b150f8dc7b5f03a954d672e17f6ceb4de606ea1327e7c8b49a5d65f5adf9bbaaeb87137193cf7607cf7be93a93d6bf570a80104d4cd905eedee30e760a2f511010894dddd2cf402bb40a2e8e35c724a9d805a75a0b742424ca7137500eedf6fa00fa5926a3f0568e198e177d511f7142ac6b1463fb7d536cfe57d484107fcd6bf917f316f5530078a99ed6acac0ebdc4c9ee2e054dd6201c710946189ca9b2a73a202abc2baff3fdb07da619adf81d16d0c6dcb9b0b7ce452ee1de6d311ace032d7b5d190cc14a45da3053736c1d065d3098c329aba2312107aa810acd5a10d35075cb2814c04f2442043d895226e11c5aa130eb53d9bf5528ba0aba59b4980825ad32098c24b506296415d83e61d5c27c2023993897927e715b6e26fdd191f35a200d2ec53e3f4117b8acd6f842c1de91baddb32fe10d6a2f2cf42a58c5db69cf8637f91f4503855c59c01c5430dbc627a5571c361db5a1ce946e8b965784483888cbf6eb57ae70b4edddcd4cf9c8c1779d42412e43cf2a63040f04b2d1f7d2d7695f24c3324456c8aec7e0efe83429a95f5dff2bb27e590cb206063186e320f43ca38dcc3e6d7e3d803fc0a2c046bb67495ae0efa44eac7d446061d5e0565f17bad1c845d7b5a6ed61fffa3b9a310e5f3e2d9f387b713c74c2f08f6b3c7fdd2dab28a7a6ed7f494890075825041bb1de7d741bac823ad814fdf1fbad061bb2aa6a19314d824ea82457556cc4e4919a6c4d94d6da9f91b2b730906f51ae18a591583edff71ca83963c65ab35821baf345fe916ac8f0da5be95e7ce6c8c29876310570a6add4a0b7267ce0e0fc3389d419d76bbe167808464fb4243f6b65178c161f82d27c3ac70a774075eef882a46b4e239bf2ddb30c48ce19e28bc708a4b4488a0fd610a54b9fa64c3fa3db71280252e7b6abfdc8202339d725d20f41f844b3f63c30cf6bde32643a403ccd552fbb269c97af01f06338f075d04dad99bb47b5c16ffdd14632673b95c2b180462203cb2b1dcd469943b3fec1e50f7909062a26525523f239f31bdb4b6f9c9e280048cb5cb0757ec70af1538ea8a402d8ab56d2093aa0cb9f80eb56bb179ef4cb1ceb788623c9e81bc87d8902c5878693e8be15ca67a19725e46be20aa3fc8c570b493e5581ea81293db0e4e4d1280d69f50a691127a62a17151c6026e7ce0caadef21861f0c3806d2ac87130363a94943cae814be1f8e2cb7e32aa648d62a1412793ad3ab9ba6a0eb93865e56773bf8976fe8b5c5161301df523017aefdacd89e7356f253e3eb81d107acb9a779769b6dbf7888ae1d6f0014e7d7dfaf37a02eb071fe90a13734d850dacc7d2c6d693529d6844f1938207b0611725ce431d46765a33e4f8029e40a070966b4b9a74827818fa6d2a50e1ff8bef0c61c6a1d4f7ad32af8a835280d57192ffcde151a0228149f5856fe97db3ec464771924e4b654993139f2ce92944194bfe2fb61cec7e4a2b33a6494f69a19dc2b5de88fd0122b7a147fd43699f1c0961592ed29a0e380c3439f467fd28d801728541ec3df72c291bd487de2dd32865f02a1a512295d5285c895c32923d46ce164e1fc69cfa1f252ea9fc1621bc97737d36633ad4de10b9e7b9eceb19b1d612481cffc098bf95797dbbfd1cc619510b79de817d60b89d6600183adfccec1358d436f7ac7a73caf38af4cff448f74ef9479d32a1395fdf19771d3f6cdc8fae148f84ed3dc1be5938bdeb8be0e4703613f82f3007590a25eb2aa2bdf3cf13448c4017e2aaee75e6ab7a6ae224d54da920ae29e38798b115f0f2e5a6c7b322ecb4a4f63a0d1d1ff5523d6f921c1eeb6e162437bc41e0fce4219048d40f2abb6f77818793f1689d33a14ef65fc4179602e550c076c398760a28e2c89a53665bd910243da49d6e38373954ff95a5dd7bf0e2f2c613ea913fcfd77feeddc27ef872a85047e531ef1660f113d51080fb7b590e4ca051e54e238e07e4447363b7b9e17cdf6040063760351c02260e6ed59bda14c32c00d0e8a6298a83e7cc24c2f1306728d904694b6d627c59187a2ba34c5a3d2046672de60e0707a10c40b0ec2ac3cd2cf102bf04daa007ad2457f826479e674df56a55b08048cf374947dc41158e2b36f9aa1fe227940c2099c8fc32873054070bb15a41582bc1a303f5c4fac64ff89e2b23d6019a9c1d10dcf0b93a01a7f9616bc901e4b17192ba8261259e269bd02e4905ff5f27723f547541d6ae6a5be00decd22d66eb154c9bbb21afa51721f2f1b286189890243dd76d4becd43ccc6b0ff11ef63d91ba812eda6e7f229168362963596236f78862ea1f1ac7ebc312bea680fd021e6e608b25ba1f5fe99d181bc32a284ee670db304ee187dd03d4c242d50d32da15706c6a55f78d0b97ad9c4d9904183ec815cf445f0bc6f9f8eb562191422b27fe2195bf05b64b0d69e91b708c400d0428053436b09e22626c849d41038f2cd69e159487c0991071a9fd59e7844cb5031446f9c68b34650ef59320070ab8760bd77f8e94255b7994e845df058bfeb72ccd0c4bb6b672f73dbc49c09695d0cd5d35e0b4143a4f48cd49e815367e4ea88abf3dea2f7e46624596d43994ff5e515f0a85129de1126811eaf2f69bf7f097c1a24c9690b77edff6fd4f38d01bd43a1fcaae8116227e34fe0ec0f0716249fe3c1532e4f8f0c1f68d6b91a88c6de6a5395e1a1819abbf2f44825b3b93453a72669f510faf82857e36f6ec8269dc3aeec1c5f098bef8e934ee39dce4e77f7aaba1134ca9c169eb9c6a8787908f13adeea97d97ec4f323dcd45f26b93a66877741a3d5f12a99415364788c2f76710de255b27b70c187a2402da1c4d017da144966337d43197adce08e60c84111d13851d9ea93dd17dad585928ff26fb48e00f22c2783afce7ad9f861ce04283004bf32c9e3ad513edc2f623e4677f16ec889790d138d6e7623992486f14e84f622ce8a3590b080d2178c622a45a2400708eaa7d33879e923337aa0e9b981a47fda7a94ad919ce0d3a93ac42dabd4c47d6fb3faa3bb967cb91f213386effb6ba51dc2b4ae3ee87c59f7a52e695b30661d6d573e60561d15a6d8eed96deafde3c48801867d852b59eab6aa334234d17df731b63538652ea2d702b43d5082a0648f4d89e70e832cecdd89bd86abffcefbeb9f36c1024a006f9d76f4d05", 0xe94}], 0x6) 16:51:53 executing program 2: syz_mount_image$udf(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)='\x00BEA01', 0x6, 0x8000}, {&(0x7f0000000040)='\x00NSR02', 0x6, 0x8800}, {&(0x7f0000010300)="010002005f0001007b8ff001600000000100000000000000084c696e757855444600000000000000000000000000000000000000000000090100010003000300010000000100000008313233343536373831323334353637384c696e7578554446", 0x61, 0x18000}, {&(0x7f0000010400)="0000000000000019004f53544120436f6d7072657373656420556e69636f646500000000000000000000000000000000000000000000000000000000000000000000000000000000004f53544120436f6d7072657373656420556e69636f64650000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002a4c696e7578206d6b756466667300000000000000000004050000000000007810e4070913142c1a023848002a4c696e757820554446465300000000000000000000000405", 0xde, 0x180c0}, {&(0x7f0000010500)="000000000000000001", 0x9, 0x181e0}, {&(0x7f0000011400)="020002003700010077c9f00100010000004000006000000000400000e007", 0x1e, 0x40000}], 0x0, &(0x7f00000000c0)={[{@iocharset={'iocharset', 0x3d, 'iso8859-4'}}]}) 16:51:53 executing program 3: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$inet_opts(r0, 0x0, 0x8, &(0x7f0000000000)='b', 0x1) 16:51:53 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@ptr={0x0, 0x0, 0x0, 0xa}]}}, &(0x7f0000000040)=""/233, 0x26, 0xe9, 0x1}, 0x20) 16:51:53 executing program 4: r0 = socket(0x1e, 0x1, 0x0) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r0, 0x6, 0x25, 0x0, 0x300) 16:51:53 executing program 5: keyctl$search(0x2, 0x0, 0x0, &(0x7f0000002400)={'syz', 0x0}, 0x0) 16:51:53 executing program 3: syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000001180)=[{&(0x7f0000001140)="5dec1bfeb0100c", 0x7, 0x6}], 0x0, 0x0) 16:51:53 executing program 4: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snd/seq\x00', 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r0, 0xc05c5340, &(0x7f0000000140)) 16:51:53 executing program 5: r0 = socket(0x2b, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8970, &(0x7f00000008c0)={'team0\x00'}) 16:51:53 executing program 0: syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x1, &(0x7f00000018c0)=[{&(0x7f00000008c0)="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", 0x741}], 0x0, 0x0) 16:51:53 executing program 2: syz_mount_image$udf(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)='\x00BEA01', 0x6, 0x8000}, {&(0x7f0000000040)='\x00NSR02', 0x6, 0x8800}, {&(0x7f0000010300)="010002005f0001007b8ff001600000000100000000000000084c696e757855444600000000000000000000000000000000000000000000090100010003000300010000000100000008313233343536373831323334353637384c696e7578554446", 0x61, 0x18000}, {&(0x7f0000010400)="0000000000000019004f53544120436f6d7072657373656420556e69636f646500000000000000000000000000000000000000000000000000000000000000000000000000000000004f53544120436f6d7072657373656420556e69636f64650000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002a4c696e7578206d6b756466667300000000000000000004050000000000007810e4070913142c1a023848002a4c696e757820554446465300000000000000000000000405", 0xde, 0x180c0}, {&(0x7f0000010500)="000000000000000001", 0x9, 0x181e0}, {&(0x7f0000011400)="020002003700010077c9f00100010000004000006000000000400000e007", 0x1e, 0x40000}], 0x0, &(0x7f00000000c0)={[{@iocharset={'iocharset', 0x3d, 'iso8859-4'}}]}) 16:51:53 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendto(r0, 0x0, 0x0, 0x0, &(0x7f0000000340)=@l2tp6={0xa, 0x0, 0x0, @dev}, 0x80) 16:51:53 executing program 1: r0 = socket(0x2b, 0x1, 0x0) sendmsg$NL80211_CMD_STOP_NAN(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x20000000) 16:51:53 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) 16:51:53 executing program 4: r0 = syz_open_dev$vim2m(&(0x7f0000000040)='/dev/video#\x00', 0x8, 0x2) ioctl$vim2m_VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f0000000140)={0x0, 0x1, 0x4, 0x0, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "2398baf1"}, 0x0, 0x0, @userptr}) 16:51:53 executing program 1: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000002280)={0x10, 0x3}, 0x10) 16:51:53 executing program 5: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) ioctl$NBD_SET_SIZE_BLOCKS(r0, 0x127b, 0x0) 16:51:53 executing program 0: r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_buf(r0, 0x0, 0x28, 0x0, 0x0) 16:51:54 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) sendmmsg$nfc_llcp(r0, &(0x7f0000000380)=[{&(0x7f0000000000)={0x27, 0x1, 0x0, 0x0, 0x0, 0x0, "27805fc120fe5127553439627f7578e92a19a9a49ee472e29fe8e19cedb080ba0c05b29ec2bedaa30ed3fd36a6ba3ca97f0f8f5a2f765f374ac40f9671bbf7"}, 0x60, &(0x7f0000000240)=[{&(0x7f0000000080)="d32e04a008df938b16aea1480800", 0x1000e}], 0x1}], 0x1, 0x0) 16:51:54 executing program 5: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_DATAGRAM_SEND(r0, 0x7ab, 0x0) 16:51:54 executing program 0: r0 = socket(0x2b, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x89b0, &(0x7f00000008c0)={'team0\x00'}) 16:51:54 executing program 4: r0 = socket(0x23, 0x5, 0x0) setsockopt$packet_rx_ring(r0, 0x113, 0x5, 0x0, 0x0) 16:51:54 executing program 1: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000001180)=[{&(0x7f0000000140)="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", 0x1000}], 0x0, 0x0) 16:51:54 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x2, 0xf4240, &(0x7f00000001c0)=@raw=[@call, @exit], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x96, &(0x7f0000000240)=""/150, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 16:51:54 executing program 2: syz_mount_image$udf(&(0x7f0000000000)='udf\x00', 0x0, 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)='\x00BEA01', 0x6, 0x8000}, {&(0x7f0000000040)='\x00NSR02', 0x6, 0x8800}, {&(0x7f0000010300)="010002005f0001007b8ff001600000000100000000000000084c696e757855444600000000000000000000000000000000000000000000090100010003000300010000000100000008313233343536373831323334353637384c696e7578554446", 0x61, 0x18000}, {&(0x7f0000010400)="0000000000000019004f53544120436f6d7072657373656420556e69636f646500000000000000000000000000000000000000000000000000000000000000000000000000000000004f53544120436f6d7072657373656420556e69636f64650000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002a4c696e7578206d6b756466667300000000000000000004050000000000007810e4070913142c1a023848002a4c696e757820554446465300000000000000000000000405", 0xde, 0x180c0}, {&(0x7f0000010500)="000000000000000001", 0x9, 0x181e0}, {&(0x7f0000011400)="020002003700010077c9f00100010000004000006000000000400000e007", 0x1e, 0x40000}], 0x0, &(0x7f00000000c0)={[{@iocharset={'iocharset', 0x3d, 'iso8859-4'}}]}) 16:51:54 executing program 0: r0 = socket(0x2a, 0x2, 0x0) getsockname$unix(r0, 0x0, &(0x7f00000000c0)) 16:51:54 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendto(r0, &(0x7f0000000000)='bG', 0x2, 0x0, &(0x7f0000000340)=@l2tp6={0xa, 0x0, 0x0, @empty}, 0x80) 16:51:54 executing program 4: r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, r0) r2 = add_key(&(0x7f0000000080)='id_resolver\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000002340)='=', 0x1, r1) keyctl$search(0x11, r2, 0x0, 0x0, 0x0) 16:51:54 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x8, 0x0, &(0x7f0000000040)) 16:51:54 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000002400)) 16:51:54 executing program 5: mmap$dsp(&(0x7f00007ff000/0x800000)=nil, 0x800000, 0x0, 0xb3f87a59ea795371, 0xffffffffffffffff, 0x0) 16:51:54 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) ioctl$NBD_SET_SIZE_BLOCKS(r0, 0x80081272, 0x0) 16:51:54 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x2, 0x0) ioctl$DRM_IOCTL_MODE_GETPROPBLOB(r0, 0xc01064ac, &(0x7f0000000140)={0x0, 0x0, 0x0}) 16:51:54 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)) 16:51:54 executing program 2: syz_mount_image$udf(&(0x7f0000000000)='udf\x00', 0x0, 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)='\x00BEA01', 0x6, 0x8000}, {&(0x7f0000000040)='\x00NSR02', 0x6, 0x8800}, {&(0x7f0000010300)="010002005f0001007b8ff001600000000100000000000000084c696e757855444600000000000000000000000000000000000000000000090100010003000300010000000100000008313233343536373831323334353637384c696e7578554446", 0x61, 0x18000}, {&(0x7f0000010400)="0000000000000019004f53544120436f6d7072657373656420556e69636f646500000000000000000000000000000000000000000000000000000000000000000000000000000000004f53544120436f6d7072657373656420556e69636f64650000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002a4c696e7578206d6b756466667300000000000000000004050000000000007810e4070913142c1a023848002a4c696e757820554446465300000000000000000000000405", 0xde, 0x180c0}, {&(0x7f0000010500)="000000000000000001", 0x9, 0x181e0}, {&(0x7f0000011400)="020002003700010077c9f00100010000004000006000000000400000e007", 0x1e, 0x40000}], 0x0, &(0x7f00000000c0)={[{@iocharset={'iocharset', 0x3d, 'iso8859-4'}}]}) 16:51:54 executing program 5: r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000080)='pkcs7_test\x00', 0x0, &(0x7f00000001c0)="301680ef3965e051812624632576e615c865e61774a1e742", 0x18, r0) 16:51:54 executing program 4: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDCTL_TMR_STOP(r0, 0x5403) 16:51:54 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_mreqn(r0, 0x0, 0x15, 0x0, &(0x7f0000000040)) 16:51:54 executing program 3: prctl$PR_SET_SECUREBITS(0x8, 0x0) 16:51:54 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x5, 0x4, 0x4587, 0x9, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x40) 16:51:54 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendto(r0, &(0x7f0000000000)='\aG!R', 0x4, 0x0, &(0x7f0000000340)=@l2tp6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3a]}}, 0x80) 16:51:54 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001bc0)={0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f0000008280)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000001600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xffffffffffffffff}}}], 0x20}], 0x1, 0x0) 16:51:54 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x2f, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000040)=""/233, 0x1a, 0xe9, 0x1}, 0x20) 16:51:54 executing program 2: syz_mount_image$udf(&(0x7f0000000000)='udf\x00', 0x0, 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)='\x00BEA01', 0x6, 0x8000}, {&(0x7f0000000040)='\x00NSR02', 0x6, 0x8800}, {&(0x7f0000010300)="010002005f0001007b8ff001600000000100000000000000084c696e757855444600000000000000000000000000000000000000000000090100010003000300010000000100000008313233343536373831323334353637384c696e7578554446", 0x61, 0x18000}, {&(0x7f0000010400)="0000000000000019004f53544120436f6d7072657373656420556e69636f646500000000000000000000000000000000000000000000000000000000000000000000000000000000004f53544120436f6d7072657373656420556e69636f64650000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002a4c696e7578206d6b756466667300000000000000000004050000000000007810e4070913142c1a023848002a4c696e757820554446465300000000000000000000000405", 0xde, 0x180c0}, {&(0x7f0000010500)="000000000000000001", 0x9, 0x181e0}, {&(0x7f0000011400)="020002003700010077c9f00100010000004000006000000000400000e007", 0x1e, 0x40000}], 0x0, &(0x7f00000000c0)={[{@iocharset={'iocharset', 0x3d, 'iso8859-4'}}]}) 16:51:54 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000140)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000180)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0100000000000000000001000000200002"], 0x34}}, 0x0) 16:51:54 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) sendmmsg$nfc_llcp(r0, &(0x7f0000000380)=[{&(0x7f0000000000)={0x27, 0x1, 0x0, 0x0, 0x0, 0x0, "27805fc120fe5127553439627f7578e92a19a9a49ee472e29fe8e19cedb080ba0c05b29ec2bedaa30ed3fd36a6ba3ca97f0f8f5a2f765f374ac40f9671bbf7"}, 0x60, &(0x7f0000000240)=[{&(0x7f0000000080)="d32e04a008df938b16aea1488864", 0xe}], 0x1}], 0x1, 0x0) 16:51:54 executing program 3: r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f00000002c0)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) 16:51:54 executing program 5: r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000180)='/dev/urandom\x00', 0x0, 0x0) ioctl$RNDADDTOENTCNT(r0, 0x5207, 0x0) 16:51:54 executing program 4: r0 = syz_open_dev$vim2m(&(0x7f0000000780)='/dev/video#\x00', 0x0, 0x2) ioctl$vim2m_VIDIOC_DQBUF(r0, 0xc0585611, &(0x7f00000001c0)={0x0, 0x2, 0x4, 0x0, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "f5ebf594"}, 0x0, 0x0, @planes=0x0}) 16:51:54 executing program 2: syz_mount_image$udf(&(0x7f0000000000)='udf\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@iocharset={'iocharset', 0x3d, 'iso8859-4'}}]}) 16:51:54 executing program 0: syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x20, 0x0) 16:51:54 executing program 1: r0 = socket(0x2b, 0x1, 0x0) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r0, 0x6, 0x21, 0x0, 0x300) 16:51:54 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) sendmmsg$nfc_llcp(r0, &(0x7f0000000380)=[{&(0x7f0000000000)={0x27, 0x1, 0x0, 0x0, 0x0, 0x0, "27805fc120fe5127553439627f7578e92a19a9a49ee472e29fe8e19cedb080ba0c05b29ec2bedaa30ed3fd36a6ba3ca97f0f8f5a2f765f374ac40f9671bbf7"}, 0x60, &(0x7f0000000240)=[{&(0x7f0000000080)="d32e04a008df938b16aea148986f", 0x2000008e}], 0x1, &(0x7f0000000280)={0x10}, 0x10}], 0x1, 0x0) 16:51:54 executing program 2: syz_mount_image$udf(&(0x7f0000000000)='udf\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@iocharset={'iocharset', 0x3d, 'iso8859-4'}}]}) 16:51:54 executing program 4: r0 = socket(0x2b, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x89a1, &(0x7f00000008c0)={'team0\x00'}) 16:51:54 executing program 0: r0 = syz_open_dev$ndb(&(0x7f0000000080)='/dev/nbd#\x00', 0x0, 0xa0900) ioctl$NBD_SET_SIZE_BLOCKS(r0, 0xab07, 0x0) 16:51:54 executing program 3: r0 = socket(0x22, 0x2, 0x1) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x7) 16:51:54 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000000)='devlink\x00') sendmsg$DEVLINK_CMD_RELOAD(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)={0x64, r1, 0x1, 0x0, 0x0, {}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, 0xffffffffffffffff}}, {@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_ID={0x8}}]}, 0x64}}, 0x0) 16:51:54 executing program 3: r0 = socket(0x22, 0x2, 0x1) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, 0x0, 0x0) 16:51:54 executing program 0: r0 = socket(0xa, 0x5, 0x0) bind$unix(r0, 0x0, 0x0) 16:51:54 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000080)={'batadv_slave_1\x00', 0x0}) r2 = socket$packet(0x11, 0x2, 0x300) sendto$packet(r2, 0x0, 0x0, 0x0, &(0x7f0000000580)={0x11, 0x8906, r1}, 0x14) 16:51:54 executing program 5: r0 = socket$inet_dccp(0x2, 0x6, 0x0) accept$inet(r0, 0x0, 0x0) 16:51:54 executing program 2: syz_mount_image$udf(&(0x7f0000000000)='udf\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@iocharset={'iocharset', 0x3d, 'iso8859-4'}}]}) 16:51:54 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@ptr={0x0, 0x0, 0x0, 0xe}]}}, &(0x7f0000000040)=""/233, 0x26, 0xe9, 0x1}, 0x20) 16:51:55 executing program 0: r0 = syz_open_dev$cec(&(0x7f00000000c0)='/dev/cec#\x00', 0x1, 0x2) ioctl$VIDIOC_QBUF(r0, 0xc058560f, 0x0) 16:51:55 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_mreqn(r0, 0x0, 0x12, 0x0, &(0x7f0000000040)) 16:51:55 executing program 4: syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001180)=[{0x0}, {&(0x7f0000001140)="5dec1bfeb0100c", 0x7, 0x6}], 0x0, 0x0) 16:51:55 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendto(r0, &(0x7f0000000000)='\aG!R', 0x4, 0x0, &(0x7f0000000340)=@l2tp6={0xa, 0x0, 0x0, @remote, 0x3}, 0x80) 16:51:55 executing program 2: syz_mount_image$udf(&(0x7f0000000000)='udf\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)='\x00BEA01', 0x6, 0x8000}, {&(0x7f0000000040)='\x00NSR02', 0x6, 0x8800}, {&(0x7f0000010300)="010002005f0001007b8ff001600000000100000000000000084c696e757855444600000000000000000000000000000000000000000000090100010003000300010000000100000008313233343536373831323334353637384c696e7578554446", 0x61, 0x18000}, {&(0x7f0000010400)="0000000000000019004f53544120436f6d7072657373656420556e69636f646500000000000000000000000000000000000000000000000000000000000000000000000000000000004f53544120436f6d7072657373656420556e69636f64650000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002a4c696e7578206d6b756466667300000000000000000004050000000000007810e4070913142c1a023848002a4c696e757820554446465300000000000000000000000405", 0xde, 0x180c0}, {&(0x7f0000010500)="000000000000000001", 0x9, 0x181e0}], 0x0, &(0x7f00000000c0)={[{@iocharset={'iocharset', 0x3d, 'iso8859-4'}}]}) 16:51:55 executing program 3: sendmsg$NL80211_CMD_GET_MESH_CONFIG(0xffffffffffffffff, &(0x7f0000000900)={0x0, 0x0, &(0x7f00000008c0)={&(0x7f0000000180)={0x15, 0x0, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f0000000600)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)}], 0x49249ff, 0x0) 16:51:55 executing program 1: r0 = syz_open_dev$sndpcmc(&(0x7f00000001c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_HWSYNC(r0, 0x4122, 0x0) 16:51:55 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendto(r0, &(0x7f0000000000)='\aG!R', 0x4, 0x0, &(0x7f0000000340)=@l2tp6={0xa, 0x3a00, 0x0, @remote}, 0x80) 16:51:55 executing program 5: keyctl$search(0x1e, 0x0, 0x0, 0x0, 0x0) 16:51:55 executing program 3: syz_mount_image$v7(&(0x7f0000000040)='v7\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{0x0}], 0x0, &(0x7f0000000200)) 16:51:55 executing program 0: r0 = socket(0x2c, 0x3, 0x0) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r0, 0x6, 0xd, 0x0, 0x3) 16:51:55 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000180), 0x4) 16:51:55 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) 16:51:55 executing program 5: recvmsg$can_raw(0xffffffffffffffff, 0x0, 0x80000020) [ 188.372086] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=512, location=512 [ 188.383453] VFS: could not find a valid V7 on loop3. [ 188.392251] UDF-fs: warning (device loop2): udf_load_vrs: No anchor found [ 188.403672] UDF-fs: Scanning with blocksize 512 failed 16:51:55 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x19, 0x4, 0x0, 0x5}, 0x40) [ 188.463044] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=256, location=256 [ 188.484932] VFS: could not find a valid V7 on loop3. 16:51:55 executing program 1: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_PIE_OFF(r0, 0x7006) [ 188.505385] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=512, location=512 [ 188.551980] UDF-fs: warning (device loop2): udf_load_vrs: No anchor found [ 188.582494] UDF-fs: Scanning with blocksize 1024 failed [ 188.590634] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=256, location=256 [ 188.644662] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=512, location=512 [ 188.654743] UDF-fs: warning (device loop2): udf_load_vrs: No anchor found [ 188.663233] UDF-fs: Scanning with blocksize 2048 failed [ 188.671204] UDF-fs: warning (device loop2): udf_load_vrs: No VRS found [ 188.679040] UDF-fs: Scanning with blocksize 4096 failed 16:51:55 executing program 2: syz_mount_image$udf(&(0x7f0000000000)='udf\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)='\x00BEA01', 0x6, 0x8000}, {&(0x7f0000000040)='\x00NSR02', 0x6, 0x8800}, {&(0x7f0000010300)="010002005f0001007b8ff001600000000100000000000000084c696e757855444600000000000000000000000000000000000000000000090100010003000300010000000100000008313233343536373831323334353637384c696e7578554446", 0x61, 0x18000}, {&(0x7f0000010400)="0000000000000019004f53544120436f6d7072657373656420556e69636f646500000000000000000000000000000000000000000000000000000000000000000000000000000000004f53544120436f6d7072657373656420556e69636f64650000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002a4c696e7578206d6b756466667300000000000000000004050000000000007810e4070913142c1a023848002a4c696e757820554446465300000000000000000000000405", 0xde, 0x180c0}, {&(0x7f0000010500)="000000000000000001", 0x9, 0x181e0}], 0x0, &(0x7f00000000c0)={[{@iocharset={'iocharset', 0x3d, 'iso8859-4'}}]}) 16:51:55 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) connect$bt_l2cap(r0, &(0x7f00000003c0)={0x1f, 0xed7, @none}, 0xe) 16:51:55 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x18, 0x4, &(0x7f00000001c0)=@framed={{}, [@jmp={0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}]}, &(0x7f0000000040)='syzkaller\x00', 0x6, 0x96, &(0x7f0000000240)=""/150, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 16:51:55 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000640)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000080)=@framed, &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 16:51:55 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x10, 0x2, &(0x7f00000001c0)=@raw=[@call, @exit], &(0x7f0000000040)='syzkaller\x00', 0x6, 0x96, &(0x7f0000000240)=""/150, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 16:51:55 executing program 1: r0 = socket(0x2, 0x5, 0x0) sendmsg$nfc_llcp(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x10, 0x84, 0x2}, 0x10}, 0x0) 16:51:55 executing program 1: request_key(&(0x7f00000003c0)='cifs.spnego\x00', &(0x7f0000000400)={'syz', 0x0}, 0x0, 0x0) 16:51:55 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000002400)={0x0, 0x0, &(0x7f00000023c0)={0x0}, 0x1, 0x0, 0x6558}, 0x0) 16:51:55 executing program 3: keyctl$search(0xe, 0x0, 0x0, 0x0, 0x0) 16:51:55 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x5, [@var={0x1, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0xa559c2c2225e1042, 0x61, 0x5f]}}, &(0x7f00000001c0)=""/240, 0x2d, 0xf0, 0x1}, 0x20) [ 188.859806] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=512, location=512 [ 188.968246] UDF-fs: warning (device loop2): udf_load_vrs: No anchor found 16:51:55 executing program 5: r0 = syz_open_dev$vcsu(&(0x7f00000020c0)='/dev/vcsu#\x00', 0x0, 0x0) mmap$snddsp_control(&(0x7f0000ffe000/0x2000)=nil, 0x1000, 0x1000001, 0x13, r0, 0x83000000) 16:51:55 executing program 1: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000e80)='/dev/full\x00', 0x0, 0x0) mmap$usbfs(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x2800002, 0x10, r0, 0x0) [ 189.021924] UDF-fs: Scanning with blocksize 512 failed [ 189.074221] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=256, location=256 [ 189.121793] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=512, location=512 [ 189.143475] UDF-fs: warning (device loop2): udf_load_vrs: No anchor found [ 189.159826] UDF-fs: Scanning with blocksize 1024 failed [ 189.166417] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=256, location=256 [ 189.184969] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=512, location=512 [ 189.194625] UDF-fs: warning (device loop2): udf_load_vrs: No anchor found [ 189.202372] UDF-fs: Scanning with blocksize 2048 failed [ 189.209329] UDF-fs: warning (device loop2): udf_load_vrs: No VRS found [ 189.217210] UDF-fs: Scanning with blocksize 4096 failed 16:51:56 executing program 2: syz_mount_image$udf(&(0x7f0000000000)='udf\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)='\x00BEA01', 0x6, 0x8000}, {&(0x7f0000000040)='\x00NSR02', 0x6, 0x8800}, {&(0x7f0000010300)="010002005f0001007b8ff001600000000100000000000000084c696e757855444600000000000000000000000000000000000000000000090100010003000300010000000100000008313233343536373831323334353637384c696e7578554446", 0x61, 0x18000}, {&(0x7f0000010400)="0000000000000019004f53544120436f6d7072657373656420556e69636f646500000000000000000000000000000000000000000000000000000000000000000000000000000000004f53544120436f6d7072657373656420556e69636f64650000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002a4c696e7578206d6b756466667300000000000000000004050000000000007810e4070913142c1a023848002a4c696e757820554446465300000000000000000000000405", 0xde, 0x180c0}, {&(0x7f0000010500)="000000000000000001", 0x9, 0x181e0}], 0x0, &(0x7f00000000c0)={[{@iocharset={'iocharset', 0x3d, 'iso8859-4'}}]}) [ 189.301605] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=512, location=512 [ 189.316404] UDF-fs: warning (device loop2): udf_load_vrs: No anchor found [ 189.325518] UDF-fs: Scanning with blocksize 512 failed [ 189.339514] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=256, location=256 [ 189.349779] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=512, location=512 [ 189.360581] UDF-fs: warning (device loop2): udf_load_vrs: No anchor found [ 189.368899] UDF-fs: Scanning with blocksize 1024 failed [ 189.375343] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=256, location=256 [ 189.385924] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=512, location=512 [ 189.395526] UDF-fs: warning (device loop2): udf_load_vrs: No anchor found [ 189.403406] UDF-fs: Scanning with blocksize 2048 failed [ 189.410184] UDF-fs: warning (device loop2): udf_load_vrs: No VRS found [ 189.418472] UDF-fs: Scanning with blocksize 4096 failed 16:51:56 executing program 4: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000002280)={0x10}, 0x10) 16:51:56 executing program 0: r0 = socket(0x2b, 0x1, 0x0) sendmsg$IPVS_CMD_DEL_DAEMON(r0, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x14}, 0x14}}, 0xfc39511a3dc111de) 16:51:56 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x89a1, &(0x7f0000000000)={'batadv0\x00'}) 16:51:56 executing program 1: syz_read_part_table(0x0, 0x2, &(0x7f0000001380)=[{0x0, 0x0, 0x51f}, {&(0x7f0000000240)="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", 0x1ee, 0x1}]) 16:51:56 executing program 5: syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001180)=[{0x0}, {&(0x7f0000001140)=']', 0x1, 0x6}], 0x0, 0x0) 16:51:56 executing program 2: syz_mount_image$udf(&(0x7f0000000000)='udf\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)='\x00BEA01', 0x6, 0x8000}, {&(0x7f0000000040)='\x00NSR02', 0x6, 0x8800}, {&(0x7f0000010300)="010002005f0001007b8ff001600000000100000000000000084c696e757855444600000000000000000000000000000000000000000000090100010003000300010000000100000008313233343536373831323334353637384c696e7578554446", 0x61, 0x18000}, {&(0x7f0000010400)="0000000000000019004f53544120436f6d7072657373656420556e69636f646500000000000000000000000000000000000000000000000000000000000000000000000000000000004f53544120436f6d7072657373656420556e69636f64650000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002a4c696e7578206d6b756466667300000000000000000004050000000000007810e4070913142c1a023848002a4c696e757820554446465300000000000000000000000405", 0xde, 0x180c0}, {&(0x7f0000010500)="000000000000000001", 0x9, 0x181e0}, {0x0, 0x0, 0x40000}], 0x0, &(0x7f00000000c0)={[{@iocharset={'iocharset', 0x3d, 'iso8859-4'}}]}) 16:51:56 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x4, 0x0, &(0x7f0000000040)) 16:51:56 executing program 0: syz_read_part_table(0x0, 0x1, &(0x7f0000001380)=[{0x0, 0x0, 0x51f}]) 16:51:56 executing program 4: socket(0xa, 0x0, 0x7ff) [ 189.811104] UDF-fs: warning (device loop2): udf_load_vrs: No anchor found [ 189.818740] Dev loop1: unable to read RDB block 5 [ 189.829676] loop1: unable to read partition table [ 189.838141] UDF-fs: Scanning with blocksize 512 failed [ 189.844785] loop1: partition table beyond EOD, truncated 16:51:56 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000000)={'team0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @link_local}, 0x10) setsockopt$packet_drop_memb(r0, 0x107, 0x2, &(0x7f0000000080)={0x0, 0x1, 0x6, @broadcast}, 0x10) 16:51:56 executing program 3: prctl$PR_SET_SECUREBITS(0x17, 0xb414afb404c75d80) 16:51:56 executing program 4: pselect6(0x40, &(0x7f0000002700), &(0x7f0000002740)={0x2}, 0x0, &(0x7f00000027c0)={0x0, 0x3938700}, 0x0) [ 189.869632] loop_reread_partitions: partition scan of loop1 () failed (rc=-5) [ 189.910280] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=512, location=512 [ 189.925972] device team0 entered promiscuous mode [ 189.931935] device team_slave_0 entered promiscuous mode [ 189.932707] UDF-fs: warning (device loop2): udf_load_vrs: No anchor found [ 189.944231] device team_slave_1 entered promiscuous mode [ 189.950859] UDF-fs: Scanning with blocksize 1024 failed [ 189.954275] device team0 left promiscuous mode [ 189.964665] device team_slave_0 left promiscuous mode [ 189.970445] device team_slave_1 left promiscuous mode [ 189.974434] Dev loop0: unable to read RDB block 5 [ 189.976882] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=256, location=256 [ 189.990738] device team0 entered promiscuous mode [ 189.995572] loop0: unable to read partition table [ 189.998965] device team_slave_0 entered promiscuous mode [ 190.006331] device team_slave_1 entered promiscuous mode [ 190.014061] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=512, location=512 [ 190.018585] loop0: partition table beyond EOD, truncated [ 190.023676] device team0 left promiscuous mode [ 190.035009] device team_slave_0 left promiscuous mode [ 190.041253] UDF-fs: warning (device loop2): udf_load_vrs: No anchor found [ 190.049003] device team_slave_1 left promiscuous mode 16:51:57 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x14, 0x0, 0x0) [ 190.057658] Dev loop1: unable to read RDB block 5 [ 190.061271] UDF-fs: Scanning with blocksize 2048 failed [ 190.063078] Dev loop0: unable to read RDB block 5 [ 190.078149] loop1: unable to read partition table [ 190.083334] loop0: unable to read partition table [ 190.091417] UDF-fs: warning (device loop2): udf_load_vrs: No VRS found [ 190.094448] loop1: partition table beyond EOD, truncated [ 190.104849] UDF-fs: Scanning with blocksize 4096 failed 16:51:57 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001180)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="b5eed4af01db22b7c134010000007a15", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) read$alg(r1, &(0x7f0000001480)=""/4096, 0x1000) sendmmsg$alg(r1, &(0x7f0000001340)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000800)=[@assoc={0x18, 0x117, 0x4, 0x9}], 0x18}], 0x1, 0x0) writev(r1, &(0x7f0000000580)=[{&(0x7f00000002c0)="573c8c7bde40e2d804772a60c2f49b5296ebbbbb0c2225be32", 0x19}], 0x1) 16:51:57 executing program 5: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) ioctl$NBD_SET_SIZE_BLOCKS(r0, 0x301, 0x2) [ 190.104854] loop0: partition table beyond EOD, truncated [ 190.124110] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 190.139106] loop_reread_partitions: partition scan of loop1 () failed (rc=-5) 16:51:57 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(r1, 0x4008ae73, &(0x7f00000000c0)={0x80000001}) ioctl$KVM_GET_SUPPORTED_CPUID(0xffffffffffffffff, 0xc008ae05, 0x0) syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x2) ioctl$SIOCX25GFACILITIES(0xffffffffffffffff, 0x89e2, &(0x7f0000000100)) 16:51:57 executing program 4: r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f00000000c0)='ns/pid\x00') ioctl$NS_GET_PARENT(r0, 0x2, 0x536000) 16:51:57 executing program 2: syz_mount_image$udf(&(0x7f0000000000)='udf\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)='\x00BEA01', 0x6, 0x8000}, {&(0x7f0000000040)='\x00NSR02', 0x6, 0x8800}, {&(0x7f0000010300)="010002005f0001007b8ff001600000000100000000000000084c696e757855444600000000000000000000000000000000000000000000090100010003000300010000000100000008313233343536373831323334353637384c696e7578554446", 0x61, 0x18000}, {&(0x7f0000010400)="0000000000000019004f53544120436f6d7072657373656420556e69636f646500000000000000000000000000000000000000000000000000000000000000000000000000000000004f53544120436f6d7072657373656420556e69636f64650000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002a4c696e7578206d6b756466667300000000000000000004050000000000007810e4070913142c1a023848002a4c696e757820554446465300000000000000000000000405", 0xde, 0x180c0}, {&(0x7f0000010500)="000000000000000001", 0x9, 0x181e0}, {0x0, 0x0, 0x40000}], 0x0, &(0x7f00000000c0)={[{@iocharset={'iocharset', 0x3d, 'iso8859-4'}}]}) 16:51:57 executing program 3: r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000100)={0x0, 0xb, 0x1, {0xb, @pix={0x0, 0x1f}}}) ioctl$VIDIOC_EXPBUF(r0, 0xc0405610, &(0x7f0000000000)={0xb, 0x0, 0x0, 0x0, 0xffffffffffffffff}) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x12, r1, 0x0) [ 190.373127] Dev loop0: unable to read RDB block 5 [ 190.382576] loop0: unable to read partition table [ 190.397136] loop0: partition table beyond EOD, truncated [ 190.412559] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 16:51:57 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) 16:51:57 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0xc, 0x2, &(0x7f00000001c0)=@raw=[@alu={0x7, 0x0, 0xb}, @exit], &(0x7f0000000040)='syzkaller\x00', 0x6, 0x96, &(0x7f0000000240)=""/150, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 16:51:57 executing program 1: keyctl$search(0x17, 0x0, 0x0, 0x0, 0x0) 16:51:57 executing program 0: r0 = socket(0x2b, 0x1, 0x0) mmap$xdp(&(0x7f0000fff000/0x1000)=nil, 0xfffffffffffff000, 0x0, 0x10, r0, 0x0) 16:51:57 executing program 3: r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000100)={0x0, 0xb, 0x1, {0xb, @pix={0x0, 0x1f}}}) ioctl$VIDIOC_EXPBUF(r0, 0xc0405610, &(0x7f0000000000)={0xb, 0x0, 0x0, 0x0, 0xffffffffffffffff}) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x12, r1, 0x0) [ 190.480626] UDF-fs: warning (device loop2): udf_load_vrs: No anchor found [ 190.514621] UDF-fs: Scanning with blocksize 512 failed [ 190.543631] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=512, location=512 16:51:57 executing program 5: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vfio/vfio\x00', 0x0, 0x0) ioctl$VFIO_CHECK_EXTENSION(r0, 0x3b65, 0x0) 16:51:57 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmmsg$sock(r0, &(0x7f0000001840)=[{{&(0x7f0000000080)=@l2tp={0x2, 0x0, @loopback}, 0x80, 0x0, 0x0, &(0x7f0000001480)=[@mark={{0x14}}], 0x18}}], 0x1, 0x0) 16:51:57 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x3, 0x2, &(0x7f00000001c0)=@raw=[@call={0x85, 0x0, 0x0, 0x15}, @exit], &(0x7f0000000040)='syzkaller\x00', 0x6, 0x96, &(0x7f0000000240)=""/150, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 16:51:57 executing program 0: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r0, 0x11b, 0x3, &(0x7f0000000400)=0x8, 0x4) [ 190.591116] UDF-fs: warning (device loop2): udf_load_vrs: No anchor found [ 190.625435] UDF-fs: Scanning with blocksize 1024 failed 16:51:57 executing program 3: r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000100)={0x0, 0xb, 0x1, {0xb, @pix={0x0, 0x1f}}}) ioctl$VIDIOC_EXPBUF(r0, 0xc0405610, &(0x7f0000000000)={0xb, 0x0, 0x0, 0x0, 0xffffffffffffffff}) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x12, r1, 0x0) [ 190.646291] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=256, location=256 [ 190.700702] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=512, location=512 [ 190.748990] UDF-fs: warning (device loop2): udf_load_vrs: No anchor found [ 190.765202] UDF-fs: Scanning with blocksize 2048 failed [ 190.771844] UDF-fs: warning (device loop2): udf_load_vrs: No VRS found [ 190.780186] UDF-fs: Scanning with blocksize 4096 failed 16:51:57 executing program 2: syz_mount_image$udf(&(0x7f0000000000)='udf\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)='\x00BEA01', 0x6, 0x8000}, {&(0x7f0000000040)='\x00NSR02', 0x6, 0x8800}, {&(0x7f0000010300)="010002005f0001007b8ff001600000000100000000000000084c696e757855444600000000000000000000000000000000000000000000090100010003000300010000000100000008313233343536373831323334353637384c696e7578554446", 0x61, 0x18000}, {&(0x7f0000010400)="0000000000000019004f53544120436f6d7072657373656420556e69636f646500000000000000000000000000000000000000000000000000000000000000000000000000000000004f53544120436f6d7072657373656420556e69636f64650000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002a4c696e7578206d6b756466667300000000000000000004050000000000007810e4070913142c1a023848002a4c696e757820554446465300000000000000000000000405", 0xde, 0x180c0}, {&(0x7f0000010500)="000000000000000001", 0x9, 0x181e0}, {0x0, 0x0, 0x40000}], 0x0, &(0x7f00000000c0)={[{@iocharset={'iocharset', 0x3d, 'iso8859-4'}}]}) 16:51:57 executing program 5: r0 = syz_open_dev$vcsu(&(0x7f00000020c0)='/dev/vcsu#\x00', 0x4, 0x0) mmap$snddsp_control(&(0x7f0000ffe000/0x2000)=nil, 0x1000, 0x0, 0x13, r0, 0x83000000) 16:51:57 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) sendmmsg$nfc_llcp(r0, &(0x7f0000000380)=[{&(0x7f0000000000)={0x27, 0x1, 0x0, 0x0, 0x0, 0x0, "27805fc120fe5127553439627f7578e92a19a9a49ee472e29fe8e19cedb080ba0c05b29ec2bedaa30ed3fd36a6ba3ca97f0f8f5a2f765f374ac40f9671bbf7"}, 0x60, &(0x7f0000000240)=[{&(0x7f0000000080)="d32e04a008df938b16aea148986f", 0xe}], 0x1, &(0x7f0000000280)={0x24}, 0x10}], 0x1, 0x0) 16:51:57 executing program 3: r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000100)={0x0, 0xb, 0x1, {0xb, @pix={0x0, 0x1f}}}) ioctl$VIDIOC_EXPBUF(r0, 0xc0405610, &(0x7f0000000000)={0xb, 0x0, 0x0, 0x0, 0xffffffffffffffff}) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x12, r1, 0x0) 16:51:57 executing program 0: prctl$PR_SET_SECUREBITS(0x17, 0x0) 16:51:57 executing program 4: keyctl$search(0x3, 0x0, 0x0, 0x0, 0x0) [ 190.846596] Bluetooth: hci5: command 0x0405 tx timeout 16:51:57 executing program 1: r0 = socket(0x2b, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8914, &(0x7f00000008c0)={'team0\x00'}) 16:51:57 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x25, 0x0, 0x0) 16:51:57 executing program 3: r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000100)={0x0, 0xb, 0x1, {0xb, @pix={0x0, 0x1f}}}) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x12, 0xffffffffffffffff, 0x0) 16:51:57 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000011c0)) 16:51:57 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) ioctl$NBD_SET_SIZE_BLOCKS(r0, 0x80041285, 0x0) [ 190.961625] UDF-fs: warning (device loop2): udf_load_vrs: No anchor found [ 191.003825] UDF-fs: Scanning with blocksize 512 failed 16:51:58 executing program 4: r0 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) mmap$snddsp_control(&(0x7f0000ff9000/0x4000)=nil, 0x149c000, 0x0, 0x11, r0, 0x83000000) [ 191.036306] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=512, location=512 [ 191.063512] UDF-fs: warning (device loop2): udf_load_vrs: No anchor found [ 191.077269] UDF-fs: Scanning with blocksize 1024 failed [ 191.102499] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=256, location=256 [ 191.148012] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=512, location=512 [ 191.161501] UDF-fs: warning (device loop2): udf_load_vrs: No anchor found [ 191.181812] UDF-fs: Scanning with blocksize 2048 failed [ 191.200516] UDF-fs: warning (device loop2): udf_load_vrs: No VRS found [ 191.218758] UDF-fs: Scanning with blocksize 4096 failed 16:51:58 executing program 2: syz_mount_image$udf(&(0x7f0000000000)='udf\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)='\x00BEA01', 0x6, 0x8000}, {&(0x7f0000000040)='\x00NSR02', 0x6, 0x8800}, {&(0x7f0000010300)="010002005f0001007b8ff001600000000100000000000000084c696e757855444600000000000000000000000000000000000000000000090100010003000300010000000100000008313233343536373831323334353637384c696e7578554446", 0x61, 0x18000}, {&(0x7f0000010400)="0000000000000019004f53544120436f6d7072657373656420556e69636f646500000000000000000000000000000000000000000000000000000000000000000000000000000000004f53544120436f6d7072657373656420556e69636f64650000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002a4c696e7578206d6b756466667300000000000000000004050000000000007810e4070913142c1a023848002a4c696e757820554446465300000000000000000000000405", 0xde, 0x180c0}, {&(0x7f0000010500)="000000000000000001", 0x9, 0x181e0}, {&(0x7f0000011400), 0x0, 0x40000}], 0x0, &(0x7f00000000c0)={[{@iocharset={'iocharset', 0x3d, 'iso8859-4'}}]}) 16:51:58 executing program 3: r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000100)={0x0, 0xb, 0x1, {0xb, @pix={0x0, 0x1f}}}) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x12, 0xffffffffffffffff, 0x0) 16:51:58 executing program 0: syz_init_net_socket$llc(0x1a, 0x0, 0x0) syz_init_net_socket$x25(0x9, 0x5, 0x0) 16:51:58 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) recvfrom$packet(r0, 0x0, 0x61, 0x0, 0x0, 0x3e) 16:51:58 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x6}, {0xb}]}]}}, &(0x7f0000000180)=""/233, 0x36, 0xe9, 0x1}, 0x20) 16:51:58 executing program 1: add_key(&(0x7f0000000340)='big_key\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) request_key(&(0x7f00000003c0)='cifs.spnego\x00', &(0x7f0000000400)={'syz', 0x0}, &(0x7f0000000440)=',\x00', 0x0) 16:51:58 executing program 3: r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000100)={0x0, 0xb, 0x1, {0xb, @pix={0x0, 0x1f}}}) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x12, 0xffffffffffffffff, 0x0) 16:51:58 executing program 0: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000001480)='/dev/snd/seq\x00', 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r0, 0xc058534b, 0x0) 16:51:58 executing program 1: [ 191.517997] UDF-fs: warning (device loop2): udf_load_vrs: No anchor found [ 191.535085] UDF-fs: Scanning with blocksize 512 failed 16:51:58 executing program 4: 16:51:58 executing program 3: r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_EXPBUF(r0, 0xc0405610, &(0x7f0000000000)={0xb, 0x0, 0x0, 0x0, 0xffffffffffffffff}) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x12, r1, 0x0) [ 191.579048] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=512, location=512 16:51:58 executing program 0: [ 191.633345] UDF-fs: warning (device loop2): udf_load_vrs: No anchor found [ 191.660996] UDF-fs: Scanning with blocksize 1024 failed [ 191.695925] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=256, location=256 [ 191.715783] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=512, location=512 [ 191.729676] UDF-fs: warning (device loop2): udf_load_vrs: No anchor found [ 191.748772] UDF-fs: Scanning with blocksize 2048 failed [ 191.758607] UDF-fs: warning (device loop2): udf_load_vrs: No VRS found [ 191.765464] UDF-fs: Scanning with blocksize 4096 failed 16:51:58 executing program 2: syz_mount_image$udf(&(0x7f0000000000)='udf\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)='\x00BEA01', 0x6, 0x8000}, {&(0x7f0000000040)='\x00NSR02', 0x6, 0x8800}, {&(0x7f0000010300)="010002005f0001007b8ff001600000000100000000000000084c696e757855444600000000000000000000000000000000000000000000090100010003000300010000000100000008313233343536373831323334353637384c696e7578554446", 0x61, 0x18000}, {&(0x7f0000010400)="0000000000000019004f53544120436f6d7072657373656420556e69636f646500000000000000000000000000000000000000000000000000000000000000000000000000000000004f53544120436f6d7072657373656420556e69636f64650000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002a4c696e7578206d6b756466667300000000000000000004050000000000007810e4070913142c1a023848002a4c696e757820554446465300000000000000000000000405", 0xde, 0x180c0}, {&(0x7f0000010500)="000000000000000001", 0x9, 0x181e0}, {&(0x7f0000011400), 0x0, 0x40000}], 0x0, &(0x7f00000000c0)={[{@iocharset={'iocharset', 0x3d, 'iso8859-4'}}]}) 16:51:58 executing program 4: 16:51:58 executing program 1: 16:51:58 executing program 3: r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_EXPBUF(r0, 0xc0405610, &(0x7f0000000000)={0xb, 0x0, 0x0, 0x0, 0xffffffffffffffff}) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x12, r1, 0x0) 16:51:58 executing program 0: 16:51:58 executing program 5: 16:51:58 executing program 4: 16:51:58 executing program 1: 16:51:58 executing program 0: 16:51:58 executing program 5: 16:51:58 executing program 3: r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_EXPBUF(r0, 0xc0405610, &(0x7f0000000000)={0xb, 0x0, 0x0, 0x0, 0xffffffffffffffff}) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x12, r1, 0x0) 16:51:58 executing program 0: [ 192.009810] UDF-fs: warning (device loop2): udf_load_vrs: No anchor found [ 192.052587] UDF-fs: Scanning with blocksize 512 failed [ 192.090495] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=512, location=512 [ 192.115343] UDF-fs: warning (device loop2): udf_load_vrs: No anchor found [ 192.131727] UDF-fs: Scanning with blocksize 1024 failed [ 192.144247] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=256, location=256 [ 192.161014] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=512, location=512 [ 192.184826] UDF-fs: warning (device loop2): udf_load_vrs: No anchor found [ 192.202591] UDF-fs: Scanning with blocksize 2048 failed [ 192.209320] UDF-fs: warning (device loop2): udf_load_vrs: No VRS found [ 192.216031] UDF-fs: Scanning with blocksize 4096 failed 16:51:59 executing program 2: syz_mount_image$udf(&(0x7f0000000000)='udf\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)='\x00BEA01', 0x6, 0x8000}, {&(0x7f0000000040)='\x00NSR02', 0x6, 0x8800}, {&(0x7f0000010300)="010002005f0001007b8ff001600000000100000000000000084c696e757855444600000000000000000000000000000000000000000000090100010003000300010000000100000008313233343536373831323334353637384c696e7578554446", 0x61, 0x18000}, {&(0x7f0000010400)="0000000000000019004f53544120436f6d7072657373656420556e69636f646500000000000000000000000000000000000000000000000000000000000000000000000000000000004f53544120436f6d7072657373656420556e69636f64650000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002a4c696e7578206d6b756466667300000000000000000004050000000000007810e4070913142c1a023848002a4c696e757820554446465300000000000000000000000405", 0xde, 0x180c0}, {&(0x7f0000010500)="000000000000000001", 0x9, 0x181e0}, {&(0x7f0000011400), 0x0, 0x40000}], 0x0, &(0x7f00000000c0)={[{@iocharset={'iocharset', 0x3d, 'iso8859-4'}}]}) 16:51:59 executing program 1: 16:51:59 executing program 5: 16:51:59 executing program 3: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0xb, 0x1, {0xb, @pix={0x0, 0x1f}}}) ioctl$VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, &(0x7f0000000000)={0xb, 0x0, 0x0, 0x0, 0xffffffffffffffff}) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) 16:51:59 executing program 4: 16:51:59 executing program 0: 16:51:59 executing program 1: 16:51:59 executing program 0: 16:51:59 executing program 4: 16:51:59 executing program 5: 16:51:59 executing program 3: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0xb, 0x1, {0xb, @pix={0x0, 0x1f}}}) ioctl$VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, &(0x7f0000000000)={0xb, 0x0, 0x0, 0x0, 0xffffffffffffffff}) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) [ 192.372199] UDF-fs: warning (device loop2): udf_load_vrs: No anchor found [ 192.388953] UDF-fs: Scanning with blocksize 512 failed 16:51:59 executing program 0: [ 192.456101] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=512, location=512 [ 192.492804] UDF-fs: warning (device loop2): udf_load_vrs: No anchor found [ 192.550726] UDF-fs: Scanning with blocksize 1024 failed [ 192.573805] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=256, location=256 [ 192.590931] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=512, location=512 [ 192.604224] UDF-fs: warning (device loop2): udf_load_vrs: No anchor found [ 192.613992] UDF-fs: Scanning with blocksize 2048 failed [ 192.622778] UDF-fs: warning (device loop2): udf_load_vrs: No VRS found [ 192.630718] UDF-fs: Scanning with blocksize 4096 failed 16:51:59 executing program 2: syz_mount_image$udf(&(0x7f0000000000)='udf\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)='\x00BEA01', 0x6, 0x8000}, {&(0x7f0000000040)='\x00NSR02', 0x6, 0x8800}, {&(0x7f0000010300)="010002005f0001007b8ff001600000000100000000000000084c696e757855444600000000000000000000000000000000000000000000090100010003000300010000000100000008313233343536373831323334353637384c696e7578554446", 0x61, 0x18000}, {&(0x7f0000010400)="0000000000000019004f53544120436f6d7072657373656420556e69636f646500000000000000000000000000000000000000000000000000000000000000000000000000000000004f53544120436f6d7072657373656420556e69636f64650000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002a4c696e7578206d6b756466667300000000000000000004050000000000007810e4070913142c1a023848002a4c696e757820554446465300000000000000000000000405", 0xde, 0x180c0}, {&(0x7f0000010500)="000000000000000001", 0x9, 0x181e0}, {&(0x7f0000011400)="020002003700010077c9f001000100", 0xf, 0x40000}], 0x0, &(0x7f00000000c0)={[{@iocharset={'iocharset', 0x3d, 'iso8859-4'}}]}) 16:51:59 executing program 5: 16:51:59 executing program 4: 16:51:59 executing program 1: 16:51:59 executing program 3: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0xb, 0x1, {0xb, @pix={0x0, 0x1f}}}) ioctl$VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, &(0x7f0000000000)={0xb, 0x0, 0x0, 0x0, 0xffffffffffffffff}) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) 16:51:59 executing program 0: 16:51:59 executing program 0: 16:51:59 executing program 5: 16:51:59 executing program 4: 16:51:59 executing program 3: r0 = syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000100)={0x0, 0xb, 0x1, {0xb, @pix={0x0, 0x1f}}}) ioctl$VIDIOC_EXPBUF(r0, 0xc0405610, &(0x7f0000000000)={0xb, 0x0, 0x0, 0x0, 0xffffffffffffffff}) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x12, r1, 0x0) 16:51:59 executing program 1: 16:51:59 executing program 4: [ 192.840304] UDF-fs: warning (device loop2): udf_load_vrs: No anchor found [ 192.884804] UDF-fs: Scanning with blocksize 512 failed [ 192.923687] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=512, location=512 [ 192.954516] UDF-fs: warning (device loop2): udf_load_vrs: No anchor found [ 192.964270] UDF-fs: Scanning with blocksize 1024 failed [ 192.976312] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=256, location=256 [ 192.995968] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=512, location=512 [ 193.007401] UDF-fs: warning (device loop2): udf_load_vrs: No anchor found [ 193.014367] UDF-fs: Scanning with blocksize 2048 failed [ 193.020770] UDF-fs: warning (device loop2): udf_load_vrs: No VRS found [ 193.027563] UDF-fs: Scanning with blocksize 4096 failed 16:52:00 executing program 2: syz_mount_image$udf(&(0x7f0000000000)='udf\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)='\x00BEA01', 0x6, 0x8000}, {&(0x7f0000000040)='\x00NSR02', 0x6, 0x8800}, {&(0x7f0000010300)="010002005f0001007b8ff001600000000100000000000000084c696e757855444600000000000000000000000000000000000000000000090100010003000300010000000100000008313233343536373831323334353637384c696e7578554446", 0x61, 0x18000}, {&(0x7f0000010400)="0000000000000019004f53544120436f6d7072657373656420556e69636f646500000000000000000000000000000000000000000000000000000000000000000000000000000000004f53544120436f6d7072657373656420556e69636f64650000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002a4c696e7578206d6b756466667300000000000000000004050000000000007810e4070913142c1a023848002a4c696e757820554446465300000000000000000000000405", 0xde, 0x180c0}, {&(0x7f0000010500)="000000000000000001", 0x9, 0x181e0}, {&(0x7f0000011400)="020002003700010077c9f001000100", 0xf, 0x40000}], 0x0, &(0x7f00000000c0)={[{@iocharset={'iocharset', 0x3d, 'iso8859-4'}}]}) 16:52:00 executing program 0: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, &(0x7f0000001180), 0x0, 0x0) userfaultfd(0x0) 16:52:00 executing program 1: 16:52:00 executing program 3: r0 = syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000100)={0x0, 0xb, 0x1, {0xb, @pix={0x0, 0x1f}}}) ioctl$VIDIOC_EXPBUF(r0, 0xc0405610, &(0x7f0000000000)={0xb, 0x0, 0x0, 0x0, 0xffffffffffffffff}) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x12, r1, 0x0) 16:52:00 executing program 5: 16:52:00 executing program 4: 16:52:00 executing program 1: 16:52:00 executing program 1: 16:52:00 executing program 4: 16:52:00 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}, {0x0, [], 0x2}}, &(0x7f0000000040)=""/233, 0x1a, 0xe9, 0x1}, 0x20) 16:52:00 executing program 3: r0 = syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000100)={0x0, 0xb, 0x1, {0xb, @pix={0x0, 0x1f}}}) ioctl$VIDIOC_EXPBUF(r0, 0xc0405610, &(0x7f0000000000)={0xb, 0x0, 0x0, 0x0, 0xffffffffffffffff}) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x12, r1, 0x0) 16:52:00 executing program 0: [ 193.250270] UDF-fs: warning (device loop2): udf_load_vrs: No anchor found [ 193.274947] UDF-fs: Scanning with blocksize 512 failed [ 193.286088] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=512, location=512 [ 193.309611] UDF-fs: warning (device loop2): udf_load_vrs: No anchor found [ 193.337946] UDF-fs: Scanning with blocksize 1024 failed [ 193.357211] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=256, location=256 [ 193.381699] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=512, location=512 [ 193.391940] UDF-fs: warning (device loop2): udf_load_vrs: No anchor found [ 193.399896] UDF-fs: Scanning with blocksize 2048 failed [ 193.406322] UDF-fs: warning (device loop2): udf_load_vrs: No VRS found [ 193.415209] UDF-fs: Scanning with blocksize 4096 failed 16:52:00 executing program 1: 16:52:00 executing program 5: 16:52:00 executing program 4: 16:52:00 executing program 3: r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0xb, 0x1, {0xb, @pix={0x0, 0x1f}}}) ioctl$VIDIOC_EXPBUF(r0, 0xc0405610, &(0x7f0000000000)={0xb, 0x0, 0x0, 0x0, 0xffffffffffffffff}) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x12, r1, 0x0) 16:52:00 executing program 0: 16:52:00 executing program 2: syz_mount_image$udf(&(0x7f0000000000)='udf\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)='\x00BEA01', 0x6, 0x8000}, {&(0x7f0000000040)='\x00NSR02', 0x6, 0x8800}, {&(0x7f0000010300)="010002005f0001007b8ff001600000000100000000000000084c696e757855444600000000000000000000000000000000000000000000090100010003000300010000000100000008313233343536373831323334353637384c696e7578554446", 0x61, 0x18000}, {&(0x7f0000010400)="0000000000000019004f53544120436f6d7072657373656420556e69636f646500000000000000000000000000000000000000000000000000000000000000000000000000000000004f53544120436f6d7072657373656420556e69636f64650000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002a4c696e7578206d6b756466667300000000000000000004050000000000007810e4070913142c1a023848002a4c696e757820554446465300000000000000000000000405", 0xde, 0x180c0}, {&(0x7f0000010500)="000000000000000001", 0x9, 0x181e0}, {&(0x7f0000011400)="020002003700010077c9f001000100", 0xf, 0x40000}], 0x0, &(0x7f00000000c0)={[{@iocharset={'iocharset', 0x3d, 'iso8859-4'}}]}) 16:52:00 executing program 1: 16:52:00 executing program 5: 16:52:00 executing program 0: 16:52:00 executing program 4: 16:52:00 executing program 3: r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0xb, 0x1, {0xb, @pix={0x0, 0x1f}}}) ioctl$VIDIOC_EXPBUF(r0, 0xc0405610, &(0x7f0000000000)={0xb, 0x0, 0x0, 0x0, 0xffffffffffffffff}) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x12, r1, 0x0) 16:52:00 executing program 5: 16:52:00 executing program 1: [ 193.615715] UDF-fs: warning (device loop2): udf_load_vrs: No anchor found [ 193.655137] UDF-fs: Scanning with blocksize 512 failed 16:52:00 executing program 4: 16:52:00 executing program 0: 16:52:00 executing program 3: r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0xb, 0x1, {0xb, @pix={0x0, 0x1f}}}) ioctl$VIDIOC_EXPBUF(r0, 0xc0405610, &(0x7f0000000000)={0xb, 0x0, 0x0, 0x0, 0xffffffffffffffff}) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x12, r1, 0x0) [ 193.717945] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=512, location=512 16:52:00 executing program 1: [ 193.783342] UDF-fs: warning (device loop2): udf_load_vrs: No anchor found [ 193.820130] UDF-fs: Scanning with blocksize 1024 failed [ 193.853704] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=256, location=256 [ 193.881672] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=512, location=512 [ 193.906315] UDF-fs: warning (device loop2): udf_load_vrs: No anchor found [ 193.922517] UDF-fs: Scanning with blocksize 2048 failed [ 193.930100] UDF-fs: warning (device loop2): udf_load_vrs: No VRS found [ 193.943255] UDF-fs: Scanning with blocksize 4096 failed 16:52:00 executing program 2: syz_mount_image$udf(&(0x7f0000000000)='udf\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)='\x00BEA01', 0x6, 0x8000}, {&(0x7f0000000040)='\x00NSR02', 0x6, 0x8800}, {&(0x7f0000010300)="010002005f0001007b8ff001600000000100000000000000084c696e757855444600000000000000000000000000000000000000000000090100010003000300010000000100000008313233343536373831323334353637384c696e7578554446", 0x61, 0x18000}, {&(0x7f0000010400)="0000000000000019004f53544120436f6d7072657373656420556e69636f646500000000000000000000000000000000000000000000000000000000000000000000000000000000004f53544120436f6d7072657373656420556e69636f64650000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002a4c696e7578206d6b756466667300000000000000000004050000000000007810e4070913142c1a023848002a4c696e757820554446465300000000000000000000000405", 0xde, 0x180c0}, {&(0x7f0000010500)="000000000000000001", 0x9, 0x181e0}, {&(0x7f0000011400)="020002003700010077c9f0010001000000400000600000", 0x17, 0x40000}], 0x0, &(0x7f00000000c0)={[{@iocharset={'iocharset', 0x3d, 'iso8859-4'}}]}) 16:52:00 executing program 5: 16:52:00 executing program 4: 16:52:00 executing program 0: 16:52:00 executing program 3: r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, 0x0) ioctl$VIDIOC_EXPBUF(r0, 0xc0405610, &(0x7f0000000000)={0xb, 0x0, 0x0, 0x0, 0xffffffffffffffff}) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x12, r1, 0x0) 16:52:00 executing program 1: 16:52:01 executing program 4: 16:52:01 executing program 0: 16:52:01 executing program 5: 16:52:01 executing program 1: 16:52:01 executing program 3: r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, 0x0) ioctl$VIDIOC_EXPBUF(r0, 0xc0405610, &(0x7f0000000000)={0xb, 0x0, 0x0, 0x0, 0xffffffffffffffff}) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x12, r1, 0x0) 16:52:01 executing program 4: [ 194.159803] UDF-fs: warning (device loop2): udf_load_vrs: No anchor found [ 194.174669] UDF-fs: Scanning with blocksize 512 failed [ 194.215836] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=512, location=512 [ 194.271217] UDF-fs: warning (device loop2): udf_load_vrs: No anchor found [ 194.285376] UDF-fs: Scanning with blocksize 1024 failed [ 194.294182] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=256, location=256 [ 194.307302] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=512, location=512 [ 194.322527] UDF-fs: warning (device loop2): udf_load_vrs: No anchor found [ 194.336449] UDF-fs: Scanning with blocksize 2048 failed [ 194.342668] UDF-fs: warning (device loop2): udf_load_vrs: No VRS found [ 194.356707] UDF-fs: Scanning with blocksize 4096 failed 16:52:01 executing program 2: syz_mount_image$udf(&(0x7f0000000000)='udf\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)='\x00BEA01', 0x6, 0x8000}, {&(0x7f0000000040)='\x00NSR02', 0x6, 0x8800}, {&(0x7f0000010300)="010002005f0001007b8ff001600000000100000000000000084c696e757855444600000000000000000000000000000000000000000000090100010003000300010000000100000008313233343536373831323334353637384c696e7578554446", 0x61, 0x18000}, {&(0x7f0000010400)="0000000000000019004f53544120436f6d7072657373656420556e69636f646500000000000000000000000000000000000000000000000000000000000000000000000000000000004f53544120436f6d7072657373656420556e69636f64650000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002a4c696e7578206d6b756466667300000000000000000004050000000000007810e4070913142c1a023848002a4c696e757820554446465300000000000000000000000405", 0xde, 0x180c0}, {&(0x7f0000010500)="000000000000000001", 0x9, 0x181e0}, {&(0x7f0000011400)="020002003700010077c9f0010001000000400000600000", 0x17, 0x40000}], 0x0, &(0x7f00000000c0)={[{@iocharset={'iocharset', 0x3d, 'iso8859-4'}}]}) 16:52:01 executing program 1: 16:52:01 executing program 5: 16:52:01 executing program 0: 16:52:01 executing program 4: 16:52:01 executing program 3: r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, 0x0) ioctl$VIDIOC_EXPBUF(r0, 0xc0405610, &(0x7f0000000000)={0xb, 0x0, 0x0, 0x0, 0xffffffffffffffff}) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x12, r1, 0x0) 16:52:01 executing program 1: 16:52:01 executing program 0: 16:52:01 executing program 3: r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000100)={0x0, 0x0, 0x1, {0xb, @pix={0x0, 0x1f}}}) ioctl$VIDIOC_EXPBUF(r0, 0xc0405610, &(0x7f0000000000)={0xb, 0x0, 0x0, 0x0, 0xffffffffffffffff}) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x12, r1, 0x0) 16:52:01 executing program 4: 16:52:01 executing program 5: [ 194.551520] UDF-fs: warning (device loop2): udf_load_vrs: No anchor found 16:52:01 executing program 0: [ 194.619747] UDF-fs: Scanning with blocksize 512 failed [ 194.699312] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=512, location=512 [ 194.731457] UDF-fs: warning (device loop2): udf_load_vrs: No anchor found [ 194.744884] UDF-fs: Scanning with blocksize 1024 failed [ 194.751963] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=256, location=256 [ 194.762512] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=512, location=512 [ 194.773176] UDF-fs: warning (device loop2): udf_load_vrs: No anchor found [ 194.780831] UDF-fs: Scanning with blocksize 2048 failed [ 194.787461] UDF-fs: warning (device loop2): udf_load_vrs: No VRS found [ 194.794490] UDF-fs: Scanning with blocksize 4096 failed 16:52:01 executing program 2: syz_mount_image$udf(&(0x7f0000000000)='udf\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)='\x00BEA01', 0x6, 0x8000}, {&(0x7f0000000040)='\x00NSR02', 0x6, 0x8800}, {&(0x7f0000010300)="010002005f0001007b8ff001600000000100000000000000084c696e757855444600000000000000000000000000000000000000000000090100010003000300010000000100000008313233343536373831323334353637384c696e7578554446", 0x61, 0x18000}, {&(0x7f0000010400)="0000000000000019004f53544120436f6d7072657373656420556e69636f646500000000000000000000000000000000000000000000000000000000000000000000000000000000004f53544120436f6d7072657373656420556e69636f64650000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002a4c696e7578206d6b756466667300000000000000000004050000000000007810e4070913142c1a023848002a4c696e757820554446465300000000000000000000000405", 0xde, 0x180c0}, {&(0x7f0000010500)="000000000000000001", 0x9, 0x181e0}, {&(0x7f0000011400)="020002003700010077c9f0010001000000400000600000", 0x17, 0x40000}], 0x0, &(0x7f00000000c0)={[{@iocharset={'iocharset', 0x3d, 'iso8859-4'}}]}) 16:52:01 executing program 1: 16:52:01 executing program 5: 16:52:01 executing program 4: 16:52:01 executing program 3: r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000100)={0x0, 0x0, 0x1, {0xb, @pix={0x0, 0x1f}}}) ioctl$VIDIOC_EXPBUF(r0, 0xc0405610, &(0x7f0000000000)={0xb, 0x0, 0x0, 0x0, 0xffffffffffffffff}) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x12, r1, 0x0) 16:52:01 executing program 0: 16:52:01 executing program 1: 16:52:01 executing program 0: 16:52:01 executing program 3: r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000100)={0x0, 0x0, 0x1, {0xb, @pix={0x0, 0x1f}}}) ioctl$VIDIOC_EXPBUF(r0, 0xc0405610, &(0x7f0000000000)={0xb, 0x0, 0x0, 0x0, 0xffffffffffffffff}) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x12, r1, 0x0) 16:52:01 executing program 4: 16:52:01 executing program 1: 16:52:01 executing program 5: [ 194.956118] UDF-fs: warning (device loop2): udf_load_vrs: No anchor found [ 194.995445] UDF-fs: Scanning with blocksize 512 failed [ 195.027270] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=512, location=512 [ 195.039146] UDF-fs: warning (device loop2): udf_load_vrs: No anchor found [ 195.046117] UDF-fs: Scanning with blocksize 1024 failed [ 195.082553] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=256, location=256 [ 195.094389] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=512, location=512 [ 195.104328] UDF-fs: warning (device loop2): udf_load_vrs: No anchor found [ 195.111422] UDF-fs: Scanning with blocksize 2048 failed [ 195.122320] UDF-fs: warning (device loop2): udf_load_vrs: No VRS found [ 195.129437] UDF-fs: Scanning with blocksize 4096 failed 16:52:02 executing program 5: 16:52:02 executing program 3: r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000100)={0x0, 0xb, 0x0, {0xb, @pix={0x0, 0x1f}}}) ioctl$VIDIOC_EXPBUF(r0, 0xc0405610, &(0x7f0000000000)={0xb, 0x0, 0x0, 0x0, 0xffffffffffffffff}) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x12, r1, 0x0) 16:52:02 executing program 1: 16:52:02 executing program 0: 16:52:02 executing program 2: syz_mount_image$udf(&(0x7f0000000000)='udf\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)='\x00BEA01', 0x6, 0x8000}, {&(0x7f0000000040)='\x00NSR02', 0x6, 0x8800}, {&(0x7f0000010300)="010002005f0001007b8ff001600000000100000000000000084c696e757855444600000000000000000000000000000000000000000000090100010003000300010000000100000008313233343536373831323334353637384c696e7578554446", 0x61, 0x18000}, {&(0x7f0000010400)="0000000000000019004f53544120436f6d7072657373656420556e69636f646500000000000000000000000000000000000000000000000000000000000000000000000000000000004f53544120436f6d7072657373656420556e69636f64650000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002a4c696e7578206d6b756466667300000000000000000004050000000000007810e4070913142c1a023848002a4c696e757820554446465300000000000000000000000405", 0xde, 0x180c0}, {&(0x7f0000010500)="000000000000000001", 0x9, 0x181e0}, {&(0x7f0000011400)="020002003700010077c9f001000100000040000060000000004000", 0x1b, 0x40000}], 0x0, &(0x7f00000000c0)={[{@iocharset={'iocharset', 0x3d, 'iso8859-4'}}]}) 16:52:02 executing program 4: 16:52:02 executing program 5: 16:52:02 executing program 0: 16:52:02 executing program 4: 16:52:02 executing program 3: r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000100)={0x0, 0xb, 0x0, {0xb, @pix={0x0, 0x1f}}}) ioctl$VIDIOC_EXPBUF(r0, 0xc0405610, &(0x7f0000000000)={0xb, 0x0, 0x0, 0x0, 0xffffffffffffffff}) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x12, r1, 0x0) 16:52:02 executing program 1: 16:52:02 executing program 5: [ 195.281948] UDF-fs: warning (device loop2): udf_load_vrs: No anchor found [ 195.358923] UDF-fs: Scanning with blocksize 512 failed 16:52:02 executing program 4: 16:52:02 executing program 0: [ 195.382239] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=512, location=512 16:52:02 executing program 1: 16:52:02 executing program 5: [ 195.445793] UDF-fs: warning (device loop2): udf_load_vrs: No anchor found [ 195.456237] UDF-fs: Scanning with blocksize 1024 failed [ 195.483086] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=256, location=256 [ 195.535210] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=512, location=512 [ 195.550719] UDF-fs: warning (device loop2): udf_load_vrs: No anchor found [ 195.563516] UDF-fs: Scanning with blocksize 2048 failed [ 195.578780] UDF-fs: warning (device loop2): udf_load_vrs: No VRS found 16:52:02 executing program 2: syz_mount_image$udf(&(0x7f0000000000)='udf\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)='\x00BEA01', 0x6, 0x8000}, {&(0x7f0000000040)='\x00NSR02', 0x6, 0x8800}, {&(0x7f0000010300)="010002005f0001007b8ff001600000000100000000000000084c696e757855444600000000000000000000000000000000000000000000090100010003000300010000000100000008313233343536373831323334353637384c696e7578554446", 0x61, 0x18000}, {&(0x7f0000010400)="0000000000000019004f53544120436f6d7072657373656420556e69636f646500000000000000000000000000000000000000000000000000000000000000000000000000000000004f53544120436f6d7072657373656420556e69636f64650000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002a4c696e7578206d6b756466667300000000000000000004050000000000007810e4070913142c1a023848002a4c696e757820554446465300000000000000000000000405", 0xde, 0x180c0}, {&(0x7f0000010500)="000000000000000001", 0x9, 0x181e0}, {&(0x7f0000011400)="020002003700010077c9f001000100000040000060000000004000", 0x1b, 0x40000}], 0x0, &(0x7f00000000c0)={[{@iocharset={'iocharset', 0x3d, 'iso8859-4'}}]}) 16:52:02 executing program 3: r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000100)={0x0, 0xb, 0x0, {0xb, @pix={0x0, 0x1f}}}) ioctl$VIDIOC_EXPBUF(r0, 0xc0405610, &(0x7f0000000000)={0xb, 0x0, 0x0, 0x0, 0xffffffffffffffff}) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x12, r1, 0x0) 16:52:02 executing program 0: 16:52:02 executing program 4: 16:52:02 executing program 1: 16:52:02 executing program 5: [ 195.585509] UDF-fs: Scanning with blocksize 4096 failed 16:52:02 executing program 0: 16:52:02 executing program 4: 16:52:02 executing program 5: 16:52:02 executing program 3: r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000100)={0x0, 0xb, 0x1, {0x0, @pix={0x0, 0x1f}}}) ioctl$VIDIOC_EXPBUF(r0, 0xc0405610, &(0x7f0000000000)={0xb, 0x0, 0x0, 0x0, 0xffffffffffffffff}) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x12, r1, 0x0) 16:52:02 executing program 1: 16:52:02 executing program 3: r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000100)={0x0, 0xb, 0x1, {0x0, @pix={0x0, 0x1f}}}) ioctl$VIDIOC_EXPBUF(r0, 0xc0405610, &(0x7f0000000000)={0xb, 0x0, 0x0, 0x0, 0xffffffffffffffff}) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x12, r1, 0x0) [ 195.746558] UDF-fs: warning (device loop2): udf_load_vrs: No anchor found [ 195.771579] UDF-fs: Scanning with blocksize 512 failed [ 195.806120] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=512, location=512 [ 195.860692] UDF-fs: warning (device loop2): udf_load_vrs: No anchor found [ 195.878748] UDF-fs: Scanning with blocksize 1024 failed [ 195.892771] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=256, location=256 [ 195.908216] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=512, location=512 [ 195.931425] UDF-fs: warning (device loop2): udf_load_vrs: No anchor found [ 195.940869] UDF-fs: Scanning with blocksize 2048 failed [ 195.952862] UDF-fs: warning (device loop2): udf_load_vrs: No VRS found [ 195.963240] UDF-fs: Scanning with blocksize 4096 failed 16:52:02 executing program 2: syz_mount_image$udf(&(0x7f0000000000)='udf\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)='\x00BEA01', 0x6, 0x8000}, {&(0x7f0000000040)='\x00NSR02', 0x6, 0x8800}, {&(0x7f0000010300)="010002005f0001007b8ff001600000000100000000000000084c696e757855444600000000000000000000000000000000000000000000090100010003000300010000000100000008313233343536373831323334353637384c696e7578554446", 0x61, 0x18000}, {&(0x7f0000010400)="0000000000000019004f53544120436f6d7072657373656420556e69636f646500000000000000000000000000000000000000000000000000000000000000000000000000000000004f53544120436f6d7072657373656420556e69636f64650000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002a4c696e7578206d6b756466667300000000000000000004050000000000007810e4070913142c1a023848002a4c696e757820554446465300000000000000000000000405", 0xde, 0x180c0}, {&(0x7f0000010500)="000000000000000001", 0x9, 0x181e0}, {&(0x7f0000011400)="020002003700010077c9f001000100000040000060000000004000", 0x1b, 0x40000}], 0x0, &(0x7f00000000c0)={[{@iocharset={'iocharset', 0x3d, 'iso8859-4'}}]}) 16:52:02 executing program 0: 16:52:02 executing program 1: 16:52:02 executing program 4: 16:52:02 executing program 5: 16:52:02 executing program 3: r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000100)={0x0, 0xb, 0x1, {0x0, @pix={0x0, 0x1f}}}) ioctl$VIDIOC_EXPBUF(r0, 0xc0405610, &(0x7f0000000000)={0xb, 0x0, 0x0, 0x0, 0xffffffffffffffff}) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x12, r1, 0x0) 16:52:03 executing program 0: 16:52:03 executing program 4: 16:52:03 executing program 5: 16:52:03 executing program 3: r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000100)={0x0, 0xb, 0x1, {0xb}}) ioctl$VIDIOC_EXPBUF(r0, 0xc0405610, &(0x7f0000000000)={0xb, 0x0, 0x0, 0x0, 0xffffffffffffffff}) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x12, r1, 0x0) 16:52:03 executing program 1: 16:52:03 executing program 4: [ 196.170268] UDF-fs: warning (device loop2): udf_load_vrs: No anchor found [ 196.205268] UDF-fs: Scanning with blocksize 512 failed [ 196.250639] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=512, location=512 [ 196.273754] UDF-fs: warning (device loop2): udf_load_vrs: No anchor found [ 196.299863] UDF-fs: Scanning with blocksize 1024 failed [ 196.309453] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=256, location=256 [ 196.320659] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=512, location=512 [ 196.332457] UDF-fs: warning (device loop2): udf_load_vrs: No anchor found [ 196.340450] UDF-fs: Scanning with blocksize 2048 failed 16:52:03 executing program 2: syz_mount_image$udf(&(0x7f0000000000)='udf\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)='\x00BEA01', 0x6, 0x8000}, {&(0x7f0000000040)='\x00NSR02', 0x6, 0x8800}, {&(0x7f0000010300)="010002005f0001007b8ff001600000000100000000000000084c696e757855444600000000000000000000000000000000000000000000090100010003000300010000000100000008313233343536373831323334353637384c696e7578554446", 0x61, 0x18000}, {&(0x7f0000010400)="0000000000000019004f53544120436f6d7072657373656420556e69636f646500000000000000000000000000000000000000000000000000000000000000000000000000000000004f53544120436f6d7072657373656420556e69636f64650000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002a4c696e7578206d6b756466667300000000000000000004050000000000007810e4070913142c1a023848002a4c696e757820554446465300000000000000000000000405", 0xde, 0x180c0}, {&(0x7f0000010500)="000000000000000001", 0x9, 0x181e0}, {&(0x7f0000011400)="020002003700010077c9f00100010000004000006000000000400000e0", 0x1d, 0x40000}], 0x0, &(0x7f00000000c0)={[{@iocharset={'iocharset', 0x3d, 'iso8859-4'}}]}) 16:52:03 executing program 5: 16:52:03 executing program 0: 16:52:03 executing program 3: r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000100)={0x0, 0xb, 0x1, {0xb}}) ioctl$VIDIOC_EXPBUF(r0, 0xc0405610, &(0x7f0000000000)={0xb, 0x0, 0x0, 0x0, 0xffffffffffffffff}) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x12, r1, 0x0) 16:52:03 executing program 1: 16:52:03 executing program 4: [ 196.352787] UDF-fs: warning (device loop2): udf_load_vrs: No VRS found [ 196.361175] UDF-fs: Scanning with blocksize 4096 failed 16:52:03 executing program 1: 16:52:03 executing program 4: 16:52:03 executing program 0: 16:52:03 executing program 5: 16:52:03 executing program 3: r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000100)={0x0, 0xb, 0x1, {0xb}}) ioctl$VIDIOC_EXPBUF(r0, 0xc0405610, &(0x7f0000000000)={0xb, 0x0, 0x0, 0x0, 0xffffffffffffffff}) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x12, r1, 0x0) [ 196.517297] UDF-fs: warning (device loop2): udf_load_vrs: No anchor found [ 196.552192] UDF-fs: Scanning with blocksize 512 failed 16:52:03 executing program 0: [ 196.595890] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=512, location=512 [ 196.636718] UDF-fs: warning (device loop2): udf_load_vrs: No anchor found [ 196.654437] UDF-fs: Scanning with blocksize 1024 failed [ 196.670256] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=256, location=256 [ 196.684572] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=512, location=512 [ 196.694816] UDF-fs: warning (device loop2): udf_load_vrs: No anchor found [ 196.702185] UDF-fs: Scanning with blocksize 2048 failed [ 196.709465] UDF-fs: warning (device loop2): udf_load_vrs: No VRS found [ 196.716229] UDF-fs: Scanning with blocksize 4096 failed 16:52:03 executing program 2: syz_mount_image$udf(&(0x7f0000000000)='udf\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)='\x00BEA01', 0x6, 0x8000}, {&(0x7f0000000040)='\x00NSR02', 0x6, 0x8800}, {&(0x7f0000010300)="010002005f0001007b8ff001600000000100000000000000084c696e757855444600000000000000000000000000000000000000000000090100010003000300010000000100000008313233343536373831323334353637384c696e7578554446", 0x61, 0x18000}, {&(0x7f0000010400)="0000000000000019004f53544120436f6d7072657373656420556e69636f646500000000000000000000000000000000000000000000000000000000000000000000000000000000004f53544120436f6d7072657373656420556e69636f64650000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002a4c696e7578206d6b756466667300000000000000000004050000000000007810e4070913142c1a023848002a4c696e757820554446465300000000000000000000000405", 0xde, 0x180c0}, {&(0x7f0000010500)="000000000000000001", 0x9, 0x181e0}, {&(0x7f0000011400)="020002003700010077c9f00100010000004000006000000000400000e0", 0x1d, 0x40000}], 0x0, &(0x7f00000000c0)={[{@iocharset={'iocharset', 0x3d, 'iso8859-4'}}]}) 16:52:03 executing program 4: 16:52:03 executing program 1: 16:52:03 executing program 5: 16:52:03 executing program 3: r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000100)={0x0, 0xb, 0x1, {0xb, @pix={0x0, 0x1f}}}) ioctl$VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, &(0x7f0000000000)={0xb, 0x0, 0x0, 0x0, 0xffffffffffffffff}) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x12, r1, 0x0) 16:52:03 executing program 0: 16:52:03 executing program 5: 16:52:03 executing program 4: 16:52:03 executing program 1: 16:52:03 executing program 3: r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000100)={0x0, 0xb, 0x1, {0xb, @pix={0x0, 0x1f}}}) ioctl$VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, &(0x7f0000000000)={0xb, 0x0, 0x0, 0x0, 0xffffffffffffffff}) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x12, r1, 0x0) 16:52:03 executing program 0: [ 196.930951] UDF-fs: warning (device loop2): udf_load_vrs: No anchor found 16:52:03 executing program 0: [ 196.973871] UDF-fs: Scanning with blocksize 512 failed [ 197.059406] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=512, location=512 [ 197.105342] UDF-fs: warning (device loop2): udf_load_vrs: No anchor found [ 197.113001] UDF-fs: Scanning with blocksize 1024 failed [ 197.120640] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=256, location=256 [ 197.136224] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=512, location=512 [ 197.147342] UDF-fs: warning (device loop2): udf_load_vrs: No anchor found [ 197.154316] UDF-fs: Scanning with blocksize 2048 failed [ 197.160600] UDF-fs: warning (device loop2): udf_load_vrs: No VRS found [ 197.168551] UDF-fs: Scanning with blocksize 4096 failed 16:52:04 executing program 2: syz_mount_image$udf(&(0x7f0000000000)='udf\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)='\x00BEA01', 0x6, 0x8000}, {&(0x7f0000000040)='\x00NSR02', 0x6, 0x8800}, {&(0x7f0000010300)="010002005f0001007b8ff001600000000100000000000000084c696e757855444600000000000000000000000000000000000000000000090100010003000300010000000100000008313233343536373831323334353637384c696e7578554446", 0x61, 0x18000}, {&(0x7f0000010400)="0000000000000019004f53544120436f6d7072657373656420556e69636f646500000000000000000000000000000000000000000000000000000000000000000000000000000000004f53544120436f6d7072657373656420556e69636f64650000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002a4c696e7578206d6b756466667300000000000000000004050000000000007810e4070913142c1a023848002a4c696e757820554446465300000000000000000000000405", 0xde, 0x180c0}, {&(0x7f0000010500)="000000000000000001", 0x9, 0x181e0}, {&(0x7f0000011400)="020002003700010077c9f00100010000004000006000000000400000e0", 0x1d, 0x40000}], 0x0, &(0x7f00000000c0)={[{@iocharset={'iocharset', 0x3d, 'iso8859-4'}}]}) 16:52:04 executing program 1: 16:52:04 executing program 4: 16:52:04 executing program 5: 16:52:04 executing program 0: 16:52:04 executing program 3: r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000100)={0x0, 0xb, 0x1, {0xb, @pix={0x0, 0x1f}}}) ioctl$VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, &(0x7f0000000000)={0xb, 0x0, 0x0, 0x0, 0xffffffffffffffff}) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x12, r1, 0x0) 16:52:04 executing program 1: 16:52:04 executing program 3: r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000100)={0x0, 0xb, 0x1, {0xb, @pix={0x0, 0x1f}}}) ioctl$VIDIOC_EXPBUF(r0, 0xc0405610, 0x0) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x12, 0xffffffffffffffff, 0x0) 16:52:04 executing program 0: 16:52:04 executing program 5: 16:52:04 executing program 4: [ 197.314424] UDF-fs: warning (device loop2): udf_load_vrs: No anchor found [ 197.325743] UDF-fs: Scanning with blocksize 512 failed 16:52:04 executing program 1: [ 197.380950] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=512, location=512 [ 197.435104] UDF-fs: warning (device loop2): udf_load_vrs: No anchor found [ 197.459520] UDF-fs: Scanning with blocksize 1024 failed [ 197.483284] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=256, location=256 [ 197.522049] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=512, location=512 [ 197.538857] UDF-fs: warning (device loop2): udf_load_vrs: No anchor found [ 197.552830] UDF-fs: Scanning with blocksize 2048 failed [ 197.572621] UDF-fs: warning (device loop2): udf_load_vrs: No VRS found [ 197.591305] UDF-fs: Scanning with blocksize 4096 failed 16:52:04 executing program 2: syz_mount_image$udf(&(0x7f0000000000)='udf\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)='\x00BEA01', 0x6, 0x8000}, {&(0x7f0000000040)='\x00NSR02', 0x6, 0x8800}, {&(0x7f0000010300)="010002005f0001007b8ff001600000000100000000000000084c696e757855444600000000000000000000000000000000000000000000090100010003000300010000000100000008313233343536373831323334353637384c696e7578554446", 0x61, 0x18000}, {&(0x7f0000010400)="0000000000000019004f53544120436f6d7072657373656420556e69636f646500000000000000000000000000000000000000000000000000000000000000000000000000000000004f53544120436f6d7072657373656420556e69636f64650000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002a4c696e7578206d6b756466667300000000000000000004050000000000007810e4070913142c1a023848002a4c696e757820554446465300000000000000000000000405", 0xde, 0x180c0}, {&(0x7f0000010500)="000000000000000001", 0x9, 0x181e0}, {&(0x7f0000011400)="020002003700010077c9f00100010000004000006000000000400000e007", 0x1e}], 0x0, &(0x7f00000000c0)={[{@iocharset={'iocharset', 0x3d, 'iso8859-4'}}]}) 16:52:04 executing program 0: 16:52:04 executing program 4: 16:52:04 executing program 5: 16:52:04 executing program 3: r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000100)={0x0, 0xb, 0x1, {0xb, @pix={0x0, 0x1f}}}) ioctl$VIDIOC_EXPBUF(r0, 0xc0405610, 0x0) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x12, 0xffffffffffffffff, 0x0) 16:52:04 executing program 1: 16:52:04 executing program 5: 16:52:04 executing program 1: 16:52:04 executing program 0: 16:52:04 executing program 4: [ 197.721498] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=512, location=512 16:52:04 executing program 3: r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000100)={0x0, 0xb, 0x1, {0xb, @pix={0x0, 0x1f}}}) ioctl$VIDIOC_EXPBUF(r0, 0xc0405610, 0x0) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x12, 0xffffffffffffffff, 0x0) [ 197.765567] UDF-fs: warning (device loop2): udf_load_vrs: No anchor found [ 197.797526] UDF-fs: Scanning with blocksize 512 failed 16:52:04 executing program 5: [ 197.830148] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=256, location=256 [ 197.898814] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=512, location=512 [ 197.927343] UDF-fs: warning (device loop2): udf_load_vrs: No anchor found [ 197.938104] UDF-fs: Scanning with blocksize 1024 failed [ 197.951847] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=256, location=256 [ 197.973775] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=512, location=512 [ 197.983019] UDF-fs: warning (device loop2): udf_load_vrs: No anchor found [ 197.996201] UDF-fs: Scanning with blocksize 2048 failed [ 198.011375] UDF-fs: warning (device loop2): udf_load_vrs: No VRS found [ 198.018956] UDF-fs: Scanning with blocksize 4096 failed 16:52:05 executing program 2: syz_mount_image$udf(&(0x7f0000000000)='udf\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)='\x00BEA01', 0x6, 0x8000}, {&(0x7f0000000040)='\x00NSR02', 0x6, 0x8800}, {&(0x7f0000010300)="010002005f0001007b8ff001600000000100000000000000084c696e757855444600000000000000000000000000000000000000000000090100010003000300010000000100000008313233343536373831323334353637384c696e7578554446", 0x61, 0x18000}, {&(0x7f0000010400)="0000000000000019004f53544120436f6d7072657373656420556e69636f646500000000000000000000000000000000000000000000000000000000000000000000000000000000004f53544120436f6d7072657373656420556e69636f64650000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002a4c696e7578206d6b756466667300000000000000000004050000000000007810e4070913142c1a023848002a4c696e757820554446465300000000000000000000000405", 0xde, 0x180c0}, {&(0x7f0000010500)="000000000000000001", 0x9, 0x181e0}, {&(0x7f0000011400)="020002003700010077c9f00100010000004000006000000000400000e007", 0x1e}], 0x0, &(0x7f00000000c0)={[{@iocharset={'iocharset', 0x3d, 'iso8859-4'}}]}) 16:52:05 executing program 1: 16:52:05 executing program 4: 16:52:05 executing program 0: 16:52:05 executing program 3: r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000100)={0x0, 0xb, 0x1, {0xb, @pix={0x0, 0x1f}}}) ioctl$VIDIOC_EXPBUF(r0, 0xc0405610, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x12, r1, 0x0) 16:52:05 executing program 5: 16:52:05 executing program 1: 16:52:05 executing program 4: 16:52:05 executing program 5: 16:52:05 executing program 0: 16:52:05 executing program 3: r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000100)={0x0, 0xb, 0x1, {0xb, @pix={0x0, 0x1f}}}) ioctl$VIDIOC_EXPBUF(r0, 0xc0405610, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x12, r1, 0x0) 16:52:05 executing program 4: [ 198.180604] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=512, location=512 [ 198.259881] UDF-fs: warning (device loop2): udf_load_vrs: No anchor found [ 198.291360] UDF-fs: Scanning with blocksize 512 failed [ 198.322249] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=256, location=256 [ 198.341717] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=512, location=512 [ 198.352760] UDF-fs: warning (device loop2): udf_load_vrs: No anchor found [ 198.362721] UDF-fs: Scanning with blocksize 1024 failed [ 198.370141] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=256, location=256 [ 198.380584] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=512, location=512 [ 198.390653] UDF-fs: warning (device loop2): udf_load_vrs: No anchor found [ 198.398876] UDF-fs: Scanning with blocksize 2048 failed [ 198.405058] UDF-fs: warning (device loop2): udf_load_vrs: No VRS found [ 198.413866] UDF-fs: Scanning with blocksize 4096 failed 16:52:05 executing program 2: syz_mount_image$udf(&(0x7f0000000000)='udf\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)='\x00BEA01', 0x6, 0x8000}, {&(0x7f0000000040)='\x00NSR02', 0x6, 0x8800}, {&(0x7f0000010300)="010002005f0001007b8ff001600000000100000000000000084c696e757855444600000000000000000000000000000000000000000000090100010003000300010000000100000008313233343536373831323334353637384c696e7578554446", 0x61, 0x18000}, {&(0x7f0000010400)="0000000000000019004f53544120436f6d7072657373656420556e69636f646500000000000000000000000000000000000000000000000000000000000000000000000000000000004f53544120436f6d7072657373656420556e69636f64650000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002a4c696e7578206d6b756466667300000000000000000004050000000000007810e4070913142c1a023848002a4c696e757820554446465300000000000000000000000405", 0xde, 0x180c0}, {&(0x7f0000010500)="000000000000000001", 0x9, 0x181e0}, {&(0x7f0000011400)="020002003700010077c9f00100010000004000006000000000400000e007", 0x1e}], 0x0, &(0x7f00000000c0)={[{@iocharset={'iocharset', 0x3d, 'iso8859-4'}}]}) 16:52:05 executing program 5: 16:52:05 executing program 1: 16:52:05 executing program 4: 16:52:05 executing program 3: r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000100)={0x0, 0xb, 0x1, {0xb, @pix={0x0, 0x1f}}}) ioctl$VIDIOC_EXPBUF(r0, 0xc0405610, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x12, r1, 0x0) 16:52:05 executing program 0: 16:52:05 executing program 1: 16:52:05 executing program 4: 16:52:05 executing program 5: 16:52:05 executing program 3: r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000100)={0x0, 0xb, 0x1, {0xb, @pix={0x0, 0x1f}}}) ioctl$VIDIOC_EXPBUF(r0, 0xc0405610, &(0x7f0000000000)={0xb, 0x0, 0x0, 0x0, 0xffffffffffffffff}) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x10, r1, 0x0) 16:52:05 executing program 0: [ 198.605067] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=512, location=512 16:52:05 executing program 1: [ 198.682376] UDF-fs: warning (device loop2): udf_load_vrs: No anchor found [ 198.719826] UDF-fs: Scanning with blocksize 512 failed [ 198.735960] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=256, location=256 [ 198.755811] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=512, location=512 [ 198.777768] UDF-fs: warning (device loop2): udf_load_vrs: No anchor found [ 198.784755] UDF-fs: Scanning with blocksize 1024 failed [ 198.803562] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=256, location=256 [ 198.829486] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=512, location=512 [ 198.847286] UDF-fs: warning (device loop2): udf_load_vrs: No anchor found [ 198.858471] UDF-fs: Scanning with blocksize 2048 failed [ 198.866022] UDF-fs: warning (device loop2): udf_load_vrs: No VRS found [ 198.875576] UDF-fs: Scanning with blocksize 4096 failed 16:52:05 executing program 2: syz_mount_image$udf(&(0x7f0000000000)='udf\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)='\x00BEA01', 0x6, 0x8000}, {&(0x7f0000000040)='\x00NSR02', 0x6, 0x8800}, {&(0x7f0000010300)="010002005f0001007b8ff001600000000100000000000000084c696e757855444600000000000000000000000000000000000000000000090100010003000300010000000100000008313233343536373831323334353637384c696e7578554446", 0x61, 0x18000}, {&(0x7f0000010400)="0000000000000019004f53544120436f6d7072657373656420556e69636f646500000000000000000000000000000000000000000000000000000000000000000000000000000000004f53544120436f6d7072657373656420556e69636f64650000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002a4c696e7578206d6b756466667300000000000000000004050000000000007810e4070913142c1a023848002a4c696e757820554446465300000000000000000000000405", 0xde, 0x180c0}, {&(0x7f0000011400)="020002003700010077c9f00100010000004000006000000000400000e007", 0x1e, 0x40000}], 0x0, &(0x7f00000000c0)={[{@iocharset={'iocharset', 0x3d, 'iso8859-4'}}]}) 16:52:05 executing program 5: 16:52:05 executing program 4: 16:52:05 executing program 3: r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000100)={0x0, 0xb, 0x1, {0xb, @pix={0x0, 0x1f}}}) ioctl$VIDIOC_EXPBUF(r0, 0xc0405610, &(0x7f0000000000)={0xb, 0x0, 0x0, 0x0, 0xffffffffffffffff}) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x10, r1, 0x0) 16:52:05 executing program 0: 16:52:05 executing program 1: 16:52:05 executing program 4: 16:52:05 executing program 5: 16:52:05 executing program 1: 16:52:05 executing program 3: r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000100)={0x0, 0xb, 0x1, {0xb, @pix={0x0, 0x1f}}}) ioctl$VIDIOC_EXPBUF(r0, 0xc0405610, &(0x7f0000000000)={0xb, 0x0, 0x0, 0x0, 0xffffffffffffffff}) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x10, r1, 0x0) 16:52:06 executing program 0: [ 199.048273] UDF-fs: warning (device loop2): udf_load_vrs: No anchor found [ 199.060600] UDF-fs: Scanning with blocksize 512 failed [ 199.070173] UDF-fs: error (device loop2): udf_process_sequence: Primary Volume Descriptor not found! 16:52:06 executing program 1: [ 199.117116] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=2016, location=2016 [ 199.147584] UDF-fs: error (device loop2): udf_process_sequence: Primary Volume Descriptor not found! [ 199.161731] UDF-fs: Scanning with blocksize 1024 failed [ 199.170369] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=256, location=256 [ 199.195819] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=512, location=512 [ 199.211069] UDF-fs: warning (device loop2): udf_load_vrs: No anchor found [ 199.218971] UDF-fs: Scanning with blocksize 2048 failed [ 199.225234] UDF-fs: warning (device loop2): udf_load_vrs: No VRS found [ 199.237900] UDF-fs: Scanning with blocksize 4096 failed 16:52:06 executing program 2: syz_mount_image$udf(&(0x7f0000000000)='udf\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)='\x00BEA01', 0x6, 0x8000}, {&(0x7f0000000040)='\x00NSR02', 0x6, 0x8800}, {&(0x7f0000010300)="010002005f0001007b8ff001600000000100000000000000084c696e757855444600000000000000000000000000000000000000000000090100010003000300010000000100000008313233343536373831323334353637384c696e7578554446", 0x61, 0x18000}, {&(0x7f0000010400)="0000000000000019004f53544120436f6d7072657373656420556e69636f646500000000000000000000000000000000000000000000000000000000000000000000000000000000004f53544120436f6d7072657373656420556e69636f64650000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002a4c696e7578206d6b756466667300000000000000000004050000000000007810e4070913142c1a023848002a4c696e757820554446465300000000000000000000000405", 0xde, 0x180c0}, {&(0x7f0000011400)="020002003700010077c9f00100010000004000006000000000400000e007", 0x1e, 0x40000}], 0x0, &(0x7f00000000c0)={[{@iocharset={'iocharset', 0x3d, 'iso8859-4'}}]}) 16:52:06 executing program 4: 16:52:06 executing program 5: 16:52:06 executing program 1: 16:52:06 executing program 0: 16:52:06 executing program 3: r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000100)={0x0, 0xb, 0x1, {0xb, @pix={0x0, 0x1f}}}) ioctl$VIDIOC_EXPBUF(r0, 0xc0405610, &(0x7f0000000000)={0xb}) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x12, 0xffffffffffffffff, 0x0) 16:52:06 executing program 5: 16:52:06 executing program 4: 16:52:06 executing program 0: 16:52:06 executing program 5: 16:52:06 executing program 1: [ 199.508283] UDF-fs: warning (device loop2): udf_load_vrs: No anchor found 16:52:06 executing program 4: [ 199.566318] UDF-fs: Scanning with blocksize 512 failed [ 199.602835] UDF-fs: error (device loop2): udf_process_sequence: Primary Volume Descriptor not found! [ 199.649021] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=2016, location=2016 [ 199.671380] UDF-fs: error (device loop2): udf_process_sequence: Primary Volume Descriptor not found! [ 199.682013] UDF-fs: Scanning with blocksize 1024 failed [ 199.693934] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=256, location=256 [ 199.705261] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=512, location=512 [ 199.718171] UDF-fs: warning (device loop2): udf_load_vrs: No anchor found [ 199.725215] UDF-fs: Scanning with blocksize 2048 failed [ 199.732713] UDF-fs: warning (device loop2): udf_load_vrs: No VRS found [ 199.740469] UDF-fs: Scanning with blocksize 4096 failed 16:52:06 executing program 2: syz_mount_image$udf(&(0x7f0000000000)='udf\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)='\x00BEA01', 0x6, 0x8000}, {&(0x7f0000000040)='\x00NSR02', 0x6, 0x8800}, {&(0x7f0000010300)="010002005f0001007b8ff001600000000100000000000000084c696e757855444600000000000000000000000000000000000000000000090100010003000300010000000100000008313233343536373831323334353637384c696e7578554446", 0x61, 0x18000}, {&(0x7f0000010400)="0000000000000019004f53544120436f6d7072657373656420556e69636f646500000000000000000000000000000000000000000000000000000000000000000000000000000000004f53544120436f6d7072657373656420556e69636f64650000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002a4c696e7578206d6b756466667300000000000000000004050000000000007810e4070913142c1a023848002a4c696e757820554446465300000000000000000000000405", 0xde, 0x180c0}, {&(0x7f0000011400)="020002003700010077c9f00100010000004000006000000000400000e007", 0x1e, 0x40000}], 0x0, &(0x7f00000000c0)={[{@iocharset={'iocharset', 0x3d, 'iso8859-4'}}]}) 16:52:06 executing program 3: r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000100)={0x0, 0xb, 0x1, {0xb, @pix={0x0, 0x1f}}}) ioctl$VIDIOC_EXPBUF(r0, 0xc0405610, &(0x7f0000000000)={0xb}) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x12, 0xffffffffffffffff, 0x0) 16:52:06 executing program 0: 16:52:06 executing program 5: 16:52:06 executing program 1: 16:52:06 executing program 4: 16:52:06 executing program 4: 16:52:06 executing program 0: 16:52:06 executing program 5: 16:52:06 executing program 1: 16:52:06 executing program 3: r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000100)={0x0, 0xb, 0x1, {0xb, @pix={0x0, 0x1f}}}) ioctl$VIDIOC_EXPBUF(r0, 0xc0405610, &(0x7f0000000000)={0xb}) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x12, 0xffffffffffffffff, 0x0) [ 199.937748] UDF-fs: warning (device loop2): udf_load_vrs: No anchor found 16:52:06 executing program 1: [ 199.987148] UDF-fs: Scanning with blocksize 512 failed [ 200.040199] UDF-fs: error (device loop2): udf_process_sequence: Primary Volume Descriptor not found! [ 200.075796] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=2016, location=2016 [ 200.097618] UDF-fs: error (device loop2): udf_process_sequence: Primary Volume Descriptor not found! [ 200.119147] UDF-fs: Scanning with blocksize 1024 failed [ 200.125562] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=256, location=256 [ 200.137118] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=512, location=512 16:52:07 executing program 2: syz_mount_image$udf(&(0x7f0000000000)='udf\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)='\x00BEA01', 0x6, 0x8000}, {&(0x7f0000000040)='\x00NSR02', 0x6, 0x8800}, {&(0x7f0000010300)="010002005f0001007b8ff001600000000100000000000000084c696e757855444600000000000000000000000000000000000000000000090100010003000300010000000100000008313233343536373831323334353637384c696e7578554446", 0x61, 0x18000}, {&(0x7f0000010400)="0000000000000019004f53544120436f6d7072657373656420556e69636f646500000000000000000000000000000000000000000000000000000000000000000000000000000000004f53544120436f6d7072657373656420556e69636f64650000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002a4c696e7578206d6b756466667300000000000000000004050000000000007810e4070913142c1a023848002a4c696e757820554446465300000000000000000000000405", 0xde, 0x180c0}, {0x0, 0x0, 0x181e0}, {&(0x7f0000011400)="020002003700010077c9f00100010000004000006000000000400000e007", 0x1e, 0x40000}], 0x0, &(0x7f00000000c0)={[{@iocharset={'iocharset', 0x3d, 'iso8859-4'}}]}) 16:52:07 executing program 4: 16:52:07 executing program 5: 16:52:07 executing program 0: 16:52:07 executing program 1: 16:52:07 executing program 3: [ 200.147516] UDF-fs: warning (device loop2): udf_load_vrs: No anchor found [ 200.154591] UDF-fs: Scanning with blocksize 2048 failed [ 200.160871] UDF-fs: warning (device loop2): udf_load_vrs: No VRS found [ 200.168937] UDF-fs: Scanning with blocksize 4096 failed 16:52:07 executing program 4: 16:52:07 executing program 5: 16:52:07 executing program 3: 16:52:07 executing program 0: 16:52:07 executing program 1: [ 200.321953] UDF-fs: warning (device loop2): udf_load_vrs: No anchor found [ 200.331130] UDF-fs: Scanning with blocksize 512 failed [ 200.344302] UDF-fs: error (device loop2): udf_process_sequence: Primary Volume Descriptor not found! 16:52:07 executing program 4: [ 200.403334] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=2016, location=2016 [ 200.455078] UDF-fs: error (device loop2): udf_process_sequence: Primary Volume Descriptor not found! [ 200.479227] UDF-fs: Scanning with blocksize 1024 failed [ 200.485674] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=256, location=256 [ 200.509888] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=512, location=512 [ 200.524672] UDF-fs: warning (device loop2): udf_load_vrs: No anchor found [ 200.533137] UDF-fs: Scanning with blocksize 2048 failed [ 200.543911] UDF-fs: warning (device loop2): udf_load_vrs: No VRS found 16:52:07 executing program 2: syz_mount_image$udf(&(0x7f0000000000)='udf\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)='\x00BEA01', 0x6, 0x8000}, {&(0x7f0000000040)='\x00NSR02', 0x6, 0x8800}, {&(0x7f0000010300)="010002005f0001007b8ff001600000000100000000000000084c696e757855444600000000000000000000000000000000000000000000090100010003000300010000000100000008313233343536373831323334353637384c696e7578554446", 0x61, 0x18000}, {&(0x7f0000010400)="0000000000000019004f53544120436f6d7072657373656420556e69636f646500000000000000000000000000000000000000000000000000000000000000000000000000000000004f53544120436f6d7072657373656420556e69636f64650000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002a4c696e7578206d6b756466667300000000000000000004050000000000007810e4070913142c1a023848002a4c696e757820554446465300000000000000000000000405", 0xde, 0x180c0}, {0x0, 0x0, 0x181e0}, {&(0x7f0000011400)="020002003700010077c9f00100010000004000006000000000400000e007", 0x1e, 0x40000}], 0x0, &(0x7f00000000c0)={[{@iocharset={'iocharset', 0x3d, 'iso8859-4'}}]}) 16:52:07 executing program 0: 16:52:07 executing program 5: 16:52:07 executing program 3: 16:52:07 executing program 4: 16:52:07 executing program 1: [ 200.563749] UDF-fs: Scanning with blocksize 4096 failed 16:52:07 executing program 0: 16:52:07 executing program 3: 16:52:07 executing program 4: 16:52:07 executing program 5: 16:52:07 executing program 1: [ 200.723200] UDF-fs: warning (device loop2): udf_load_vrs: No anchor found [ 200.737370] UDF-fs: Scanning with blocksize 512 failed 16:52:07 executing program 0: [ 200.795896] UDF-fs: error (device loop2): udf_process_sequence: Primary Volume Descriptor not found! [ 200.841001] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=2016, location=2016 [ 200.902922] UDF-fs: error (device loop2): udf_process_sequence: Primary Volume Descriptor not found! [ 200.922200] UDF-fs: Scanning with blocksize 1024 failed [ 200.933729] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=256, location=256 [ 200.953214] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=512, location=512 [ 200.964487] UDF-fs: warning (device loop2): udf_load_vrs: No anchor found [ 200.972864] UDF-fs: Scanning with blocksize 2048 failed [ 200.980773] UDF-fs: warning (device loop2): udf_load_vrs: No VRS found [ 200.989298] UDF-fs: Scanning with blocksize 4096 failed 16:52:07 executing program 2: syz_mount_image$udf(&(0x7f0000000000)='udf\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)='\x00BEA01', 0x6, 0x8000}, {&(0x7f0000000040)='\x00NSR02', 0x6, 0x8800}, {&(0x7f0000010300)="010002005f0001007b8ff001600000000100000000000000084c696e757855444600000000000000000000000000000000000000000000090100010003000300010000000100000008313233343536373831323334353637384c696e7578554446", 0x61, 0x18000}, {&(0x7f0000010400)="0000000000000019004f53544120436f6d7072657373656420556e69636f646500000000000000000000000000000000000000000000000000000000000000000000000000000000004f53544120436f6d7072657373656420556e69636f64650000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002a4c696e7578206d6b756466667300000000000000000004050000000000007810e4070913142c1a023848002a4c696e757820554446465300000000000000000000000405", 0xde, 0x180c0}, {0x0, 0x0, 0x181e0}, {&(0x7f0000011400)="020002003700010077c9f00100010000004000006000000000400000e007", 0x1e, 0x40000}], 0x0, &(0x7f00000000c0)={[{@iocharset={'iocharset', 0x3d, 'iso8859-4'}}]}) 16:52:07 executing program 4: 16:52:07 executing program 1: 16:52:07 executing program 3: 16:52:07 executing program 0: 16:52:07 executing program 5: 16:52:08 executing program 1: 16:52:08 executing program 0: 16:52:08 executing program 5: 16:52:08 executing program 4: 16:52:08 executing program 3: [ 201.156917] UDF-fs: warning (device loop2): udf_load_vrs: No anchor found [ 201.192254] UDF-fs: Scanning with blocksize 512 failed 16:52:08 executing program 1: [ 201.224324] UDF-fs: error (device loop2): udf_process_sequence: Primary Volume Descriptor not found! [ 201.277771] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=2016, location=2016 [ 201.304269] UDF-fs: error (device loop2): udf_process_sequence: Primary Volume Descriptor not found! [ 201.335893] UDF-fs: Scanning with blocksize 1024 failed [ 201.349316] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=256, location=256 [ 201.363112] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=512, location=512 [ 201.379629] UDF-fs: warning (device loop2): udf_load_vrs: No anchor found [ 201.388668] UDF-fs: Scanning with blocksize 2048 failed [ 201.394773] UDF-fs: warning (device loop2): udf_load_vrs: No VRS found [ 201.402493] UDF-fs: Scanning with blocksize 4096 failed 16:52:08 executing program 2: syz_mount_image$udf(&(0x7f0000000000)='udf\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)='\x00BEA01', 0x6, 0x8000}, {&(0x7f0000000040)='\x00NSR02', 0x6, 0x8800}, {&(0x7f0000010300)="010002005f0001007b8ff001600000000100000000000000084c696e757855444600000000000000000000000000000000000000000000090100010003000300010000000100000008313233343536373831323334353637384c696e7578554446", 0x61, 0x18000}, {&(0x7f0000010400)="0000000000000019004f53544120436f6d7072657373656420556e69636f646500000000000000000000000000000000000000000000000000000000000000000000000000000000004f53544120436f6d7072657373656420556e69636f64650000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002a4c696e7578206d6b756466667300000000000000000004050000000000007810e4070913142c1a023848002a4c696e757820554446465300000000000000000000000405", 0xde, 0x180c0}, {&(0x7f0000010500), 0x0, 0x181e0}, {&(0x7f0000011400)="020002003700010077c9f00100010000004000006000000000400000e007", 0x1e, 0x40000}], 0x0, &(0x7f00000000c0)={[{@iocharset={'iocharset', 0x3d, 'iso8859-4'}}]}) 16:52:08 executing program 5: 16:52:08 executing program 0: 16:52:08 executing program 4: 16:52:08 executing program 3: 16:52:08 executing program 1: 16:52:08 executing program 3: 16:52:08 executing program 4: 16:52:08 executing program 1: 16:52:08 executing program 0: 16:52:08 executing program 5: [ 201.557433] UDF-fs: warning (device loop2): udf_load_vrs: No anchor found [ 201.590903] UDF-fs: Scanning with blocksize 512 failed 16:52:08 executing program 3: [ 201.626648] UDF-fs: error (device loop2): udf_process_sequence: Primary Volume Descriptor not found! [ 201.679702] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=2016, location=2016 [ 201.715939] UDF-fs: error (device loop2): udf_process_sequence: Primary Volume Descriptor not found! [ 201.727552] UDF-fs: Scanning with blocksize 1024 failed [ 201.739201] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=256, location=256 [ 201.758216] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=512, location=512 [ 201.769683] UDF-fs: warning (device loop2): udf_load_vrs: No anchor found [ 201.777905] UDF-fs: Scanning with blocksize 2048 failed [ 201.784247] UDF-fs: warning (device loop2): udf_load_vrs: No VRS found [ 201.793166] UDF-fs: Scanning with blocksize 4096 failed 16:52:08 executing program 2: syz_mount_image$udf(&(0x7f0000000000)='udf\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)='\x00BEA01', 0x6, 0x8000}, {&(0x7f0000000040)='\x00NSR02', 0x6, 0x8800}, {&(0x7f0000010300)="010002005f0001007b8ff001600000000100000000000000084c696e757855444600000000000000000000000000000000000000000000090100010003000300010000000100000008313233343536373831323334353637384c696e7578554446", 0x61, 0x18000}, {&(0x7f0000010400)="0000000000000019004f53544120436f6d7072657373656420556e69636f646500000000000000000000000000000000000000000000000000000000000000000000000000000000004f53544120436f6d7072657373656420556e69636f64650000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002a4c696e7578206d6b756466667300000000000000000004050000000000007810e4070913142c1a023848002a4c696e757820554446465300000000000000000000000405", 0xde, 0x180c0}, {&(0x7f0000010500), 0x0, 0x181e0}, {&(0x7f0000011400)="020002003700010077c9f00100010000004000006000000000400000e007", 0x1e, 0x40000}], 0x0, &(0x7f00000000c0)={[{@iocharset={'iocharset', 0x3d, 'iso8859-4'}}]}) 16:52:08 executing program 5: 16:52:08 executing program 1: 16:52:08 executing program 4: 16:52:08 executing program 0: 16:52:08 executing program 3: 16:52:08 executing program 3: 16:52:08 executing program 4: 16:52:08 executing program 1: 16:52:08 executing program 5: 16:52:08 executing program 0: 16:52:08 executing program 4: [ 201.996827] UDF-fs: warning (device loop2): udf_load_vrs: No anchor found [ 202.034925] UDF-fs: Scanning with blocksize 512 failed [ 202.096100] UDF-fs: error (device loop2): udf_process_sequence: Primary Volume Descriptor not found! [ 202.129538] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=2016, location=2016 [ 202.152187] UDF-fs: error (device loop2): udf_process_sequence: Primary Volume Descriptor not found! [ 202.167145] UDF-fs: Scanning with blocksize 1024 failed [ 202.173929] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=256, location=256 [ 202.191556] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=512, location=512 [ 202.203160] UDF-fs: warning (device loop2): udf_load_vrs: No anchor found [ 202.213664] UDF-fs: Scanning with blocksize 2048 failed [ 202.239156] UDF-fs: warning (device loop2): udf_load_vrs: No VRS found [ 202.247190] UDF-fs: Scanning with blocksize 4096 failed 16:52:09 executing program 2: syz_mount_image$udf(&(0x7f0000000000)='udf\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)='\x00BEA01', 0x6, 0x8000}, {&(0x7f0000000040)='\x00NSR02', 0x6, 0x8800}, {&(0x7f0000010300)="010002005f0001007b8ff001600000000100000000000000084c696e757855444600000000000000000000000000000000000000000000090100010003000300010000000100000008313233343536373831323334353637384c696e7578554446", 0x61, 0x18000}, {&(0x7f0000010400)="0000000000000019004f53544120436f6d7072657373656420556e69636f646500000000000000000000000000000000000000000000000000000000000000000000000000000000004f53544120436f6d7072657373656420556e69636f64650000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002a4c696e7578206d6b756466667300000000000000000004050000000000007810e4070913142c1a023848002a4c696e757820554446465300000000000000000000000405", 0xde, 0x180c0}, {&(0x7f0000010500), 0x0, 0x181e0}, {&(0x7f0000011400)="020002003700010077c9f00100010000004000006000000000400000e007", 0x1e, 0x40000}], 0x0, &(0x7f00000000c0)={[{@iocharset={'iocharset', 0x3d, 'iso8859-4'}}]}) 16:52:09 executing program 3: 16:52:09 executing program 0: 16:52:09 executing program 4: 16:52:09 executing program 1: 16:52:09 executing program 5: 16:52:09 executing program 4: 16:52:09 executing program 5: 16:52:09 executing program 3: 16:52:09 executing program 1: 16:52:09 executing program 0: 16:52:09 executing program 4: [ 202.440179] UDF-fs: warning (device loop2): udf_load_vrs: No anchor found [ 202.468285] UDF-fs: Scanning with blocksize 512 failed [ 202.506076] UDF-fs: error (device loop2): udf_process_sequence: Primary Volume Descriptor not found! [ 202.529124] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=2016, location=2016 [ 202.551641] UDF-fs: error (device loop2): udf_process_sequence: Primary Volume Descriptor not found! [ 202.567019] UDF-fs: Scanning with blocksize 1024 failed [ 202.573263] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=256, location=256 [ 202.584716] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=512, location=512 [ 202.596123] UDF-fs: warning (device loop2): udf_load_vrs: No anchor found [ 202.604309] UDF-fs: Scanning with blocksize 2048 failed [ 202.611304] UDF-fs: warning (device loop2): udf_load_vrs: No VRS found [ 202.618999] UDF-fs: Scanning with blocksize 4096 failed 16:52:09 executing program 2: syz_mount_image$udf(&(0x7f0000000000)='udf\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)='\x00BEA01', 0x6, 0x8000}, {&(0x7f0000000040)='\x00NSR02', 0x6, 0x8800}, {&(0x7f0000010300)="010002005f0001007b8ff001600000000100000000000000084c696e757855444600000000000000000000000000000000000000000000090100010003000300010000000100000008313233343536373831323334353637384c696e7578554446", 0x61, 0x18000}, {&(0x7f0000010400)="0000000000000019004f53544120436f6d7072657373656420556e69636f646500000000000000000000000000000000000000000000000000000000000000000000000000000000004f53544120436f6d7072657373656420556e69636f64650000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002a4c696e7578206d6b756466667300000000000000000004050000000000007810e4070913142c1a023848002a4c696e757820554446465300000000000000000000000405", 0xde, 0x180c0}, {&(0x7f0000010500)='\x00\x00\x00\x00\x00', 0x5, 0x181e0}, {&(0x7f0000011400)="020002003700010077c9f00100010000004000006000000000400000e007", 0x1e, 0x40000}], 0x0, &(0x7f00000000c0)={[{@iocharset={'iocharset', 0x3d, 'iso8859-4'}}]}) 16:52:09 executing program 5: 16:52:09 executing program 3: 16:52:09 executing program 1: 16:52:09 executing program 0: 16:52:09 executing program 4: 16:52:09 executing program 4: 16:52:09 executing program 0: 16:52:09 executing program 5: 16:52:09 executing program 1: 16:52:09 executing program 3: [ 202.768911] UDF-fs: warning (device loop2): udf_load_vrs: No anchor found [ 202.799962] UDF-fs: Scanning with blocksize 512 failed 16:52:09 executing program 0: [ 202.843597] UDF-fs: error (device loop2): udf_process_sequence: Primary Volume Descriptor not found! [ 202.891154] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=2016, location=2016 [ 202.924400] UDF-fs: error (device loop2): udf_process_sequence: Primary Volume Descriptor not found! [ 202.937934] UDF-fs: Scanning with blocksize 1024 failed [ 202.944251] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=256, location=256 [ 202.961365] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=512, location=512 [ 202.982713] UDF-fs: warning (device loop2): udf_load_vrs: No anchor found [ 202.990632] UDF-fs: Scanning with blocksize 2048 failed [ 202.998486] UDF-fs: warning (device loop2): udf_load_vrs: No VRS found [ 203.005770] UDF-fs: Scanning with blocksize 4096 failed 16:52:09 executing program 2: syz_mount_image$udf(&(0x7f0000000000)='udf\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)='\x00BEA01', 0x6, 0x8000}, {&(0x7f0000000040)='\x00NSR02', 0x6, 0x8800}, {&(0x7f0000010300)="010002005f0001007b8ff001600000000100000000000000084c696e757855444600000000000000000000000000000000000000000000090100010003000300010000000100000008313233343536373831323334353637384c696e7578554446", 0x61, 0x18000}, {&(0x7f0000010400)="0000000000000019004f53544120436f6d7072657373656420556e69636f646500000000000000000000000000000000000000000000000000000000000000000000000000000000004f53544120436f6d7072657373656420556e69636f64650000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002a4c696e7578206d6b756466667300000000000000000004050000000000007810e4070913142c1a023848002a4c696e757820554446465300000000000000000000000405", 0xde, 0x180c0}, {&(0x7f0000010500)='\x00\x00\x00\x00\x00', 0x5, 0x181e0}, {&(0x7f0000011400)="020002003700010077c9f00100010000004000006000000000400000e007", 0x1e, 0x40000}], 0x0, &(0x7f00000000c0)={[{@iocharset={'iocharset', 0x3d, 'iso8859-4'}}]}) 16:52:09 executing program 4: 16:52:09 executing program 5: 16:52:09 executing program 1: 16:52:09 executing program 3: 16:52:09 executing program 0: 16:52:10 executing program 1: 16:52:10 executing program 5: 16:52:10 executing program 0: 16:52:10 executing program 4: 16:52:10 executing program 1: 16:52:10 executing program 3: [ 203.239866] UDF-fs: warning (device loop2): udf_load_vrs: No anchor found [ 203.247598] UDF-fs: Scanning with blocksize 512 failed [ 203.264755] UDF-fs: error (device loop2): udf_process_sequence: Primary Volume Descriptor not found! [ 203.290740] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=2016, location=2016 [ 203.321805] UDF-fs: error (device loop2): udf_process_sequence: Primary Volume Descriptor not found! [ 203.331843] UDF-fs: Scanning with blocksize 1024 failed [ 203.338320] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=256, location=256 [ 203.350244] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=512, location=512 [ 203.365228] UDF-fs: warning (device loop2): udf_load_vrs: No anchor found [ 203.373481] UDF-fs: Scanning with blocksize 2048 failed [ 203.380040] UDF-fs: warning (device loop2): udf_load_vrs: No VRS found [ 203.388140] UDF-fs: Scanning with blocksize 4096 failed 16:52:10 executing program 2: syz_mount_image$udf(&(0x7f0000000000)='udf\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)='\x00BEA01', 0x6, 0x8000}, {&(0x7f0000000040)='\x00NSR02', 0x6, 0x8800}, {&(0x7f0000010300)="010002005f0001007b8ff001600000000100000000000000084c696e757855444600000000000000000000000000000000000000000000090100010003000300010000000100000008313233343536373831323334353637384c696e7578554446", 0x61, 0x18000}, {&(0x7f0000010400)="0000000000000019004f53544120436f6d7072657373656420556e69636f646500000000000000000000000000000000000000000000000000000000000000000000000000000000004f53544120436f6d7072657373656420556e69636f64650000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002a4c696e7578206d6b756466667300000000000000000004050000000000007810e4070913142c1a023848002a4c696e757820554446465300000000000000000000000405", 0xde, 0x180c0}, {&(0x7f0000010500)='\x00\x00\x00\x00\x00', 0x5, 0x181e0}, {&(0x7f0000011400)="020002003700010077c9f00100010000004000006000000000400000e007", 0x1e, 0x40000}], 0x0, &(0x7f00000000c0)={[{@iocharset={'iocharset', 0x3d, 'iso8859-4'}}]}) 16:52:10 executing program 5: 16:52:10 executing program 3: 16:52:10 executing program 4: 16:52:10 executing program 0: 16:52:10 executing program 1: 16:52:10 executing program 3: 16:52:10 executing program 0: 16:52:10 executing program 5: 16:52:10 executing program 4: 16:52:10 executing program 1: [ 203.513913] UDF-fs: warning (device loop2): udf_load_vrs: No anchor found [ 203.521962] UDF-fs: Scanning with blocksize 512 failed [ 203.540181] UDF-fs: error (device loop2): udf_process_sequence: Primary Volume Descriptor not found! 16:52:10 executing program 1: [ 203.591435] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=2016, location=2016 [ 203.654085] UDF-fs: error (device loop2): udf_process_sequence: Primary Volume Descriptor not found! [ 203.675975] UDF-fs: Scanning with blocksize 1024 failed [ 203.687084] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=256, location=256 [ 203.697332] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=512, location=512 [ 203.707818] UDF-fs: warning (device loop2): udf_load_vrs: No anchor found [ 203.715145] UDF-fs: Scanning with blocksize 2048 failed [ 203.721906] UDF-fs: warning (device loop2): udf_load_vrs: No VRS found [ 203.731193] UDF-fs: Scanning with blocksize 4096 failed 16:52:10 executing program 2: syz_mount_image$udf(&(0x7f0000000000)='udf\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)='\x00BEA01', 0x6, 0x8000}, {&(0x7f0000000040)='\x00NSR02', 0x6, 0x8800}, {&(0x7f0000010300)="010002005f0001007b8ff001600000000100000000000000084c696e757855444600000000000000000000000000000000000000000000090100010003000300010000000100000008313233343536373831323334353637384c696e7578554446", 0x61, 0x18000}, {&(0x7f0000010400)="0000000000000019004f53544120436f6d7072657373656420556e69636f646500000000000000000000000000000000000000000000000000000000000000000000000000000000004f53544120436f6d7072657373656420556e69636f64650000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002a4c696e7578206d6b756466667300000000000000000004050000000000007810e4070913142c1a023848002a4c696e757820554446465300000000000000000000000405", 0xde, 0x180c0}, {&(0x7f0000010500)='\x00\x00\x00\x00\x00\x00\x00', 0x7, 0x181e0}, {&(0x7f0000011400)="020002003700010077c9f00100010000004000006000000000400000e007", 0x1e, 0x40000}], 0x0, &(0x7f00000000c0)={[{@iocharset={'iocharset', 0x3d, 'iso8859-4'}}]}) 16:52:10 executing program 0: 16:52:10 executing program 3: 16:52:10 executing program 5: 16:52:10 executing program 4: 16:52:10 executing program 1: 16:52:10 executing program 1: 16:52:10 executing program 5: 16:52:10 executing program 0: 16:52:10 executing program 3: 16:52:10 executing program 4: 16:52:10 executing program 1: [ 203.927468] UDF-fs: warning (device loop2): udf_load_vrs: No anchor found [ 203.965868] UDF-fs: Scanning with blocksize 512 failed [ 204.014660] UDF-fs: error (device loop2): udf_process_sequence: Primary Volume Descriptor not found! [ 204.051435] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=2016, location=2016 [ 204.073884] UDF-fs: error (device loop2): udf_process_sequence: Primary Volume Descriptor not found! [ 204.093649] UDF-fs: Scanning with blocksize 1024 failed [ 204.101292] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=256, location=256 [ 204.116650] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=512, location=512 [ 204.131582] UDF-fs: warning (device loop2): udf_load_vrs: No anchor found [ 204.139342] UDF-fs: Scanning with blocksize 2048 failed [ 204.145599] UDF-fs: warning (device loop2): udf_load_vrs: No VRS found [ 204.159224] UDF-fs: Scanning with blocksize 4096 failed 16:52:11 executing program 2: syz_mount_image$udf(&(0x7f0000000000)='udf\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)='\x00BEA01', 0x6, 0x8000}, {&(0x7f0000000040)='\x00NSR02', 0x6, 0x8800}, {&(0x7f0000010300)="010002005f0001007b8ff001600000000100000000000000084c696e757855444600000000000000000000000000000000000000000000090100010003000300010000000100000008313233343536373831323334353637384c696e7578554446", 0x61, 0x18000}, {&(0x7f0000010400)="0000000000000019004f53544120436f6d7072657373656420556e69636f646500000000000000000000000000000000000000000000000000000000000000000000000000000000004f53544120436f6d7072657373656420556e69636f64650000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002a4c696e7578206d6b756466667300000000000000000004050000000000007810e4070913142c1a023848002a4c696e757820554446465300000000000000000000000405", 0xde, 0x180c0}, {&(0x7f0000010500)='\x00\x00\x00\x00\x00\x00\x00', 0x7, 0x181e0}, {&(0x7f0000011400)="020002003700010077c9f00100010000004000006000000000400000e007", 0x1e, 0x40000}], 0x0, &(0x7f00000000c0)={[{@iocharset={'iocharset', 0x3d, 'iso8859-4'}}]}) 16:52:11 executing program 5: 16:52:11 executing program 3: 16:52:11 executing program 0: 16:52:11 executing program 1: 16:52:11 executing program 4: 16:52:11 executing program 5: 16:52:11 executing program 0: 16:52:11 executing program 3: 16:52:11 executing program 1: 16:52:11 executing program 4: [ 204.303594] UDF-fs: warning (device loop2): udf_load_vrs: No anchor found [ 204.319517] UDF-fs: Scanning with blocksize 512 failed [ 204.329954] UDF-fs: error (device loop2): udf_process_sequence: Primary Volume Descriptor not found! 16:52:11 executing program 0: [ 204.377304] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=2016, location=2016 [ 204.417520] UDF-fs: error (device loop2): udf_process_sequence: Primary Volume Descriptor not found! [ 204.468073] UDF-fs: Scanning with blocksize 1024 failed [ 204.482091] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=256, location=256 [ 204.492776] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=512, location=512 [ 204.503689] UDF-fs: warning (device loop2): udf_load_vrs: No anchor found [ 204.511310] UDF-fs: Scanning with blocksize 2048 failed [ 204.518633] UDF-fs: warning (device loop2): udf_load_vrs: No VRS found [ 204.525578] UDF-fs: Scanning with blocksize 4096 failed 16:52:11 executing program 2: syz_mount_image$udf(&(0x7f0000000000)='udf\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)='\x00BEA01', 0x6, 0x8000}, {&(0x7f0000000040)='\x00NSR02', 0x6, 0x8800}, {&(0x7f0000010300)="010002005f0001007b8ff001600000000100000000000000084c696e757855444600000000000000000000000000000000000000000000090100010003000300010000000100000008313233343536373831323334353637384c696e7578554446", 0x61, 0x18000}, {&(0x7f0000010400)="0000000000000019004f53544120436f6d7072657373656420556e69636f646500000000000000000000000000000000000000000000000000000000000000000000000000000000004f53544120436f6d7072657373656420556e69636f64650000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002a4c696e7578206d6b756466667300000000000000000004050000000000007810e4070913142c1a023848002a4c696e757820554446465300000000000000000000000405", 0xde, 0x180c0}, {&(0x7f0000010500)='\x00\x00\x00\x00\x00\x00\x00', 0x7, 0x181e0}, {&(0x7f0000011400)="020002003700010077c9f00100010000004000006000000000400000e007", 0x1e, 0x40000}], 0x0, &(0x7f00000000c0)={[{@iocharset={'iocharset', 0x3d, 'iso8859-4'}}]}) 16:52:11 executing program 5: 16:52:11 executing program 1: 16:52:11 executing program 3: 16:52:11 executing program 0: 16:52:11 executing program 4: 16:52:11 executing program 1: 16:52:11 executing program 3: 16:52:11 executing program 5: 16:52:11 executing program 0: 16:52:11 executing program 4: 16:52:11 executing program 1: [ 204.714290] UDF-fs: warning (device loop2): udf_load_vrs: No anchor found [ 204.739801] UDF-fs: Scanning with blocksize 512 failed [ 204.811318] UDF-fs: error (device loop2): udf_process_sequence: Primary Volume Descriptor not found! [ 204.847814] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=2016, location=2016 [ 204.863047] UDF-fs: error (device loop2): udf_process_sequence: Primary Volume Descriptor not found! [ 204.879760] UDF-fs: Scanning with blocksize 1024 failed [ 204.886002] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=256, location=256 [ 204.905386] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=512, location=512 [ 204.922052] UDF-fs: warning (device loop2): udf_load_vrs: No anchor found [ 204.930546] UDF-fs: Scanning with blocksize 2048 failed [ 204.937955] UDF-fs: warning (device loop2): udf_load_vrs: No VRS found [ 204.944828] UDF-fs: Scanning with blocksize 4096 failed 16:52:11 executing program 2: syz_mount_image$udf(&(0x7f0000000000)='udf\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)='\x00BEA01', 0x6, 0x8000}, {&(0x7f0000000040)='\x00NSR02', 0x6, 0x8800}, {&(0x7f0000010300)="010002005f0001007b8ff001600000000100000000000000084c696e757855444600000000000000000000000000000000000000000000090100010003000300010000000100000008313233343536373831323334353637384c696e7578554446", 0x61, 0x18000}, {&(0x7f0000010400)="0000000000000019004f53544120436f6d7072657373656420556e69636f646500000000000000000000000000000000000000000000000000000000000000000000000000000000004f53544120436f6d7072657373656420556e69636f64650000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002a4c696e7578206d6b756466667300000000000000000004050000000000007810e4070913142c1a023848002a4c696e757820554446465300000000000000000000000405", 0xde, 0x180c0}, {&(0x7f0000010500)='\x00\x00\x00\x00\x00\x00\x00\x00', 0x8, 0x181e0}, {&(0x7f0000011400)="020002003700010077c9f00100010000004000006000000000400000e007", 0x1e, 0x40000}], 0x0, &(0x7f00000000c0)={[{@iocharset={'iocharset', 0x3d, 'iso8859-4'}}]}) 16:52:11 executing program 3: 16:52:11 executing program 0: 16:52:11 executing program 4: 16:52:11 executing program 5: 16:52:11 executing program 1: 16:52:12 executing program 3: 16:52:12 executing program 4: 16:52:12 executing program 5: 16:52:12 executing program 0: 16:52:12 executing program 1: 16:52:12 executing program 4: [ 205.162137] UDF-fs: warning (device loop2): udf_load_vrs: No anchor found [ 205.192118] UDF-fs: Scanning with blocksize 512 failed [ 205.231302] UDF-fs: error (device loop2): udf_process_sequence: Primary Volume Descriptor not found! [ 205.269044] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=2016, location=2016 [ 205.278423] UDF-fs: error (device loop2): udf_process_sequence: Primary Volume Descriptor not found! [ 205.290273] UDF-fs: Scanning with blocksize 1024 failed [ 205.299100] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=256, location=256 [ 205.313324] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=512, location=512 [ 205.324123] UDF-fs: warning (device loop2): udf_load_vrs: No anchor found [ 205.331335] UDF-fs: Scanning with blocksize 2048 failed [ 205.337727] UDF-fs: warning (device loop2): udf_load_vrs: No VRS found [ 205.344547] UDF-fs: Scanning with blocksize 4096 failed 16:52:12 executing program 2: syz_mount_image$udf(&(0x7f0000000000)='udf\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)='\x00BEA01', 0x6, 0x8000}, {&(0x7f0000000040)='\x00NSR02', 0x6, 0x8800}, {&(0x7f0000010300)="010002005f0001007b8ff001600000000100000000000000084c696e757855444600000000000000000000000000000000000000000000090100010003000300010000000100000008313233343536373831323334353637384c696e7578554446", 0x61, 0x18000}, {&(0x7f0000010400)="0000000000000019004f53544120436f6d7072657373656420556e69636f646500000000000000000000000000000000000000000000000000000000000000000000000000000000004f53544120436f6d7072657373656420556e69636f64650000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002a4c696e7578206d6b756466667300000000000000000004050000000000007810e4070913142c1a023848002a4c696e757820554446465300000000000000000000000405", 0xde, 0x180c0}, {&(0x7f0000010500)='\x00\x00\x00\x00\x00\x00\x00\x00', 0x8, 0x181e0}, {&(0x7f0000011400)="020002003700010077c9f00100010000004000006000000000400000e007", 0x1e, 0x40000}], 0x0, &(0x7f00000000c0)={[{@iocharset={'iocharset', 0x3d, 'iso8859-4'}}]}) 16:52:12 executing program 5: 16:52:12 executing program 3: 16:52:12 executing program 0: 16:52:12 executing program 1: 16:52:12 executing program 4: 16:52:12 executing program 3: 16:52:12 executing program 1: 16:52:12 executing program 4: 16:52:12 executing program 0: [ 205.480521] UDF-fs: warning (device loop2): udf_load_vrs: No anchor found [ 205.513658] UDF-fs: Scanning with blocksize 512 failed 16:52:12 executing program 5: [ 205.530474] UDF-fs: error (device loop2): udf_process_sequence: Primary Volume Descriptor not found! 16:52:12 executing program 1: [ 205.579221] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=2016, location=2016 [ 205.626029] UDF-fs: error (device loop2): udf_process_sequence: Primary Volume Descriptor not found! [ 205.648382] UDF-fs: Scanning with blocksize 1024 failed [ 205.665507] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=256, location=256 [ 205.681724] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=512, location=512 [ 205.695064] UDF-fs: warning (device loop2): udf_load_vrs: No anchor found [ 205.714684] UDF-fs: Scanning with blocksize 2048 failed [ 205.722599] UDF-fs: warning (device loop2): udf_load_vrs: No VRS found [ 205.729587] UDF-fs: Scanning with blocksize 4096 failed 16:52:12 executing program 4: 16:52:12 executing program 0: 16:52:12 executing program 3: 16:52:12 executing program 5: 16:52:12 executing program 1: 16:52:12 executing program 2: syz_mount_image$udf(&(0x7f0000000000)='udf\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)='\x00BEA01', 0x6, 0x8000}, {&(0x7f0000000040)='\x00NSR02', 0x6, 0x8800}, {&(0x7f0000010300)="010002005f0001007b8ff001600000000100000000000000084c696e757855444600000000000000000000000000000000000000000000090100010003000300010000000100000008313233343536373831323334353637384c696e7578554446", 0x61, 0x18000}, {&(0x7f0000010400)="0000000000000019004f53544120436f6d7072657373656420556e69636f646500000000000000000000000000000000000000000000000000000000000000000000000000000000004f53544120436f6d7072657373656420556e69636f64650000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002a4c696e7578206d6b756466667300000000000000000004050000000000007810e4070913142c1a023848002a4c696e757820554446465300000000000000000000000405", 0xde, 0x180c0}, {&(0x7f0000010500)='\x00\x00\x00\x00\x00\x00\x00\x00', 0x8, 0x181e0}, {&(0x7f0000011400)="020002003700010077c9f00100010000004000006000000000400000e007", 0x1e, 0x40000}], 0x0, &(0x7f00000000c0)={[{@iocharset={'iocharset', 0x3d, 'iso8859-4'}}]}) 16:52:12 executing program 4: 16:52:12 executing program 3: 16:52:12 executing program 0: 16:52:12 executing program 1: 16:52:12 executing program 5: 16:52:12 executing program 1: 16:52:12 executing program 4: 16:52:12 executing program 3: [ 205.954592] UDF-fs: warning (device loop2): udf_load_vrs: No anchor found 16:52:12 executing program 0: 16:52:13 executing program 4: 16:52:13 executing program 5: [ 206.034628] UDF-fs: Scanning with blocksize 512 failed [ 206.063646] UDF-fs: error (device loop2): udf_process_sequence: Primary Volume Descriptor not found! [ 206.115669] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=2016, location=2016 [ 206.152472] UDF-fs: error (device loop2): udf_process_sequence: Primary Volume Descriptor not found! [ 206.171433] UDF-fs: Scanning with blocksize 1024 failed [ 206.182374] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=256, location=256 [ 206.194710] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=512, location=512 [ 206.217872] UDF-fs: warning (device loop2): udf_load_vrs: No anchor found [ 206.225116] UDF-fs: Scanning with blocksize 2048 failed [ 206.240959] UDF-fs: warning (device loop2): udf_load_vrs: No VRS found [ 206.248522] UDF-fs: Scanning with blocksize 4096 failed 16:52:13 executing program 2: syz_mount_image$udf(&(0x7f0000000000)='udf\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)='\x00BEA01', 0x6, 0x8000}, {&(0x7f0000000040)='\x00NSR02', 0x6, 0x8800}, {&(0x7f0000010300)="010002005f0001007b8ff001600000000100000000000000084c696e757855444600000000000000000000000000000000000000000000090100010003000300010000000100000008313233343536373831323334353637384c696e7578554446", 0x61, 0x18000}, {&(0x7f0000010400)="0000000000000019004f53544120436f6d7072657373656420556e69636f646500000000000000000000000000000000000000000000000000000000000000000000000000000000004f53544120436f6d7072657373656420556e69636f64650000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002a4c696e7578206d6b756466667300000000000000000004050000000000007810e4070913142c1a023848002a4c696e757820554446465300000000000000000000000405", 0xde, 0x180c0}, {&(0x7f0000010500)="000000000000000001", 0x9}, {&(0x7f0000011400)="020002003700010077c9f00100010000004000006000000000400000e007", 0x1e, 0x40000}], 0x0, &(0x7f00000000c0)={[{@iocharset={'iocharset', 0x3d, 'iso8859-4'}}]}) 16:52:13 executing program 1: 16:52:13 executing program 3: 16:52:13 executing program 0: 16:52:13 executing program 4: 16:52:13 executing program 5: 16:52:13 executing program 4: 16:52:13 executing program 5: 16:52:13 executing program 5: 16:52:13 executing program 0: 16:52:13 executing program 1: 16:52:13 executing program 3: [ 206.495890] UDF-fs: warning (device loop2): udf_load_vrs: No anchor found [ 206.530894] UDF-fs: Scanning with blocksize 512 failed [ 206.559361] UDF-fs: error (device loop2): udf_process_sequence: Primary Volume Descriptor not found! [ 206.571706] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=2016, location=2016 [ 206.594413] UDF-fs: error (device loop2): udf_process_sequence: Primary Volume Descriptor not found! [ 206.605482] UDF-fs: Scanning with blocksize 1024 failed [ 206.621419] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=256, location=256 [ 206.633956] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=512, location=512 [ 206.650642] UDF-fs: warning (device loop2): udf_load_vrs: No anchor found [ 206.661486] UDF-fs: Scanning with blocksize 2048 failed [ 206.671058] UDF-fs: warning (device loop2): udf_load_vrs: No VRS found [ 206.679918] UDF-fs: Scanning with blocksize 4096 failed 16:52:13 executing program 2: syz_mount_image$udf(&(0x7f0000000000)='udf\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)='\x00BEA01', 0x6, 0x8000}, {&(0x7f0000000040)='\x00NSR02', 0x6, 0x8800}, {&(0x7f0000010300)="010002005f0001007b8ff001600000000100000000000000084c696e757855444600000000000000000000000000000000000000000000090100010003000300010000000100000008313233343536373831323334353637384c696e7578554446", 0x61, 0x18000}, {&(0x7f0000010400)="0000000000000019004f53544120436f6d7072657373656420556e69636f646500000000000000000000000000000000000000000000000000000000000000000000000000000000004f53544120436f6d7072657373656420556e69636f64650000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002a4c696e7578206d6b756466667300000000000000000004050000000000007810e4070913142c1a023848002a4c696e757820554446465300000000000000000000000405", 0xde, 0x180c0}, {&(0x7f0000010500)="000000000000000001", 0x9}, {&(0x7f0000011400)="020002003700010077c9f00100010000004000006000000000400000e007", 0x1e, 0x40000}], 0x0, &(0x7f00000000c0)={[{@iocharset={'iocharset', 0x3d, 'iso8859-4'}}]}) 16:52:13 executing program 4: 16:52:13 executing program 5: 16:52:13 executing program 0: 16:52:13 executing program 3: 16:52:13 executing program 1: 16:52:13 executing program 4: 16:52:13 executing program 3: 16:52:13 executing program 1: 16:52:13 executing program 0: 16:52:13 executing program 5: 16:52:13 executing program 4: [ 206.878845] UDF-fs: warning (device loop2): udf_load_vrs: No anchor found [ 206.911477] UDF-fs: Scanning with blocksize 512 failed [ 206.954240] UDF-fs: error (device loop2): udf_process_sequence: Primary Volume Descriptor not found! [ 206.980449] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=2016, location=2016 [ 207.006604] UDF-fs: error (device loop2): udf_process_sequence: Primary Volume Descriptor not found! [ 207.016227] UDF-fs: Scanning with blocksize 1024 failed [ 207.022374] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=256, location=256 [ 207.032930] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=512, location=512 [ 207.054501] UDF-fs: warning (device loop2): udf_load_vrs: No anchor found [ 207.066188] UDF-fs: Scanning with blocksize 2048 failed [ 207.072401] UDF-fs: warning (device loop2): udf_load_vrs: No VRS found [ 207.083704] UDF-fs: Scanning with blocksize 4096 failed 16:52:14 executing program 2: syz_mount_image$udf(&(0x7f0000000000)='udf\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)='\x00BEA01', 0x6, 0x8000}, {&(0x7f0000000040)='\x00NSR02', 0x6, 0x8800}, {&(0x7f0000010300)="010002005f0001007b8ff001600000000100000000000000084c696e757855444600000000000000000000000000000000000000000000090100010003000300010000000100000008313233343536373831323334353637384c696e7578554446", 0x61, 0x18000}, {&(0x7f0000010400)="0000000000000019004f53544120436f6d7072657373656420556e69636f646500000000000000000000000000000000000000000000000000000000000000000000000000000000004f53544120436f6d7072657373656420556e69636f64650000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002a4c696e7578206d6b756466667300000000000000000004050000000000007810e4070913142c1a023848002a4c696e757820554446465300000000000000000000000405", 0xde, 0x180c0}, {&(0x7f0000010500)="000000000000000001", 0x9}, {&(0x7f0000011400)="020002003700010077c9f00100010000004000006000000000400000e007", 0x1e, 0x40000}], 0x0, &(0x7f00000000c0)={[{@iocharset={'iocharset', 0x3d, 'iso8859-4'}}]}) 16:52:14 executing program 1: 16:52:14 executing program 3: 16:52:14 executing program 5: 16:52:14 executing program 4: 16:52:14 executing program 0: 16:52:14 executing program 5: 16:52:14 executing program 3: 16:52:14 executing program 4: 16:52:14 executing program 0: 16:52:14 executing program 1: 16:52:14 executing program 5: [ 207.291287] UDF-fs: warning (device loop2): udf_load_vrs: No anchor found [ 207.313027] UDF-fs: Scanning with blocksize 512 failed [ 207.368713] UDF-fs: error (device loop2): udf_process_sequence: Primary Volume Descriptor not found! [ 207.392597] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=2016, location=2016 [ 207.403825] UDF-fs: error (device loop2): udf_process_sequence: Primary Volume Descriptor not found! [ 207.414277] UDF-fs: Scanning with blocksize 1024 failed [ 207.423144] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=256, location=256 [ 207.448165] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=512, location=512 [ 207.459329] UDF-fs: warning (device loop2): udf_load_vrs: No anchor found [ 207.467271] UDF-fs: Scanning with blocksize 2048 failed [ 207.473713] UDF-fs: warning (device loop2): udf_load_vrs: No VRS found [ 207.484636] UDF-fs: Scanning with blocksize 4096 failed 16:52:14 executing program 2: syz_mount_image$udf(&(0x7f0000000000)='udf\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)='\x00BEA01', 0x6, 0x8000}, {&(0x7f0000000040)='\x00NSR02', 0x6, 0x8800}, {&(0x7f0000010300)="010002005f0001007b8ff001600000000100000000000000084c696e757855444600000000000000000000000000000000000000000000090100010003000300010000000100000008313233343536373831323334353637384c696e7578554446", 0x61, 0x18000}, {&(0x7f0000010500)="000000000000000001", 0x9, 0x181e0}, {&(0x7f0000011400)="020002003700010077c9f00100010000004000006000000000400000e007", 0x1e, 0x40000}], 0x0, &(0x7f00000000c0)={[{@iocharset={'iocharset', 0x3d, 'iso8859-4'}}]}) 16:52:14 executing program 3: 16:52:14 executing program 4: 16:52:14 executing program 0: 16:52:14 executing program 5: 16:52:14 executing program 1: 16:52:14 executing program 0: 16:52:14 executing program 1: [ 207.612673] UDF-fs: warning (device loop2): udf_load_vrs: No anchor found [ 207.645090] UDF-fs: Scanning with blocksize 512 failed 16:52:14 executing program 5: 16:52:14 executing program 0: 16:52:14 executing program 4: 16:52:14 executing program 3: [ 207.654552] UDF-fs: error (device loop2): udf_process_sequence: Primary Volume Descriptor not found! [ 207.672547] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=2016, location=2016 [ 207.702914] UDF-fs: error (device loop2): udf_process_sequence: Primary Volume Descriptor not found! [ 207.731140] UDF-fs: Scanning with blocksize 1024 failed [ 207.774185] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=256, location=256 [ 207.817771] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=512, location=512 [ 207.832354] UDF-fs: warning (device loop2): udf_load_vrs: No anchor found [ 207.841166] UDF-fs: Scanning with blocksize 2048 failed [ 207.859225] UDF-fs: warning (device loop2): udf_load_vrs: No VRS found [ 207.870580] UDF-fs: Scanning with blocksize 4096 failed 16:52:14 executing program 2: syz_mount_image$udf(&(0x7f0000000000)='udf\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)='\x00BEA01', 0x6, 0x8000}, {&(0x7f0000000040)='\x00NSR02', 0x6, 0x8800}, {&(0x7f0000010300)="010002005f0001007b8ff001600000000100000000000000084c696e757855444600000000000000000000000000000000000000000000090100010003000300010000000100000008313233343536373831323334353637384c696e7578554446", 0x61, 0x18000}, {&(0x7f0000010500)="000000000000000001", 0x9, 0x181e0}, {&(0x7f0000011400)="020002003700010077c9f00100010000004000006000000000400000e007", 0x1e, 0x40000}], 0x0, &(0x7f00000000c0)={[{@iocharset={'iocharset', 0x3d, 'iso8859-4'}}]}) 16:52:14 executing program 1: 16:52:14 executing program 4: 16:52:14 executing program 5: 16:52:14 executing program 0: 16:52:14 executing program 3: 16:52:14 executing program 5: 16:52:14 executing program 3: 16:52:14 executing program 0: 16:52:14 executing program 1: 16:52:14 executing program 4: 16:52:15 executing program 3: [ 208.061987] UDF-fs: warning (device loop2): udf_load_vrs: No anchor found [ 208.095874] UDF-fs: Scanning with blocksize 512 failed [ 208.142538] UDF-fs: error (device loop2): udf_process_sequence: Primary Volume Descriptor not found! [ 208.167930] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=2016, location=2016 [ 208.195596] UDF-fs: error (device loop2): udf_process_sequence: Primary Volume Descriptor not found! [ 208.210244] UDF-fs: Scanning with blocksize 1024 failed [ 208.222094] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=256, location=256 [ 208.232701] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=512, location=512 [ 208.244652] UDF-fs: warning (device loop2): udf_load_vrs: No anchor found [ 208.252630] UDF-fs: Scanning with blocksize 2048 failed [ 208.267139] UDF-fs: warning (device loop2): udf_load_vrs: No VRS found [ 208.274213] UDF-fs: Scanning with blocksize 4096 failed 16:52:15 executing program 2: syz_mount_image$udf(&(0x7f0000000000)='udf\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)='\x00BEA01', 0x6, 0x8000}, {&(0x7f0000000040)='\x00NSR02', 0x6, 0x8800}, {&(0x7f0000010300)="010002005f0001007b8ff001600000000100000000000000084c696e757855444600000000000000000000000000000000000000000000090100010003000300010000000100000008313233343536373831323334353637384c696e7578554446", 0x61, 0x18000}, {&(0x7f0000010500)="000000000000000001", 0x9, 0x181e0}, {&(0x7f0000011400)="020002003700010077c9f00100010000004000006000000000400000e007", 0x1e, 0x40000}], 0x0, &(0x7f00000000c0)={[{@iocharset={'iocharset', 0x3d, 'iso8859-4'}}]}) 16:52:15 executing program 1: 16:52:15 executing program 5: 16:52:15 executing program 0: 16:52:15 executing program 4: 16:52:15 executing program 3: 16:52:15 executing program 5: 16:52:15 executing program 4: 16:52:15 executing program 1: 16:52:15 executing program 0: 16:52:15 executing program 3: 16:52:15 executing program 5: [ 208.463797] UDF-fs: warning (device loop2): udf_load_vrs: No anchor found [ 208.501768] UDF-fs: Scanning with blocksize 512 failed [ 208.536929] UDF-fs: error (device loop2): udf_process_sequence: Primary Volume Descriptor not found! [ 208.578646] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=2016, location=2016 [ 208.594812] UDF-fs: error (device loop2): udf_process_sequence: Primary Volume Descriptor not found! [ 208.606889] UDF-fs: Scanning with blocksize 1024 failed [ 208.613104] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=256, location=256 [ 208.625630] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=512, location=512 [ 208.636918] UDF-fs: warning (device loop2): udf_load_vrs: No anchor found [ 208.644510] UDF-fs: Scanning with blocksize 2048 failed [ 208.651703] UDF-fs: warning (device loop2): udf_load_vrs: No VRS found [ 208.659413] UDF-fs: Scanning with blocksize 4096 failed 16:52:15 executing program 2: syz_mount_image$udf(&(0x7f0000000000)='udf\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)='\x00BEA01', 0x6, 0x8000}, {&(0x7f0000000040)='\x00NSR02', 0x6, 0x8800}, {&(0x7f0000010300)="010002005f0001007b8ff001600000000100000000000000084c696e757855444600000000000000000000000000000000000000000000090100010003000300010000000100000008313233343536373831323334353637384c696e7578554446", 0x61, 0x18000}, {0x0, 0x0, 0x180c0}, {&(0x7f0000010500)="000000000000000001", 0x9, 0x181e0}, {&(0x7f0000011400)="020002003700010077c9f00100010000004000006000000000400000e007", 0x1e, 0x40000}], 0x0, &(0x7f00000000c0)={[{@iocharset={'iocharset', 0x3d, 'iso8859-4'}}]}) 16:52:15 executing program 4: 16:52:15 executing program 1: 16:52:15 executing program 0: 16:52:15 executing program 5: 16:52:15 executing program 3: 16:52:15 executing program 3: 16:52:15 executing program 5: 16:52:15 executing program 0: 16:52:15 executing program 4: 16:52:15 executing program 1: 16:52:15 executing program 0: [ 208.880682] UDF-fs: warning (device loop2): udf_load_vrs: No anchor found [ 208.939501] UDF-fs: Scanning with blocksize 512 failed [ 208.984319] UDF-fs: error (device loop2): udf_process_sequence: Primary Volume Descriptor not found! [ 209.000905] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=2016, location=2016 [ 209.023380] UDF-fs: error (device loop2): udf_process_sequence: Primary Volume Descriptor not found! [ 209.033711] UDF-fs: Scanning with blocksize 1024 failed [ 209.041661] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=256, location=256 [ 209.061094] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=512, location=512 [ 209.073257] UDF-fs: warning (device loop2): udf_load_vrs: No anchor found [ 209.082840] UDF-fs: Scanning with blocksize 2048 failed [ 209.093879] UDF-fs: warning (device loop2): udf_load_vrs: No VRS found [ 209.100857] UDF-fs: Scanning with blocksize 4096 failed 16:52:16 executing program 2: syz_mount_image$udf(&(0x7f0000000000)='udf\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)='\x00BEA01', 0x6, 0x8000}, {&(0x7f0000000040)='\x00NSR02', 0x6, 0x8800}, {&(0x7f0000010300)="010002005f0001007b8ff001600000000100000000000000084c696e757855444600000000000000000000000000000000000000000000090100010003000300010000000100000008313233343536373831323334353637384c696e7578554446", 0x61, 0x18000}, {0x0, 0x0, 0x180c0}, {&(0x7f0000010500)="000000000000000001", 0x9, 0x181e0}, {&(0x7f0000011400)="020002003700010077c9f00100010000004000006000000000400000e007", 0x1e, 0x40000}], 0x0, &(0x7f00000000c0)={[{@iocharset={'iocharset', 0x3d, 'iso8859-4'}}]}) 16:52:16 executing program 3: 16:52:16 executing program 4: 16:52:16 executing program 5: 16:52:16 executing program 1: 16:52:16 executing program 0: 16:52:16 executing program 5: [ 209.214113] UDF-fs: warning (device loop2): udf_load_vrs: No anchor found [ 209.252629] UDF-fs: Scanning with blocksize 512 failed 16:52:16 executing program 4: 16:52:16 executing program 3: 16:52:16 executing program 1: 16:52:16 executing program 0: [ 209.272577] UDF-fs: error (device loop2): udf_process_sequence: Primary Volume Descriptor not found! [ 209.303079] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=2016, location=2016 16:52:16 executing program 4: [ 209.354773] UDF-fs: error (device loop2): udf_process_sequence: Primary Volume Descriptor not found! [ 209.407930] UDF-fs: Scanning with blocksize 1024 failed [ 209.422241] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=256, location=256 [ 209.443731] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=512, location=512 [ 209.464850] UDF-fs: warning (device loop2): udf_load_vrs: No anchor found [ 209.475276] UDF-fs: Scanning with blocksize 2048 failed [ 209.489865] UDF-fs: warning (device loop2): udf_load_vrs: No VRS found [ 209.498233] UDF-fs: Scanning with blocksize 4096 failed 16:52:16 executing program 2: syz_mount_image$udf(&(0x7f0000000000)='udf\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)='\x00BEA01', 0x6, 0x8000}, {&(0x7f0000000040)='\x00NSR02', 0x6, 0x8800}, {&(0x7f0000010300)="010002005f0001007b8ff001600000000100000000000000084c696e757855444600000000000000000000000000000000000000000000090100010003000300010000000100000008313233343536373831323334353637384c696e7578554446", 0x61, 0x18000}, {0x0, 0x0, 0x180c0}, {&(0x7f0000010500)="000000000000000001", 0x9, 0x181e0}, {&(0x7f0000011400)="020002003700010077c9f00100010000004000006000000000400000e007", 0x1e, 0x40000}], 0x0, &(0x7f00000000c0)={[{@iocharset={'iocharset', 0x3d, 'iso8859-4'}}]}) 16:52:16 executing program 1: 16:52:16 executing program 3: 16:52:16 executing program 0: 16:52:16 executing program 5: 16:52:16 executing program 4: 16:52:16 executing program 1: 16:52:16 executing program 4: 16:52:16 executing program 0: 16:52:16 executing program 5: [ 209.646482] UDF-fs: warning (device loop2): udf_load_vrs: No anchor found [ 209.653464] UDF-fs: Scanning with blocksize 512 failed 16:52:16 executing program 1: 16:52:16 executing program 3: [ 209.696152] UDF-fs: error (device loop2): udf_process_sequence: Primary Volume Descriptor not found! [ 209.745429] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=2016, location=2016 [ 209.771496] UDF-fs: error (device loop2): udf_process_sequence: Primary Volume Descriptor not found! [ 209.795366] UDF-fs: Scanning with blocksize 1024 failed [ 209.803776] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=256, location=256 [ 209.823831] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=512, location=512 [ 209.841154] UDF-fs: warning (device loop2): udf_load_vrs: No anchor found [ 209.852672] UDF-fs: Scanning with blocksize 2048 failed [ 209.863772] UDF-fs: warning (device loop2): udf_load_vrs: No VRS found [ 209.876195] UDF-fs: Scanning with blocksize 4096 failed 16:52:16 executing program 2: syz_mount_image$udf(&(0x7f0000000000)='udf\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)='\x00BEA01', 0x6, 0x8000}, {&(0x7f0000000040)='\x00NSR02', 0x6, 0x8800}, {&(0x7f0000010300)="010002005f0001007b8ff001600000000100000000000000084c696e757855444600000000000000000000000000000000000000000000090100010003000300010000000100000008313233343536373831323334353637384c696e7578554446", 0x61, 0x18000}, {&(0x7f0000010400), 0x0, 0x180c0}, {&(0x7f0000010500)="000000000000000001", 0x9, 0x181e0}, {&(0x7f0000011400)="020002003700010077c9f00100010000004000006000000000400000e007", 0x1e, 0x40000}], 0x0, &(0x7f00000000c0)={[{@iocharset={'iocharset', 0x3d, 'iso8859-4'}}]}) 16:52:16 executing program 4: 16:52:16 executing program 0: 16:52:16 executing program 3: 16:52:16 executing program 5: 16:52:16 executing program 1: 16:52:16 executing program 3: 16:52:16 executing program 0: 16:52:16 executing program 1: 16:52:16 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER(0x2, 0x0, &(0x7f0000000080)={0x0, 0x0}) 16:52:17 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x20) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1600bd7f, &(0x7f0000000080)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5f4, 0x2fc, 0x0, 0x40c, 0x40c, 0xe8, 0x670, 0x670, 0x670, 0x670, 0x670, 0x6, 0x0, {[{{@uncond, 0x0, 0xa4, 0xe8}, @DNPT={0x44, 'DNPT\x00', 0x0, {@ipv4=@multicast2, @ipv4=@loopback}}}, {{@ipv6={@ipv4={[], [], @multicast2}, @private2, [], [], '\x00', 'veth1_vlan\x00'}, 0x0, 0xa4, 0x1cc}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@remote, @dev, [], [], 'ipvlan0\x00', 'tunl0\x00'}, 0x0, 0xa4, 0xc8}, @unspec=@CHECKSUM={0x24, 'CHECKSUM\x00'}}, {{@ipv6={@empty, @loopback, [], [], 'vcan0\x00', 'nr0\x00'}, 0x0, 0xa4, 0xc8}, @unspec=@CHECKSUM={0x24, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xa4, 0xe8}, @DNPT={0x44, 'DNPT\x00', 0x0, {@ipv4=@loopback, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}}}], {{[], 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x650) [ 210.092207] UDF-fs: warning (device loop2): udf_load_vrs: No anchor found [ 210.131774] UDF-fs: Scanning with blocksize 512 failed 16:52:17 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x20) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x18, &(0x7f0000000080)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5f4, 0x2fc, 0x0, 0x40c, 0x40c, 0xe8, 0x670, 0x670, 0x670, 0x670, 0x670, 0x6, 0x0, {[{{@uncond, 0x0, 0xa4, 0xe8}, @DNPT={0x44, 'DNPT\x00', 0x0, {@ipv4=@multicast2, @ipv4=@loopback}}}, {{@ipv6={@ipv4={[], [], @multicast2}, @private2, [], [], '\x00', 'veth1_vlan\x00'}, 0x0, 0xa4, 0x1cc}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@remote, @dev, [], [], 'ipvlan0\x00', 'tunl0\x00'}, 0x0, 0xa4, 0xc8}, @unspec=@CHECKSUM={0x24, 'CHECKSUM\x00'}}, {{@ipv6={@empty, @loopback, [], [], 'vcan0\x00', 'nr0\x00'}, 0x0, 0xa4, 0xc8}, @unspec=@CHECKSUM={0x24, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xa4, 0xe8}, @DNPT={0x44, 'DNPT\x00', 0x0, {@ipv4=@loopback, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}}}], {{[], 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x650) [ 210.169545] UDF-fs: error (device loop2): udf_process_sequence: Primary Volume Descriptor not found! [ 210.225923] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=2016, location=2016 [ 210.242853] UDF-fs: error (device loop2): udf_process_sequence: Primary Volume Descriptor not found! [ 210.270127] UDF-fs: Scanning with blocksize 1024 failed [ 210.283115] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=256, location=256 [ 210.305749] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=512, location=512 [ 210.316737] UDF-fs: warning (device loop2): udf_load_vrs: No anchor found [ 210.323836] UDF-fs: Scanning with blocksize 2048 failed [ 210.333088] UDF-fs: warning (device loop2): udf_load_vrs: No VRS found [ 210.342198] UDF-fs: Scanning with blocksize 4096 failed 16:52:17 executing program 2: syz_mount_image$udf(&(0x7f0000000000)='udf\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)='\x00BEA01', 0x6, 0x8000}, {&(0x7f0000000040)='\x00NSR02', 0x6, 0x8800}, {&(0x7f0000010300)="010002005f0001007b8ff001600000000100000000000000084c696e757855444600000000000000000000000000000000000000000000090100010003000300010000000100000008313233343536373831323334353637384c696e7578554446", 0x61, 0x18000}, {&(0x7f0000010400), 0x0, 0x180c0}, {&(0x7f0000010500)="000000000000000001", 0x9, 0x181e0}, {&(0x7f0000011400)="020002003700010077c9f00100010000004000006000000000400000e007", 0x1e, 0x40000}], 0x0, &(0x7f00000000c0)={[{@iocharset={'iocharset', 0x3d, 'iso8859-4'}}]}) 16:52:17 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ifreq(r0, 0x8916, &(0x7f0000000000)={'lo\x00', @ifru_ivalue}) 16:52:17 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$TIOCL_UNBLANKSCREEN(0xffffffffffffffff, 0x541c, &(0x7f0000000000)) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x76, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) r1 = socket(0x11, 0x800000003, 0x8) bind(r1, &(0x7f0000000540)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0xe7}]}, 0x8) sendto$inet(r0, 0x0, 0x0, 0x20000ffd, &(0x7f0000000300)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860ac5cf65ac618ded8974895abeaf4b4836af922b3f1e0b02bd67aa03059bbecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746aec66ba", 0xfe6a, 0x20c49a, 0x0, 0x27) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@local}}, {{@in6=@local}, 0x0, @in=@remote}}, &(0x7f00000002c0)=0xe4) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000500), 0x3208000, 0x0) 16:52:17 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) 16:52:17 executing program 4: r0 = syz_open_dev$vcsa(&(0x7f0000002980)='/dev/vcsa#\x00', 0x0, 0x20401) write$nbd(r0, 0x0, 0x0) 16:52:17 executing program 5: ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x1}]}]}}, &(0x7f0000000200)=""/211, 0x32, 0xd3, 0x8}, 0x20) 16:52:17 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x20) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x19, &(0x7f0000000080)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5f4, 0x2fc, 0x0, 0x40c, 0x40c, 0xe8, 0x670, 0x670, 0x670, 0x670, 0x670, 0x6, 0x0, {[{{@uncond, 0x0, 0xa4, 0xe8}, @DNPT={0x44, 'DNPT\x00', 0x0, {@ipv4=@multicast2, @ipv4=@loopback}}}, {{@ipv6={@ipv4={[], [], @multicast2}, @private2, [], [], '\x00', 'veth1_vlan\x00'}, 0x0, 0xa4, 0x1cc}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@remote, @dev, [], [], 'ipvlan0\x00', 'tunl0\x00'}, 0x0, 0xa4, 0xc8}, @unspec=@CHECKSUM={0x24, 'CHECKSUM\x00'}}, {{@ipv6={@empty, @loopback, [], [], 'vcan0\x00', 'nr0\x00'}, 0x0, 0xa4, 0xc8}, @unspec=@CHECKSUM={0x24, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xa4, 0xe8}, @DNPT={0x44, 'DNPT\x00', 0x0, {@ipv4=@loopback, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}}}], {{[], 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x650) 16:52:17 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x8919, &(0x7f0000000140)={'sit0\x00', @ifru_data=0x0}) 16:52:17 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x8906, 0x0) 16:52:17 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="6400000000010b04000000000000000002000000240001801400018008000100ac141400080002007f0000070c0002800500010000000000240002801400018008000100ac1414bb08000200000000000c00028005000100"], 0x64}}, 0x0) inotify_init1(0x0) 16:52:17 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x20) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x24, &(0x7f0000000080)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5f4, 0x2fc, 0x0, 0x40c, 0x40c, 0xe8, 0x670, 0x670, 0x670, 0x670, 0x670, 0x6, 0x0, {[{{@uncond, 0x0, 0xa4, 0xe8}, @DNPT={0x44, 'DNPT\x00', 0x0, {@ipv4=@multicast2, @ipv4=@loopback}}}, {{@ipv6={@ipv4={[], [], @multicast2}, @private2, [], [], '\x00', 'veth1_vlan\x00'}, 0x0, 0xa4, 0x1cc}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@remote, @dev, [], [], 'ipvlan0\x00', 'tunl0\x00'}, 0x0, 0xa4, 0xc8}, @unspec=@CHECKSUM={0x24, 'CHECKSUM\x00'}}, {{@ipv6={@empty, @loopback, [], [], 'vcan0\x00', 'nr0\x00'}, 0x0, 0xa4, 0xc8}, @unspec=@CHECKSUM={0x24, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xa4, 0xe8}, @DNPT={0x44, 'DNPT\x00', 0x0, {@ipv4=@loopback, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}}}], {{[], 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x650) 16:52:17 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x20) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, 0x0, 0x0) [ 210.533247] UDF-fs: warning (device loop2): udf_load_vrs: No anchor found [ 210.571104] UDF-fs: Scanning with blocksize 512 failed [ 210.626902] UDF-fs: error (device loop2): udf_process_sequence: Primary Volume Descriptor not found! [ 210.655300] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. [ 210.661004] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=2016, location=2016 [ 210.667063] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. [ 210.722651] UDF-fs: error (device loop2): udf_process_sequence: Primary Volume Descriptor not found! [ 210.738307] UDF-fs: Scanning with blocksize 1024 failed [ 210.771062] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=256, location=256 [ 210.799754] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=512, location=512 [ 210.812610] UDF-fs: warning (device loop2): udf_load_vrs: No anchor found [ 210.823533] UDF-fs: Scanning with blocksize 2048 failed [ 210.830340] UDF-fs: warning (device loop2): udf_load_vrs: No VRS found [ 210.838663] UDF-fs: Scanning with blocksize 4096 failed 16:52:17 executing program 2: syz_mount_image$udf(&(0x7f0000000000)='udf\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)='\x00BEA01', 0x6, 0x8000}, {&(0x7f0000000040)='\x00NSR02', 0x6, 0x8800}, {&(0x7f0000010300)="010002005f0001007b8ff001600000000100000000000000084c696e757855444600000000000000000000000000000000000000000000090100010003000300010000000100000008313233343536373831323334353637384c696e7578554446", 0x61, 0x18000}, {&(0x7f0000010400), 0x0, 0x180c0}, {&(0x7f0000010500)="000000000000000001", 0x9, 0x181e0}, {&(0x7f0000011400)="020002003700010077c9f00100010000004000006000000000400000e007", 0x1e, 0x40000}], 0x0, &(0x7f00000000c0)={[{@iocharset={'iocharset', 0x3d, 'iso8859-4'}}]}) 16:52:17 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x20) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x39, &(0x7f0000000080)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5f4, 0x2fc, 0x0, 0x40c, 0x40c, 0xe8, 0x670, 0x670, 0x670, 0x670, 0x670, 0x6, 0x0, {[{{@uncond, 0x0, 0xa4, 0xe8}, @DNPT={0x44, 'DNPT\x00', 0x0, {@ipv4=@multicast2, @ipv4=@loopback}}}, {{@ipv6={@ipv4={[], [], @multicast2}, @private2, [], [], '\x00', 'veth1_vlan\x00'}, 0x0, 0xa4, 0x1cc}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@remote, @dev, [], [], 'ipvlan0\x00', 'tunl0\x00'}, 0x0, 0xa4, 0xc8}, @unspec=@CHECKSUM={0x24, 'CHECKSUM\x00'}}, {{@ipv6={@empty, @loopback, [], [], 'vcan0\x00', 'nr0\x00'}, 0x0, 0xa4, 0xc8}, @unspec=@CHECKSUM={0x24, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xa4, 0xe8}, @DNPT={0x44, 'DNPT\x00', 0x0, {@ipv4=@loopback, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}}}], {{[], 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x650) 16:52:17 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x10b382) pwritev(0xffffffffffffffff, &(0x7f00000004c0)=[{&(0x7f0000000380)}, {0x0}, {&(0x7f0000000580)="f374f709e40b01f33018c9f2efed195927a1c55e2bd180187bed43ec38a3d6e6e67b18a1448a70b138788112443abadf137a5eadb24b1d8cf4633334042fa371448ecb1d9f225f1b9d5c92bd1b1370f3936e7d72c9b29a602983ef01d1885aee9b327786fc484dcd751bf072985b4840900d5b5efc9137235c0c3dec77c27a81a57af8d9136309e9d04cc9eb204e125826b802250527ba721a6c84d10a8188212ce07c4c7c75", 0xa6}, {0x0}, {0x0}, {0x0}], 0x6, 0x81805, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) sendfile(r0, r0, 0x0, 0x24002d00) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/consoles\x00', 0x0, 0x0) r1 = socket(0x0, 0x3, 0x0) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f00000003c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x6438850}, 0xc, &(0x7f00000000c0)={&(0x7f0000000300)={0x70, 0x0, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRET={0x10, 0x4, [0xffffffff, 0x2, 0xf42]}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x6]}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x9}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x3}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xdb}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_DST={0x14, 0x1, @private1}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x2}]}, 0x70}, 0x1, 0x0, 0x0, 0x40010}, 0x5) 16:52:17 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @l2tp={0x2, 0x0, @loopback}, @ax25={0x3, @bcast}, @in={0x2, 0x0, @broadcast}, 0x0, 0x0, 0x0, 0x0, 0x3}) 16:52:17 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x20) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x32, &(0x7f0000000080)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5f4, 0x2fc, 0x0, 0x40c, 0x40c, 0xe8, 0x670, 0x670, 0x670, 0x670, 0x670, 0x6, 0x0, {[{{@uncond, 0x0, 0xa4, 0xe8}, @DNPT={0x44, 'DNPT\x00', 0x0, {@ipv4=@multicast2, @ipv4=@loopback}}}, {{@ipv6={@ipv4={[], [], @multicast2}, @private2, [], [], '\x00', 'veth1_vlan\x00'}, 0x0, 0xa4, 0x1cc}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@remote, @dev, [], [], 'ipvlan0\x00', 'tunl0\x00'}, 0x0, 0xa4, 0xc8}, @unspec=@CHECKSUM={0x24, 'CHECKSUM\x00'}}, {{@ipv6={@empty, @loopback, [], [], 'vcan0\x00', 'nr0\x00'}, 0x0, 0xa4, 0xc8}, @unspec=@CHECKSUM={0x24, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xa4, 0xe8}, @DNPT={0x44, 'DNPT\x00', 0x0, {@ipv4=@loopback, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}}}], {{[], 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x650) 16:52:17 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x20, 0x0, 0x0, 0x7}, {0x6}]}) 16:52:17 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x8915, &(0x7f0000000740)={'lo\x00', @ifru_ivalue}) 16:52:17 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000740)={'macvtap0\x00', @ifru_ivalue}) 16:52:17 executing program 5: r0 = socket(0x11, 0x3, 0x0) connect(r0, 0x0, 0x0) 16:52:17 executing program 4: r0 = socket(0x11, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x541b, &(0x7f0000000040)={'bond0\x00'}) [ 211.023135] UDF-fs: warning (device loop2): udf_load_vrs: No anchor found 16:52:18 executing program 0: socketpair(0x0, 0x191574f633d66b9a, 0x0, 0x0) [ 211.068177] UDF-fs: Scanning with blocksize 512 failed 16:52:18 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x700a2100, 0x0, 0x0, 0x0, 0x0) r0 = dup(0xffffffffffffffff) sendmsg$nl_netfilter(r0, &(0x7f0000000300)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4040004}, 0x0) wait4(0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) sendmsg$NL80211_CMD_SET_STATION(r0, 0x0, 0x10) mkdir(0x0, 0x0) pivot_root(0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000800)=ANY=[@ANYBLOB="880000000000000000b8d55e8bf564c6b12938e715b9a1efc3cf2ce1a2bf18820ac706ca19563d46a06fafd79b34c8f6e8db6a3f548fa38e51ddca516b4c62c3e1cb1f045c7e731a4a07c70353aa3f8676530ed5efc9000f9d0edaa817fcd942fe9ea8661f6a07dc1580bc6a081b96a05c368e73d94d066fe4d788cbb534af752c8e22ac4454e9abe13418e191333c6ff88ccb5636287a05cdba58412340d301720a9ffbab457d4cb504065e1519ec22523b8a61b364e35a2c8d13e7cd6b94989c95", @ANYRES32=0x0, @ANYBLOB="000000000000000068003480140035006e657464657673696d3000000000000014003500697036746e6c300000000000000000001400350069705f767469300000000000000000001400350076657468305f746f5f62726964676500140035006272696467655f736c6176655f310000"], 0x88}}, 0x0) quotactl(0x9, &(0x7f0000000240)='./file0\x00', 0xee01, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) getpid() pwrite64(r2, &(0x7f0000000a00)="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", 0xffc, 0x9) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000000c0)={'vxcan0\x00'}) [ 211.099902] device veth0_macvtap left promiscuous mode [ 211.119982] UDF-fs: error (device loop2): udf_process_sequence: Primary Volume Descriptor not found! [ 211.201568] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=2016, location=2016 [ 211.249214] UDF-fs: error (device loop2): udf_process_sequence: Primary Volume Descriptor not found! [ 211.310579] UDF-fs: Scanning with blocksize 1024 failed [ 211.335731] IPVS: ftp: loaded support on port[0] = 21 [ 211.351969] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=256, location=256 [ 211.413681] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=512, location=512 [ 211.473226] UDF-fs: warning (device loop2): udf_load_vrs: No anchor found [ 211.475718] IPVS: ftp: loaded support on port[0] = 21 [ 211.496160] UDF-fs: Scanning with blocksize 2048 failed [ 211.502855] UDF-fs: warning (device loop2): udf_load_vrs: No VRS found [ 211.531532] UDF-fs: Scanning with blocksize 4096 failed 16:52:18 executing program 2: syz_mount_image$udf(&(0x7f0000000000)='udf\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)='\x00BEA01', 0x6, 0x8000}, {&(0x7f0000000040)='\x00NSR02', 0x6, 0x8800}, {&(0x7f0000010300)="010002005f0001007b8ff001600000000100000000000000084c696e757855444600000000000000000000000000000000000000000000090100010003000300010000000100000008313233343536373831323334353637384c696e7578554446", 0x61, 0x18000}, {&(0x7f0000010400)="0000000000000019004f53544120436f6d7072657373656420556e69636f646500000000000000000000000000000000000000000000000000000000000000000000000000000000004f53544120436f6d7072657373656420556e69636f646500"/111, 0x6f, 0x180c0}, {&(0x7f0000010500)="000000000000000001", 0x9, 0x181e0}, {&(0x7f0000011400)="020002003700010077c9f00100010000004000006000000000400000e007", 0x1e, 0x40000}], 0x0, &(0x7f00000000c0)={[{@iocharset={'iocharset', 0x3d, 'iso8859-4'}}]}) 16:52:18 executing program 5: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) ptrace$getsig(0x4202, r1, 0x0, &(0x7f0000000380)) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, 0x0, 0x0) 16:52:18 executing program 0: openat$vsock(0xffffff9c, 0x0, 0x511c00, 0x0) 16:52:18 executing program 4: mq_timedsend(0xffffffffffffffff, 0x0, 0x0, 0xffff, 0x0) 16:52:18 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000740)={'macvtap0\x00', @ifru_ivalue}) 16:52:19 executing program 4: perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x800000000000937e, &(0x7f0000000000)="01000000000000001801") [ 212.058217] ptrace attach of "/root/syz-executor.5"[8150] was attempted by "/root/syz-executor.5"[16848] 16:52:19 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x20) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x3, &(0x7f0000000080)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5f4, 0x2fc, 0x0, 0x40c, 0x40c, 0xe8, 0x670, 0x670, 0x670, 0x670, 0x670, 0x6, 0x0, {[{{@uncond, 0x0, 0xa4, 0xe8}, @DNPT={0x44, 'DNPT\x00', 0x0, {@ipv4=@multicast2, @ipv4=@loopback}}}, {{@ipv6={@ipv4={[], [], @multicast2}, @private2, [], [], '\x00', 'veth1_vlan\x00'}, 0x0, 0xa4, 0x1cc}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@remote, @dev, [], [], 'ipvlan0\x00', 'tunl0\x00'}, 0x0, 0xa4, 0xc8}, @unspec=@CHECKSUM={0x24, 'CHECKSUM\x00'}}, {{@ipv6={@empty, @loopback, [], [], 'vcan0\x00', 'nr0\x00'}, 0x0, 0xa4, 0xc8}, @unspec=@CHECKSUM={0x24, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xa4, 0xe8}, @DNPT={0x44, 'DNPT\x00', 0x0, {@ipv4=@loopback, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}}}], {{[], 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x650) 16:52:19 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x20) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x13, &(0x7f0000000080)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5f4, 0x2fc, 0x0, 0x40c, 0x40c, 0xe8, 0x670, 0x670, 0x670, 0x670, 0x670, 0x6, 0x0, {[{{@uncond, 0x0, 0xa4, 0xe8}, @DNPT={0x44, 'DNPT\x00', 0x0, {@ipv4=@multicast2, @ipv4=@loopback}}}, {{@ipv6={@ipv4={[], [], @multicast2}, @private2, [], [], '\x00', 'veth1_vlan\x00'}, 0x0, 0xa4, 0x1cc}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@remote, @dev, [], [], 'ipvlan0\x00', 'tunl0\x00'}, 0x0, 0xa4, 0xc8}, @unspec=@CHECKSUM={0x24, 'CHECKSUM\x00'}}, {{@ipv6={@empty, @loopback, [], [], 'vcan0\x00', 'nr0\x00'}, 0x0, 0xa4, 0xc8}, @unspec=@CHECKSUM={0x24, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xa4, 0xe8}, @DNPT={0x44, 'DNPT\x00', 0x0, {@ipv4=@loopback, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}}}], {{[], 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x650) [ 212.178129] autofs4:pid:16856:validate_dev_ioctl: invalid path supplied for cmd(0x0000937e) [ 212.181529] UDF-fs: warning (device loop2): udf_load_vrs: No anchor found 16:52:19 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000700)=@filter={'filter\x00', 0xe, 0x4, 0x350, 0xffffffff, 0x1fc, 0x110, 0x110, 0xffffffff, 0xffffffff, 0x2f4, 0x2f4, 0x2f4, 0xffffffff, 0x4, 0x0, {[{{@ipv6={@private2, @dev, [], [], 'bridge_slave_1\x00', 'veth0_to_bond\x00', {}, {}, 0x0, 0x0, 0x0, 0xc0}, 0x0, 0xa4, 0xec}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x0, 'syz0\x00'}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @mcast1, [], [], 'gre0\x00', 'bridge_slave_1\x00'}, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0xa4, 0xd4}, @common=@inet=@SET2={0x30, 'SET\x00'}}], {{[], 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x3ac) [ 212.231421] UDF-fs: Scanning with blocksize 512 failed [ 212.268895] autofs4:pid:16865:validate_dev_ioctl: invalid path supplied for cmd(0x0000937e) [ 212.275603] UDF-fs: error (device loop2): udf_process_sequence: Primary Volume Descriptor not found! 16:52:19 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000180)=""/239, 0x26, 0xef, 0x1}, 0x20) 16:52:19 executing program 0: r0 = socket(0x11, 0x3, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000000)) [ 212.376276] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=2016, location=2016 [ 212.434988] UDF-fs: error (device loop2): udf_process_sequence: Primary Volume Descriptor not found! [ 212.507441] UDF-fs: Scanning with blocksize 1024 failed [ 212.534404] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=256, location=256 [ 212.591100] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=512, location=512 [ 212.630754] UDF-fs: warning (device loop2): udf_load_vrs: No anchor found [ 212.674341] UDF-fs: Scanning with blocksize 2048 failed [ 212.705729] UDF-fs: warning (device loop2): udf_load_vrs: No VRS found [ 212.754824] UDF-fs: Scanning with blocksize 4096 failed 16:52:20 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x700a2100, 0x0, 0x0, 0x0, 0x0) r0 = dup(0xffffffffffffffff) sendmsg$nl_netfilter(r0, &(0x7f0000000300)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4040004}, 0x0) wait4(0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) sendmsg$NL80211_CMD_SET_STATION(r0, 0x0, 0x10) mkdir(0x0, 0x0) pivot_root(0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000800)=ANY=[@ANYBLOB="880000000000000000b8d55e8bf564c6b12938e715b9a1efc3cf2ce1a2bf18820ac706ca19563d46a06fafd79b34c8f6e8db6a3f548fa38e51ddca516b4c62c3e1cb1f045c7e731a4a07c70353aa3f8676530ed5efc9000f9d0edaa817fcd942fe9ea8661f6a07dc1580bc6a081b96a05c368e73d94d066fe4d788cbb534af752c8e22ac4454e9abe13418e191333c6ff88ccb5636287a05cdba58412340d301720a9ffbab457d4cb504065e1519ec22523b8a61b364e35a2c8d13e7cd6b94989c95", @ANYRES32=0x0, @ANYBLOB="000000000000000068003480140035006e657464657673696d3000000000000014003500697036746e6c300000000000000000001400350069705f767469300000000000000000001400350076657468305f746f5f62726964676500140035006272696467655f736c6176655f310000"], 0x88}}, 0x0) quotactl(0x9, &(0x7f0000000240)='./file0\x00', 0xee01, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) getpid() pwrite64(r2, &(0x7f0000000a00)="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", 0xffc, 0x9) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000000c0)={'vxcan0\x00'}) 16:52:20 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x20) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x8, &(0x7f0000000080)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5f4, 0x2fc, 0x0, 0x40c, 0x40c, 0xe8, 0x670, 0x670, 0x670, 0x670, 0x670, 0x6, 0x0, {[{{@uncond, 0x0, 0xa4, 0xe8}, @DNPT={0x44, 'DNPT\x00', 0x0, {@ipv4=@multicast2, @ipv4=@loopback}}}, {{@ipv6={@ipv4={[], [], @multicast2}, @private2, [], [], '\x00', 'veth1_vlan\x00'}, 0x0, 0xa4, 0x1cc}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@remote, @dev, [], [], 'ipvlan0\x00', 'tunl0\x00'}, 0x0, 0xa4, 0xc8}, @unspec=@CHECKSUM={0x24, 'CHECKSUM\x00'}}, {{@ipv6={@empty, @loopback, [], [], 'vcan0\x00', 'nr0\x00'}, 0x0, 0xa4, 0xc8}, @unspec=@CHECKSUM={0x24, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xa4, 0xe8}, @DNPT={0x44, 'DNPT\x00', 0x0, {@ipv4=@loopback, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}}}], {{[], 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x650) 16:52:20 executing program 4: perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x800000000000937e, &(0x7f0000000000)="01000000000000001801") 16:52:20 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x20) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x6, 0x0, 0x0) 16:52:20 executing program 1: 16:52:20 executing program 2: syz_mount_image$udf(&(0x7f0000000000)='udf\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)='\x00BEA01', 0x6, 0x8000}, {&(0x7f0000000040)='\x00NSR02', 0x6, 0x8800}, {&(0x7f0000010300)="010002005f0001007b8ff001600000000100000000000000084c696e757855444600000000000000000000000000000000000000000000090100010003000300010000000100000008313233343536373831323334353637384c696e7578554446", 0x61, 0x18000}, {&(0x7f0000010400)="0000000000000019004f53544120436f6d7072657373656420556e69636f646500000000000000000000000000000000000000000000000000000000000000000000000000000000004f53544120436f6d7072657373656420556e69636f646500"/111, 0x6f, 0x180c0}, {&(0x7f0000010500)="000000000000000001", 0x9, 0x181e0}, {&(0x7f0000011400)="020002003700010077c9f00100010000004000006000000000400000e007", 0x1e, 0x40000}], 0x0, &(0x7f00000000c0)={[{@iocharset={'iocharset', 0x3d, 'iso8859-4'}}]}) 16:52:20 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x700a2100, 0x0, 0x0, 0x0, 0x0) r0 = dup(0xffffffffffffffff) sendmsg$nl_netfilter(r0, &(0x7f0000000300)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4040004}, 0x0) wait4(0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) sendmsg$NL80211_CMD_SET_STATION(r0, 0x0, 0x10) mkdir(0x0, 0x0) pivot_root(0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000800)=ANY=[@ANYBLOB="880000000000000000b8d55e8bf564c6b12938e715b9a1efc3cf2ce1a2bf18820ac706ca19563d46a06fafd79b34c8f6e8db6a3f548fa38e51ddca516b4c62c3e1cb1f045c7e731a4a07c70353aa3f8676530ed5efc9000f9d0edaa817fcd942fe9ea8661f6a07dc1580bc6a081b96a05c368e73d94d066fe4d788cbb534af752c8e22ac4454e9abe13418e191333c6ff88ccb5636287a05cdba58412340d301720a9ffbab457d4cb504065e1519ec22523b8a61b364e35a2c8d13e7cd6b94989c95", @ANYRES32=0x0, @ANYBLOB="000000000000000068003480140035006e657464657673696d3000000000000014003500697036746e6c300000000000000000001400350069705f767469300000000000000000001400350076657468305f746f5f62726964676500140035006272696467655f736c6176655f310000"], 0x88}}, 0x0) quotactl(0x9, &(0x7f0000000240)='./file0\x00', 0xee01, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) getpid() pwrite64(r2, &(0x7f0000000a00)="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", 0xffc, 0x9) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000000c0)={'vxcan0\x00'}) [ 213.760310] autofs4:pid:16914:validate_dev_ioctl: invalid path supplied for cmd(0x0000937e) 16:52:20 executing program 0: 16:52:20 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x8921, &(0x7f0000000740)={'macvtap0\x00', @ifru_ivalue}) [ 213.862873] UDF-fs: warning (device loop2): udf_load_vrs: No anchor found 16:52:20 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='9p\x00', 0x0, 0x0) [ 213.934540] UDF-fs: Scanning with blocksize 512 failed [ 214.022265] UDF-fs: error (device loop2): udf_process_sequence: Primary Volume Descriptor not found! 16:52:21 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x5452, &(0x7f0000000740)={'\x00', @ifru_ivalue}) [ 214.124554] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=2016, location=2016 [ 214.149023] 9pnet_virtio: no channels available for device ./file0 16:52:21 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x20) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x388, 0xffffffff, 0x0, 0x110, 0x20c, 0xffffffff, 0xffffffff, 0x2f0, 0x2f0, 0x2f0, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xec, 0x110, 0x0, {}, [@common=@icmp6={{0x24, 'icmp6\x00'}, {0x0, "7bed"}}, @common=@ipv6header={{0x24, 'ipv6header\x00'}}]}, @REJECT={0x24, 'REJECT\x00'}}, {{@uncond, 0x0, 0xa4, 0xcc}, @common=@unspec=@NFQUEUE2={0x28, 'NFQUEUE\x00'}}, {{@ipv6={@private2, @empty, [], [], 'tunl0\x00', 'bridge_slave_0\x00'}, 0x0, 0xa4, 0xe4}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "901aa9316416ffc93aa8c059e0b8af9e98dd460deb7c9ea7fcb5b749f897"}}}], {{[], 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x3e4) [ 214.182214] UDF-fs: error (device loop2): udf_process_sequence: Primary Volume Descriptor not found! [ 214.265592] UDF-fs: Scanning with blocksize 1024 failed [ 214.339232] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=256, location=256 [ 214.391366] IPVS: ftp: loaded support on port[0] = 21 [ 214.401922] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=512, location=512 [ 214.434960] IPVS: ftp: loaded support on port[0] = 21 [ 214.466086] UDF-fs: warning (device loop2): udf_load_vrs: No anchor found [ 214.515892] UDF-fs: Scanning with blocksize 2048 failed [ 214.561717] UDF-fs: warning (device loop2): udf_load_vrs: No VRS found [ 214.616318] UDF-fs: Scanning with blocksize 4096 failed [ 222.525139] ================================================================== [ 222.532563] BUG: KASAN: slab-out-of-bounds in __lock_acquire+0x2cb4/0x3ff0 [ 222.539589] Read of size 8 at addr ffff8880b34464e0 by task kworker/0:1/14 [ 222.546635] [ 222.548263] CPU: 0 PID: 14 Comm: kworker/0:1 Not tainted 4.19.157-syzkaller #0 [ 222.555619] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 222.564998] Workqueue: events l2cap_chan_timeout [ 222.569842] Call Trace: [ 222.572521] dump_stack+0x1fc/0x2fe [ 222.576149] print_address_description.cold+0x54/0x219 [ 222.581423] kasan_report_error.cold+0x8a/0x1c7 [ 222.586177] ? __lock_acquire+0x2cb4/0x3ff0 [ 222.590518] __asan_report_load8_noabort+0x88/0x90 [ 222.595536] ? __lock_acquire+0x2cb4/0x3ff0 [ 222.599856] __lock_acquire+0x2cb4/0x3ff0 [ 222.604008] ? trace_hardirqs_off+0x64/0x200 [ 222.608442] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 222.613564] ? debug_object_assert_init+0x242/0x2e0 [ 222.618766] ? mark_held_locks+0xf0/0xf0 [ 222.622823] ? debug_object_free+0x380/0x380 [ 222.627662] ? mark_held_locks+0xf0/0xf0 [ 222.631726] ? __save_stack_trace+0x9f/0x190 [ 222.636222] ? del_timer+0xc3/0x100 [ 222.639847] lock_acquire+0x170/0x3c0 [ 222.643644] ? lock_sock_nested+0x3b/0x110 [ 222.648190] _raw_spin_lock_bh+0x2f/0x40 [ 222.652341] ? lock_sock_nested+0x3b/0x110 [ 222.656659] lock_sock_nested+0x3b/0x110 [ 222.660809] l2cap_sock_teardown_cb+0xa0/0x6d0 [ 222.665386] ? lock_downgrade+0x720/0x720 [ 222.669620] l2cap_chan_del+0xbc/0xa50 [ 222.673533] ? trace_hardirqs_off+0x64/0x200 [ 222.677940] l2cap_chan_close+0x1b5/0x950 [ 222.682120] ? __set_monitor_timer+0x200/0x200 [ 222.686710] ? check_preemption_disabled+0x41/0x280 [ 222.691725] l2cap_chan_timeout+0x17e/0x2f0 [ 222.696396] process_one_work+0x864/0x1570 [ 222.700639] ? pwq_dec_nr_in_flight+0x2d0/0x2d0 [ 222.705570] worker_thread+0x64c/0x1130 [ 222.709550] ? __kthread_parkme+0x133/0x1e0 [ 222.713865] ? process_one_work+0x1570/0x1570 [ 222.718353] kthread+0x33f/0x460 [ 222.721716] ? kthread_park+0x180/0x180 [ 222.726822] ret_from_fork+0x24/0x30 [ 222.730551] [ 222.732294] Allocated by task 16556: [ 222.736290] kmem_cache_alloc+0x122/0x370 [ 222.740522] getname_flags+0xce/0x590 [ 222.744521] user_path_at_empty+0x2a/0x50 [ 222.752150] vfs_statx+0x113/0x210 [ 222.757492] __se_sys_newlstat+0x96/0x120 [ 222.761634] do_syscall_64+0xf9/0x620 [ 222.765431] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 222.771036] [ 222.772663] Freed by task 16556: [ 222.776719] kmem_cache_free+0x7f/0x260 [ 222.780687] putname+0xe1/0x120 [ 222.784073] filename_lookup+0x3d0/0x5a0 [ 222.788149] vfs_statx+0x113/0x210 [ 222.791691] __se_sys_newlstat+0x96/0x120 [ 222.795833] do_syscall_64+0xf9/0x620 [ 222.799631] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 222.805250] [ 222.806873] The buggy address belongs to the object at ffff8880b3446a40 [ 222.806873] which belongs to the cache names_cache of size 4096 [ 222.819614] The buggy address is located 1376 bytes to the left of [ 222.819614] 4096-byte region [ffff8880b3446a40, ffff8880b3447a40) [ 222.832197] The buggy address belongs to the page: [ 222.837127] page:ffffea0002cd1180 count:1 mapcount:0 mapping:ffff88813be83e40 index:0x0 compound_mapcount: 0 [ 222.847090] flags: 0xfff00000008100(slab|head) [ 222.852317] raw: 00fff00000008100 ffffea000263b008 ffffea0002a4fa88 ffff88813be83e40 [ 222.860367] raw: 0000000000000000 ffff8880b3446a40 0000000100000001 0000000000000000 [ 222.868235] page dumped because: kasan: bad access detected [ 222.874189] [ 222.875824] Memory state around the buggy address: [ 222.880746] ffff8880b3446380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 222.888734] ffff8880b3446400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 222.896097] >ffff8880b3446480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 222.903557] ^ [ 222.910838] ffff8880b3446500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 222.918435] ffff8880b3446580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 222.925872] ================================================================== [ 222.933833] Disabling lock debugging due to kernel taint [ 222.939273] Kernel panic - not syncing: panic_on_warn set ... [ 222.939273] [ 222.946643] CPU: 0 PID: 14 Comm: kworker/0:1 Tainted: G B 4.19.157-syzkaller #0 [ 222.955389] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 222.964756] Workqueue: events l2cap_chan_timeout [ 222.969665] Call Trace: [ 222.972737] dump_stack+0x1fc/0x2fe [ 222.976382] panic+0x26a/0x50e [ 222.979651] ? __warn_printk+0xf3/0xf3 [ 222.983521] ? lock_downgrade+0x720/0x720 [ 222.987734] ? print_shadow_for_address+0xb8/0x114 [ 222.992677] ? trace_hardirqs_off+0x64/0x200 [ 222.997090] kasan_end_report+0x43/0x49 [ 223.001059] kasan_report_error.cold+0xa7/0x1c7 [ 223.005739] ? __lock_acquire+0x2cb4/0x3ff0 [ 223.010224] __asan_report_load8_noabort+0x88/0x90 [ 223.015258] ? __lock_acquire+0x2cb4/0x3ff0 [ 223.019575] __lock_acquire+0x2cb4/0x3ff0 [ 223.023850] ? trace_hardirqs_off+0x64/0x200 [ 223.028332] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 223.033496] ? debug_object_assert_init+0x242/0x2e0 [ 223.038519] ? mark_held_locks+0xf0/0xf0 [ 223.042608] ? debug_object_free+0x380/0x380 [ 223.047023] ? mark_held_locks+0xf0/0xf0 [ 223.051069] ? __save_stack_trace+0x9f/0x190 [ 223.055580] ? del_timer+0xc3/0x100 [ 223.059330] lock_acquire+0x170/0x3c0 [ 223.063121] ? lock_sock_nested+0x3b/0x110 [ 223.067359] _raw_spin_lock_bh+0x2f/0x40 [ 223.071436] ? lock_sock_nested+0x3b/0x110 [ 223.075669] lock_sock_nested+0x3b/0x110 [ 223.080243] l2cap_sock_teardown_cb+0xa0/0x6d0 [ 223.084867] ? lock_downgrade+0x720/0x720 [ 223.089022] l2cap_chan_del+0xbc/0xa50 [ 223.092907] ? trace_hardirqs_off+0x64/0x200 [ 223.097317] l2cap_chan_close+0x1b5/0x950 [ 223.101585] ? __set_monitor_timer+0x200/0x200 [ 223.106174] ? check_preemption_disabled+0x41/0x280 [ 223.111197] l2cap_chan_timeout+0x17e/0x2f0 [ 223.115631] process_one_work+0x864/0x1570 [ 223.119880] ? pwq_dec_nr_in_flight+0x2d0/0x2d0 [ 223.124695] worker_thread+0x64c/0x1130 [ 223.128942] ? __kthread_parkme+0x133/0x1e0 [ 223.133272] ? process_one_work+0x1570/0x1570 [ 223.137931] kthread+0x33f/0x460 [ 223.141449] ? kthread_park+0x180/0x180 [ 223.145683] ret_from_fork+0x24/0x30 [ 223.150375] Kernel Offset: disabled [ 223.154032] Rebooting in 86400 seconds..