x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) r3 = socket$kcm(0x29, 0x7, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xa, 0x2, 0x400, 0xc}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000140), &(0x7f00000000c0), 0x1081, r4}, 0x38) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000000480), 0x8) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000006c0)=@bpf_ext={0x1c, 0x6, &(0x7f0000000100)=@raw=[@initr0, @map={0x18, 0x3, 0x1, 0x0, r4}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}], 0x0, 0x1, 0xf8, &(0x7f0000000580)=""/248, 0x0, 0x18, [], 0x0, 0x0, r5, 0x8, &(0x7f0000000500)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000680)={0x0, 0x3, 0x32c96647, 0x9}, 0x10, 0x28c14, r2}, 0x78) sendmsg$kcm(r3, &(0x7f00000004c0)={&(0x7f00000003c0)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, 0x0, 0x0, &(0x7f0000000bc0)=[{0x58, 0x0, 0x3f, "3d036b2fe1c920e033fd51a7135bc633687035d4990a07405974e24f3e4f5bc747dd8cb833517dba325fb8357ec60f4b737260519cbec967f1e58025da9b5821975edd2eb5ce0e"}, {0x120, 0xff, 0x0, "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"}, {0x20, 0x116, 0x100, "e12e82da376bca8fa03c53062e627e"}, {0x10, 0x0, 0xa11}, {0x88, 0x0, 0x0, "48dcf8c1cb65b735b2d5007004b54696aa2a8d0eb98210cf2936121163b1c0584580900f864f0ebc03ba1675bbb924fa22af1c7933e3ea0fe010ebefceaa2fd20e15b805012fd2d7a3e171a57996dc09dc5df4ce65f0c01e583247522e22d559c831115bca323aa68746a2dd9dc875023459b72ec5"}, {0x40, 0x88, 0x39, "e91254173524b71a6cf4982e471433e79bae7c4a781a2a354e5dcee630a99252345f0fe48a629be09093e130c018"}], 0x270}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000002c0)='block_bio_queue\x00'}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r1, 0x12, 0x1, 0x0, 0x0}, 0x20) r6 = openat$cgroup_ro(r0, &(0x7f0000000300)='cpuset.effective_mems\x00', 0x0, 0x0) openat$cgroup_freezer_state(r6, &(0x7f0000000380)='freezer.state\x00', 0x2, 0x0) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) socket$kcm(0x2b, 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a80)={0xffffffffffffffff, 0x0, 0x67, 0x62, &(0x7f0000000840)="f99a133c46d257d5200f326d0a5562cd17685e886bf2f9b3f9a2790348e08bc05a864a96cf5d232acf4d9c795667017ab2c3fa3c298204bcf30edef2ac8db7cbfdf4deae19c3fb8efa11f5d49f040b0731924ad772daa2861563518e94c736d15a5ac7a9872008", &(0x7f00000008c0)=""/98, 0x51a, 0x0, 0x1b, 0x0, &(0x7f0000000940)="5a4fa68ec2c72f99361b9b501348d1d5bce04f26173ed66a605e0c", &(0x7f0000000980)}, 0x48) 04:37:02 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00', 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000002340)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r1, &(0x7f0000002a00)={0x0, 0x0, &(0x7f00000029c0)={&(0x7f0000002440)={0x20, r2, 0x1, 0x0, 0x0, {}, [{{0x9, 0x1, r3}, {0x4}}]}, 0x20}}, 0x0) 04:37:02 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000380)='devlink\x00', 0xffffffffffffffff) recvmsg(r0, &(0x7f0000000ec0)={0x0, 0x0, 0x0}, 0x0) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_SET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000003c0)={0x14, r1, 0x1}, 0x14}}, 0x0) 04:37:02 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x11, 0x2, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) sendmsg(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000380)="97622c", 0x3}], 0x1}, 0x0) getpid() ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0xffffff88, &(0x7f00000000c0)="b9ff0300290d698cb89e40f008001fffffff00004000632977", 0x0, 0x100, 0x6000000000000000}, 0x28) 04:37:02 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000000040)=[{{&(0x7f0000000000)={0xa, 0x4e21, 0x0, @empty}, 0x1c, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x2400e000) 04:37:02 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x11, 0x2, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) sendmsg(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000fefffe7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010001000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000c9be17044171e1d3d7b196d079c4d4758fa35d17c668a4b6c5f6688e15308a1f8355410c0cec9a66819ce256b8530e31ec24925095a163b9d4e76be266e31a80382240baa44e080addde36e5fdc6c42a7b3f912f6906a6e2313091dd61258a1fda45991fbdce32bebcb3ac17c5146793e6a4785ee8b60092659b941bbd694d1f8898b3e6477afbda84355dba16801c89c08c07ce144961bfbb975b726a0b59b8c79321bc8d009397939109"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000380)="97622c", 0x3}], 0x1}, 0x0) getpid() ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0xffffff88, &(0x7f00000000c0)="b9ff0300290d698cb89e40f008001fffffff00004000632977", 0x0, 0x100, 0x6000000000000000}, 0x28) [ 506.595797][T21419] netlink: 'syz-executor.1': attribute type 1 has an invalid length. 04:37:02 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f00000062c0)=[{{&(0x7f0000000000)={0xa, 0x4e21, 0x0, @loopback}, 0x1c, 0x0, 0x0, &(0x7f0000000200)=[@rthdrdstopts={{0x18}}, @rthdrdstopts={{0x18}}], 0x30}}], 0x1, 0x0) 04:37:02 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000380)='devlink\x00', 0xffffffffffffffff) recvmsg(r0, &(0x7f0000000ec0)={0x0, 0x0, 0x0}, 0x0) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_SET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000003c0)={0x14, r1, 0x1}, 0x14}}, 0x0) 04:37:02 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x11, 0x2, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) sendmsg(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000380)="97622c", 0x3}], 0x1}, 0x0) getpid() ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0xffffff88, &(0x7f00000000c0)="b9ff0300290d698cb89e40f008001fffffff00004000632977", 0x0, 0x100, 0x6000000000000000}, 0x28) 04:37:02 executing program 2: bpf$MAP_CREATE(0xf, &(0x7f0000000000), 0x40) 04:37:02 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080)='ethtool\x00', 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000400)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_hsr\x00'}]}]}, 0x2c}}, 0x0) 04:37:02 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x11, 0x2, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) sendmsg(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000fefffe7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010001000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000c9be17044171e1d3d7b196d079c4d4758fa35d17c668a4b6c5f6688e15308a1f8355410c0cec9a66819ce256b8530e31ec24925095a163b9d4e76be266e31a80382240baa44e080addde36e5fdc6c42a7b3f912f6906a6e2313091dd61258a1fda45991fbdce32bebcb3ac17c5146793e6a4785ee8b60092659b941bbd694d1f8898b3e6477afbda84355dba16801c89c08c07ce144961bfbb975b726a0b59b8c79321bc8d009397939109"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000380)="97622c", 0x3}], 0x1}, 0x0) getpid() ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0xffffff88, &(0x7f00000000c0)="b9ff0300290d698cb89e40f008001fffffff00004000632977", 0x0, 0x100, 0x6000000000000000}, 0x28) 04:37:03 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) r3 = socket$kcm(0x29, 0x7, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xa, 0x2, 0x400, 0xc}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000140), &(0x7f00000000c0), 0x1081, r4}, 0x38) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000000480), 0x8) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000006c0)=@bpf_ext={0x1c, 0x6, &(0x7f0000000100)=@raw=[@initr0, @map={0x18, 0x3, 0x1, 0x0, r4}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}], 0x0, 0x1, 0xf8, &(0x7f0000000580)=""/248, 0x0, 0x18, [], 0x0, 0x0, r5, 0x8, &(0x7f0000000500)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000680)={0x0, 0x3, 0x32c96647, 0x9}, 0x10, 0x28c14, r2}, 0x78) sendmsg$kcm(r3, &(0x7f00000004c0)={&(0x7f00000003c0)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, 0x0, 0x0, &(0x7f0000000bc0)=[{0x58, 0x0, 0x3f, "3d036b2fe1c920e033fd51a7135bc633687035d4990a07405974e24f3e4f5bc747dd8cb833517dba325fb8357ec60f4b737260519cbec967f1e58025da9b5821975edd2eb5ce0e"}, {0x120, 0xff, 0x0, "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"}, {0x20, 0x116, 0x100, "e12e82da376bca8fa03c53062e627e"}, {0x10, 0x0, 0xa11}, {0x88, 0x0, 0x0, "48dcf8c1cb65b735b2d5007004b54696aa2a8d0eb98210cf2936121163b1c0584580900f864f0ebc03ba1675bbb924fa22af1c7933e3ea0fe010ebefceaa2fd20e15b805012fd2d7a3e171a57996dc09dc5df4ce65f0c01e583247522e22d559c831115bca323aa68746a2dd9dc875023459b72ec5"}, {0x40, 0x88, 0x39, "e91254173524b71a6cf4982e471433e79bae7c4a781a2a354e5dcee630a99252345f0fe48a629be09093e130c018"}], 0x270}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000002c0)='block_bio_queue\x00'}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r1, 0x12, 0x1, 0x0, 0x0}, 0x20) r6 = openat$cgroup_ro(r0, &(0x7f0000000300)='cpuset.effective_mems\x00', 0x0, 0x0) openat$cgroup_freezer_state(r6, &(0x7f0000000380)='freezer.state\x00', 0x2, 0x0) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) socket$kcm(0x2b, 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a80)={0xffffffffffffffff, 0x0, 0x67, 0x62, &(0x7f0000000840)="f99a133c46d257d5200f326d0a5562cd17685e886bf2f9b3f9a2790348e08bc05a864a96cf5d232acf4d9c795667017ab2c3fa3c298204bcf30edef2ac8db7cbfdf4deae19c3fb8efa11f5d49f040b0731924ad772daa2861563518e94c736d15a5ac7a9872008", &(0x7f00000008c0)=""/98, 0x51a, 0x0, 0x1b, 0x0, &(0x7f0000000940)="5a4fa68ec2c72f99361b9b501348d1d5bce04f26173ed66a605e0c", &(0x7f0000000980)}, 0x48) 04:37:03 executing program 5: pipe(&(0x7f0000001ac0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet(0x10, 0x2, 0x0) r3 = socket$inet(0x2, 0x3, 0x101) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=@gettclass={0x24, 0x2a, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {}, {0x0, 0xffff}}}, 0x24}}, 0x0) setsockopt$inet_msfilter(r3, 0x0, 0x8, &(0x7f0000000080)=ANY=[@ANYRES16], 0x1) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000380)) accept$inet(r2, &(0x7f00000003c0)={0x2, 0x0, @multicast2}, &(0x7f0000000400)=0x10) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, &(0x7f0000000040)) getuid() sendmsg$netlink(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000002c0)=@kern={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000300)}, 0x800) getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000500)=0xc) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000000)=ANY=[@ANYBLOB="24001b000000830780dba56a4690000000000000", @ANYRES32=r4], 0x24}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB="310400002e"], 0x2}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x84ffe2, 0x0) 04:37:03 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000380)='devlink\x00', 0xffffffffffffffff) recvmsg(r0, &(0x7f0000000ec0)={0x0, 0x0, 0x0}, 0x0) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_SET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000003c0)={0x14, r1, 0x1}, 0x14}}, 0x0) 04:37:03 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x11, 0x2, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) sendmsg(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000380)="97622c", 0x3}], 0x1}, 0x0) getpid() ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0xffffff88, &(0x7f00000000c0)="b9ff0300290d698cb89e40f008001fffffff00004000632977", 0x0, 0x100, 0x6000000000000000}, 0x28) 04:37:03 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x9, 0x1600, 0x6, 0x6898}, 0x40) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv_slave_0\x00'}) sendmsg$NL80211_CMD_SET_WIPHY(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, 0x0}, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$nl80211(&(0x7f0000000800)='nl80211\x00', r0) 04:37:03 executing program 1: r0 = syz_genetlink_get_family_id$ethtool(&(0x7f00000001c0)='ethtool\x00', 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_TSINFO_GET(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000640)={0x20, r0, 0x1, 0x0, 0x0, {}, [@HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x4001, 0x4}]}]}, 0x20}}, 0x0) 04:37:03 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x11, 0x2, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) sendmsg(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000fefffe7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010001000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000c9be17044171e1d3d7b196d079c4d4758fa35d17c668a4b6c5f6688e15308a1f8355410c0cec9a66819ce256b8530e31ec24925095a163b9d4e76be266e31a80382240baa44e080addde36e5fdc6c42a7b3f912f6906a6e2313091dd61258a1fda45991fbdce32bebcb3ac17c5146793e6a4785ee8b60092659b941bbd694d1f8898b3e6477afbda84355dba16801c89c08c07ce144961bfbb975b726a0b59b8c79321bc8d0093979391090e0ac8666d2500dd60794bf7cb8ef212f0452eb6415435ab4e6ee740327968dbb729b75a4244ee0f031e5a093bff037d9f7f76aaa845d819fa9f8d1cb2b0d2ec20bbb74d7b35421046847281aae5b1cc0fd183f68ff1bf9af98bacf1b91cf55debb0c8c027901f949834aec6764bce8586a9470f267b12e5ad2274f22103f30e5c1a119dce8693e94b92ae72abe7"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000380)="97622c", 0x3}], 0x1}, 0x0) getpid() ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0xffffff88, &(0x7f00000000c0)="b9ff0300290d698cb89e40f008001fffffff00004000632977", 0x0, 0x100, 0x6000000000000000}, 0x28) 04:37:03 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x11, 0x2, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) sendmsg(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000380)="97622c", 0x3}], 0x1}, 0x0) getpid() ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0xffffff88, &(0x7f00000000c0)="b9ff0300290d698cb89e40f008001fffffff00004000632977", 0x0, 0x100, 0x6000000000000000}, 0x28) [ 507.637101][T21459] netlink: 1037 bytes leftover after parsing attributes in process `syz-executor.5'. 04:37:03 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x11, 0x2, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) sendmsg(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000380)="97622c", 0x3}], 0x1}, 0x0) getpid() ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0xffffff88, &(0x7f00000000c0)="b9ff0300290d698cb89e40f008001fffffff00004000632977", 0x0, 0x100, 0x6000000000000000}, 0x28) 04:37:03 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x1) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x8b06}, 0x1c) 04:37:03 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00', 0xffffffffffffffff) sendmsg$TEAM_CMD_PORT_LIST_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)={0x5c, r1, 0x1, 0x0, 0x0, {}, [{{0x9}, {0x40, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x5}, {0x4}}, {0x8}}}]}}]}, 0x5c}}, 0x0) 04:37:03 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x11, 0x2, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) sendmsg(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000380)="97622c", 0x3}], 0x1}, 0x0) getpid() ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0xffffff88, &(0x7f00000000c0)="b9ff0300290d698cb89e40f008001fffffff00004000632977", 0x0, 0x100, 0x6000000000000000}, 0x28) [ 507.977455][T21472] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 508.074946][T21472] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 508.154951][T21474] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 508.226677][T21474] netlink: 'syz-executor.1': attribute type 1 has an invalid length. 04:37:04 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) r3 = socket$kcm(0x29, 0x7, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xa, 0x2, 0x400, 0xc}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000140), &(0x7f00000000c0), 0x1081, r4}, 0x38) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000000480), 0x8) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000006c0)=@bpf_ext={0x1c, 0x6, &(0x7f0000000100)=@raw=[@initr0, @map={0x18, 0x3, 0x1, 0x0, r4}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}], 0x0, 0x1, 0xf8, &(0x7f0000000580)=""/248, 0x0, 0x18, [], 0x0, 0x0, r5, 0x8, &(0x7f0000000500)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000680)={0x0, 0x3, 0x32c96647, 0x9}, 0x10, 0x28c14, r2}, 0x78) sendmsg$kcm(r3, &(0x7f00000004c0)={&(0x7f00000003c0)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, 0x0, 0x0, &(0x7f0000000bc0)=[{0x58, 0x0, 0x3f, "3d036b2fe1c920e033fd51a7135bc633687035d4990a07405974e24f3e4f5bc747dd8cb833517dba325fb8357ec60f4b737260519cbec967f1e58025da9b5821975edd2eb5ce0e"}, {0x120, 0xff, 0x0, "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"}, {0x20, 0x116, 0x100, "e12e82da376bca8fa03c53062e627e"}, {0x10, 0x0, 0xa11}, {0x10, 0x109}, {0x40, 0x88, 0x39, "e91254173524b71a6cf4982e471433e79bae7c4a781a2a354e5dcee630a99252345f0fe48a629be09093e130c018"}], 0x1f8}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000002c0)='block_bio_queue\x00'}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r1, 0x12, 0x1, 0x0, 0x0}, 0x20) r6 = openat$cgroup_ro(r0, &(0x7f0000000300)='cpuset.effective_mems\x00', 0x0, 0x0) openat$cgroup_freezer_state(r6, &(0x7f0000000380)='freezer.state\x00', 0x2, 0x0) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) socket$kcm(0x2b, 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a80)={0xffffffffffffffff, 0x0, 0x67, 0x62, &(0x7f0000000840)="f99a133c46d257d5200f326d0a5562cd17685e886bf2f9b3f9a2790348e08bc05a864a96cf5d232acf4d9c795667017ab2c3fa3c298204bcf30edef2ac8db7cbfdf4deae19c3fb8efa11f5d49f040b0731924ad772daa2861563518e94c736d15a5ac7a9872008", &(0x7f00000008c0)=""/98, 0x51a, 0x0, 0x1b, 0x0, &(0x7f0000000940)="5a4fa68ec2c72f99361b9b501348d1d5bce04f26173ed66a605e0c", &(0x7f0000000980)}, 0x48) 04:37:04 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet_mreqn(r0, 0x0, 0xb, 0x0, &(0x7f0000000400)) 04:37:04 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x11, 0x2, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) sendmsg(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000380)="97622c", 0x3}], 0x1}, 0x0) getpid() ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0xffffff88, &(0x7f00000000c0)="b9ff0300290d698cb89e40f008001fffffff00004000632977", 0x0, 0x100, 0x6000000000000000}, 0x28) 04:37:04 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x6, 0x4180111, r0, 0x0) 04:37:05 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet_mreqn(r0, 0x0, 0x1600bd7b, 0x0, &(0x7f0000000400)) 04:37:05 executing program 5: r0 = syz_genetlink_get_family_id$ethtool(&(0x7f00000001c0)='ethtool\x00', 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_TSINFO_GET(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000640)={0x14, r0, 0x1, 0x0, 0x0, {0x12}}, 0x14}}, 0x0) 04:37:05 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)=@deltaction={0x30, 0x31, 0x1, 0x0, 0x0, {}, [@TCA_ACT_TAB={0x1c, 0x1, [{0xc, 0x1, 0x0, 0x0, @TCA_ACT_INDEX={0x8}}, {0xc, 0x0, 0x0, 0x0, @TCA_ACT_INDEX={0x8}}]}]}, 0x30}}, 0x0) 04:37:05 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x11, 0x2, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) sendmsg(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000fefffe7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010001000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000c9be17044171e1d3d7b196d079c4d4758fa35d17c668a4b6c5f6688e15308a1f8355410c0cec9a66819ce256b8530e31ec24925095a163b9d4e76be266e31a80382240baa44e080addde36e5fdc6c42a7b3f912f6906a6e2313091dd61258a1fda45991fbdce32bebcb3ac17c5146793e6a4785ee8b60092659b941bbd694d1f8898b3e6477afbda84355dba16801c89c08c07ce144961bfbb975b726a0b59b8c79321bc8d0093979391090e0ac8666d2500dd60794bf7cb8ef212f0452eb6415435ab4e6ee740327968dbb729b75a4244ee0f031e5a093bff037d9f7f76aaa845d819fa9f8d1cb2b0d2ec20bbb74d7b35421046847281aae5b1cc0fd183f68ff1bf9af98bacf1b91cf55debb0c8c027901f949834aec6764bce8586a9470f267b12e5ad2274f22103f30e5c1a119dce8693e94b92ae72abe72127d8d23884ea84c82c9d2f5ce635d2b997b21bb82f720095064fcd956de51de721d7f9bd85fec7afc6e6a79f9101e03b356cf1bb813e646dcd43d9a71ef270e3644067cdea1848e7e55a5164a1fb7a9010912fbf136a9721fa4c84f5494a267ea72f87412708bcd548"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000380)="97622c", 0x3}], 0x1}, 0x0) getpid() ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0xffffff88, &(0x7f00000000c0)="b9ff0300290d698cb89e40f008001fffffff00004000632977", 0x0, 0x100, 0x6000000000000000}, 0x28) 04:37:05 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet_mreqn(r0, 0x11, 0x66, 0x0, &(0x7f0000000400)) 04:37:05 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) r3 = socket$kcm(0x29, 0x7, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xa, 0x2, 0x400, 0xc}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000140), &(0x7f00000000c0), 0x1081, r4}, 0x38) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000000480), 0x8) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000006c0)=@bpf_ext={0x1c, 0x6, &(0x7f0000000100)=@raw=[@initr0, @map={0x18, 0x3, 0x1, 0x0, r4}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}], 0x0, 0x1, 0xf8, &(0x7f0000000580)=""/248, 0x0, 0x18, [], 0x0, 0x0, r5, 0x8, &(0x7f0000000500)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000680)={0x0, 0x3, 0x32c96647, 0x9}, 0x10, 0x28c14, r2}, 0x78) sendmsg$kcm(r3, &(0x7f00000004c0)={&(0x7f00000003c0)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, 0x0, 0x0, &(0x7f0000000bc0)=[{0x58, 0x0, 0x3f, "3d036b2fe1c920e033fd51a7135bc633687035d4990a07405974e24f3e4f5bc747dd8cb833517dba325fb8357ec60f4b737260519cbec967f1e58025da9b5821975edd2eb5ce0e"}, {0x120, 0xff, 0x0, "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"}, {0x20, 0x116, 0x100, "e12e82da376bca8fa03c53062e627e"}, {0x10, 0x0, 0xa11}, {0x10, 0x109}, {0x40, 0x88, 0x39, "e91254173524b71a6cf4982e471433e79bae7c4a781a2a354e5dcee630a99252345f0fe48a629be09093e130c018"}], 0x1f8}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000002c0)='block_bio_queue\x00'}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r1, 0x12, 0x1, 0x0, 0x0}, 0x20) r6 = openat$cgroup_ro(r0, &(0x7f0000000300)='cpuset.effective_mems\x00', 0x0, 0x0) openat$cgroup_freezer_state(r6, &(0x7f0000000380)='freezer.state\x00', 0x2, 0x0) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) socket$kcm(0x2b, 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a80)={0xffffffffffffffff, 0x0, 0x67, 0x62, &(0x7f0000000840)="f99a133c46d257d5200f326d0a5562cd17685e886bf2f9b3f9a2790348e08bc05a864a96cf5d232acf4d9c795667017ab2c3fa3c298204bcf30edef2ac8db7cbfdf4deae19c3fb8efa11f5d49f040b0731924ad772daa2861563518e94c736d15a5ac7a9872008", &(0x7f00000008c0)=""/98, 0x51a, 0x0, 0x1b, 0x0, &(0x7f0000000940)="5a4fa68ec2c72f99361b9b501348d1d5bce04f26173ed66a605e0c", &(0x7f0000000980)}, 0x48) 04:37:05 executing program 4: syz_genetlink_get_family_id$tipc(&(0x7f0000013640)='TIPC\x00', 0xffffffffffffffff) 04:37:05 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_buf(r0, 0x29, 0x36, &(0x7f0000000140)="8335baa9900505da", 0x8) 04:37:05 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x66, &(0x7f0000000540), 0x4) 04:37:06 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) r3 = socket$kcm(0x29, 0x7, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xa, 0x2, 0x400, 0xc}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000140), &(0x7f00000000c0), 0x1081, r4}, 0x38) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000000480), 0x8) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000006c0)=@bpf_ext={0x1c, 0x6, &(0x7f0000000100)=@raw=[@initr0, @map={0x18, 0x3, 0x1, 0x0, r4}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}], 0x0, 0x1, 0xf8, &(0x7f0000000580)=""/248, 0x0, 0x18, [], 0x0, 0x0, r5, 0x8, &(0x7f0000000500)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000680)={0x0, 0x3, 0x32c96647, 0x9}, 0x10, 0x28c14, r2}, 0x78) sendmsg$kcm(r3, &(0x7f00000004c0)={&(0x7f00000003c0)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, 0x0, 0x0, &(0x7f0000000bc0)=[{0x58, 0x0, 0x3f, "3d036b2fe1c920e033fd51a7135bc633687035d4990a07405974e24f3e4f5bc747dd8cb833517dba325fb8357ec60f4b737260519cbec967f1e58025da9b5821975edd2eb5ce0e"}, {0x120, 0xff, 0x0, "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"}, {0x20, 0x116, 0x100, "e12e82da376bca8fa03c53062e627e"}, {0x10, 0x0, 0xa11}, {0x10, 0x109}, {0x40, 0x88, 0x39, "e91254173524b71a6cf4982e471433e79bae7c4a781a2a354e5dcee630a99252345f0fe48a629be09093e130c018"}], 0x1f8}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000002c0)='block_bio_queue\x00'}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r1, 0x12, 0x1, 0x0, 0x0}, 0x20) r6 = openat$cgroup_ro(r0, &(0x7f0000000300)='cpuset.effective_mems\x00', 0x0, 0x0) openat$cgroup_freezer_state(r6, &(0x7f0000000380)='freezer.state\x00', 0x2, 0x0) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) socket$kcm(0x2b, 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a80)={0xffffffffffffffff, 0x0, 0x67, 0x62, &(0x7f0000000840)="f99a133c46d257d5200f326d0a5562cd17685e886bf2f9b3f9a2790348e08bc05a864a96cf5d232acf4d9c795667017ab2c3fa3c298204bcf30edef2ac8db7cbfdf4deae19c3fb8efa11f5d49f040b0731924ad772daa2861563518e94c736d15a5ac7a9872008", &(0x7f00000008c0)=""/98, 0x51a, 0x0, 0x1b, 0x0, &(0x7f0000000940)="5a4fa68ec2c72f99361b9b501348d1d5bce04f26173ed66a605e0c", &(0x7f0000000980)}, 0x48) 04:37:06 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x11, 0x2, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) sendmsg(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000380)="97622c", 0x3}], 0x1}, 0x0) getpid() ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0xffffff88, &(0x7f00000000c0)="b9ff0300290d698cb89e40f008001fffffff00004000632977", 0x0, 0x100, 0x6000000000000000}, 0x28) 04:37:06 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet_mreqn(r0, 0x0, 0x17, 0x0, &(0x7f0000000400)) 04:37:06 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_buf(r0, 0x29, 0x15, &(0x7f0000000140)="8335baa9900505dad18dd3efb2937f237a6a870e", 0x14) 04:37:06 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x11, 0x2, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) sendmsg(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000fefffe7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010001000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000c9be17044171e1d3d7b196d079c4d4758fa35d17c668a4b6c5f6688e15308a1f8355410c0cec9a66819ce256b8530e31ec24925095a163b9d4e76be266e31a80382240baa44e080addde36e5fdc6c42a7b3f912f6906a6e2313091dd61258a1fda45991fbdce32bebcb3ac17c5146793e6a4785ee8b60092659b941bbd694d1f8898b3e6477afbda84355dba16801c89c08c07ce144961bfbb975b726a0b59b8c79321bc8d0093979391090e0ac8666d2500dd60794bf7cb8ef212f0452eb6415435ab4e6ee740327968dbb729b75a4244ee0f031e5a093bff037d9f7f76aaa845d819fa9f8d1cb2b0d2ec20bbb74d7b35421046847281aae5b1cc0fd183f68ff1bf9af98bacf1b91cf55debb0c8c027901f949834aec6764bce8586a9470f267b12e5ad2274f22103f30e5c1a119dce8693e94b92ae72abe72127d8d23884ea84c82c9d2f5ce635d2b997b21bb82f720095064fcd956de51de721d7f9bd85fec7afc6e6a79f9101e03b356cf1bb813e646dcd43d9a71ef270e3644067cdea1848e7e55a5164a1fb7a9010912fbf136a9721fa4c84f5494a267ea72f87412708bcd548"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000380)="97622c", 0x3}], 0x1}, 0x0) getpid() ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0xffffff88, &(0x7f00000000c0)="b9ff0300290d698cb89e40f008001fffffff00004000632977", 0x0, 0x100, 0x6000000000000000}, 0x28) 04:37:06 executing program 4: socket(0x10, 0x2, 0x1) 04:37:06 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000380)='devlink\x00', 0xffffffffffffffff) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_SET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000003c0)=ANY=[@ANYBLOB="14000000", @ANYRES16=r1, @ANYBLOB="ffffadfb7caedc142ff62a"], 0x14}}, 0x0) 04:37:07 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x11, 0x2, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) sendmsg(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000380)="97622c", 0x3}], 0x1}, 0x0) getpid() ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0xffffff88, &(0x7f00000000c0)="b9ff0300290d698cb89e40f008001fffffff00004000632977", 0x0, 0x100, 0x6000000000000000}, 0x28) 04:37:07 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000200)='ethtool\x00', 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_TSINFO_GET(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000000)={0x18, r1, 0x4c5746e8803747f3, 0x0, 0x0, {0x6}, [@HEADER={0x4}]}, 0x18}}, 0x0) 04:37:07 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000380)='devlink\x00', 0xffffffffffffffff) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_SET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000003c0)=ANY=[@ANYBLOB="14000000", @ANYRES16=r1, @ANYBLOB="ffffadfb7caedc142ff62a"], 0x14}}, 0x0) 04:37:07 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000380)='devlink\x00', 0xffffffffffffffff) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_SET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000003c0)=ANY=[@ANYBLOB="14000000", @ANYRES16=r1, @ANYBLOB="ffffadfb7caedc142ff62a"], 0x14}}, 0x0) 04:37:07 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x11, 0x2, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) sendmsg(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000fefffe7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010001000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000c9be17044171e1d3d7b196d079c4d4758fa35d17c668a4b6c5f6688e15308a1f8355410c0cec9a66819ce256b8530e31ec24925095a163b9d4e76be266e31a80382240baa44e080addde36e5fdc6c42a7b3f912f6906a6e2313091dd61258a1fda45991fbdce32bebcb3ac17c5146793e6a4785ee8b60092659b941bbd694d1f8898b3e6477afbda84355dba16801c89c08c07ce144961bfbb975b726a0b59b8c79321bc8d0093979391090e0ac8666d2500dd60794bf7cb8ef212f0452eb6415435ab4e6ee740327968dbb729b75a4244ee0f031e5a093bff037d9f7f76aaa845d819fa9f8d1cb2b0d2ec20bbb74d7b35421046847281aae5b1cc0fd183f68ff1bf9af98bacf1b91cf55debb0c8c027901f949834aec6764bce8586a9470f267b12e5ad2274f22103f30e5c1a119dce8693e94b92ae72abe72127d8d23884ea84c82c9d2f5ce635d2b997b21bb82f720095064fcd956de51de721d7f9bd85fec7afc6e6a79f9101e03b356cf1bb813e646dcd43d9a71ef270e3644067cdea1848e7e55a5164a1fb7a9010912fbf136a9721fa4c84f5494a267ea72f87412708bcd54815c4a1d38a999525f3335e5c8f2c2d1f5d78"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000380)="97622c", 0x3}], 0x1}, 0x0) getpid() ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0xffffff88, &(0x7f00000000c0)="b9ff0300290d698cb89e40f008001fffffff00004000632977", 0x0, 0x100, 0x6000000000000000}, 0x28) 04:37:07 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) r3 = socket$kcm(0x29, 0x7, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xa, 0x2, 0x400, 0xc}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000140), &(0x7f00000000c0), 0x1081, r4}, 0x38) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000000480), 0x8) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000006c0)=@bpf_ext={0x1c, 0x6, &(0x7f0000000100)=@raw=[@initr0, @map={0x18, 0x3, 0x1, 0x0, r4}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}], 0x0, 0x1, 0xf8, &(0x7f0000000580)=""/248, 0x0, 0x18, [], 0x0, 0x0, r5, 0x8, &(0x7f0000000500)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000680)={0x0, 0x3, 0x32c96647, 0x9}, 0x10, 0x28c14, r2}, 0x78) sendmsg$kcm(r3, &(0x7f00000004c0)={&(0x7f00000003c0)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, 0x0, 0x0, &(0x7f0000000bc0)=[{0x58, 0x0, 0x3f, "3d036b2fe1c920e033fd51a7135bc633687035d4990a07405974e24f3e4f5bc747dd8cb833517dba325fb8357ec60f4b737260519cbec967f1e58025da9b5821975edd2eb5ce0e"}, {0x120, 0xff, 0x0, "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"}, {0x20, 0x116, 0x100, "e12e82da376bca8fa03c53062e627e"}, {0x10, 0x0, 0xa11}, {0x50, 0x109, 0x0, "48dcf8c1cb65b735b2d5007004b54696aa2a8d0eb98210cf2936121163b1c0584580900f864f0ebc03ba1675bbb924fa22af1c7933e3ea0fe010eb"}, {0x40, 0x88, 0x39, "e91254173524b71a6cf4982e471433e79bae7c4a781a2a354e5dcee630a99252345f0fe48a629be09093e130c018"}], 0x238}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000002c0)='block_bio_queue\x00'}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r1, 0x12, 0x1, 0x0, 0x0}, 0x20) r6 = openat$cgroup_ro(r0, &(0x7f0000000300)='cpuset.effective_mems\x00', 0x0, 0x0) openat$cgroup_freezer_state(r6, &(0x7f0000000380)='freezer.state\x00', 0x2, 0x0) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) socket$kcm(0x2b, 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a80)={0xffffffffffffffff, 0x0, 0x67, 0x62, &(0x7f0000000840)="f99a133c46d257d5200f326d0a5562cd17685e886bf2f9b3f9a2790348e08bc05a864a96cf5d232acf4d9c795667017ab2c3fa3c298204bcf30edef2ac8db7cbfdf4deae19c3fb8efa11f5d49f040b0731924ad772daa2861563518e94c736d15a5ac7a9872008", &(0x7f00000008c0)=""/98, 0x51a, 0x0, 0x1b, 0x0, &(0x7f0000000940)="5a4fa68ec2c72f99361b9b501348d1d5bce04f26173ed66a605e0c", &(0x7f0000000980)}, 0x48) 04:37:07 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_buf(r0, 0x29, 0x1600bd81, &(0x7f0000000140)="8335baa9", 0x4) 04:37:07 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000380)='devlink\x00', 0xffffffffffffffff) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_SET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000003c0)=ANY=[@ANYBLOB="14000000", @ANYRES16=r1, @ANYBLOB="ffffadfb7caedc142ff62a"], 0x14}}, 0x0) 04:37:07 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000140)='batadv\x00', 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_MESH(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r1, 0xaa014240314dc3b9, 0x0, 0x0, {0x8}}, 0x14}}, 0x0) 04:37:07 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x11, 0x2, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) sendmsg(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000fefffe7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010001000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000c9be17044171e1d3d7b196d079c4d4758fa35d17c668a4b6c5f6688e15308a1f8355410c0cec9a66819ce256b8530e31ec24925095a163b9d4e76be266e31a80382240baa44e080addde36e5fdc6c42a7b3f912f6906a6e2313091dd61258a1fda45991fbdce32bebcb3ac17c5146793e6a4785ee8b60092659b941bbd694d1f8898b3e6477afbda84355dba16801c89c08c07ce144961bfbb975b726a0b59b8c79321bc8d0093979391090e0ac8666d2500dd60794bf7cb8ef212f0452eb6415435ab4e6ee740327968dbb729b75a4244ee0f031e5a093bff037d9f7f76aaa845d819fa9f8d1cb2b0d2ec20bbb74d7b35421046847281aae5b1cc0fd183f68ff1bf9af98bacf1b91cf55debb0c8c027901f949834aec6764bce8586a9470f267b12e5ad2274f22103f30e5c1a119dce8693e94b92ae72abe72127d8d23884ea84c82c9d2f5ce635d2b997b21bb82f720095064fcd956de51de721d7f9bd85fec7afc6e6a79f9101e03b356cf1bb813e646dcd43d9a71ef270e3644067cdea1848e7e55a5164a1fb7a9010912fbf136a9721fa4c84f5494a267ea72f87412708bcd54815c4a1d38a999525f3335e5c8f2c2d1f5d78"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000380)="97622c", 0x3}], 0x1}, 0x0) getpid() ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0xffffff88, &(0x7f00000000c0)="b9ff0300290d698cb89e40f008001fffffff00004000632977", 0x0, 0x100, 0x6000000000000000}, 0x28) 04:37:07 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000200)='ethtool\x00', 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_TSINFO_GET(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000000)={0x18, r1, 0x4c5746e8803747f3, 0x0, 0x0, {0x6}, [@HEADER={0x4}]}, 0x18}}, 0x0) 04:37:07 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet_mreqn(r0, 0x0, 0x0, 0x0, &(0x7f0000000400)=0x88000000) 04:37:07 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet_mreqn(r0, 0x0, 0x4, 0x0, &(0x7f0000000400)) 04:37:07 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x11, 0x2, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) sendmsg(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000380)="97622c", 0x3}], 0x1}, 0x0) getpid() ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0xffffff88, &(0x7f00000000c0)="b9ff0300290d698cb89e40f008001fffffff00004000632977", 0x0, 0x100, 0x6000000000000000}, 0x28) 04:37:07 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000002900)=[{{&(0x7f0000000040)={0xa, 0x4e21, 0x0, @remote, 0x1}, 0x1c, 0x0, 0x0, &(0x7f00000014c0)=[@dstopts_2292={{0x18}}], 0x18}}], 0x1, 0x0) 04:37:07 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000200)='ethtool\x00', 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_TSINFO_GET(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000000)={0x18, r1, 0x4c5746e8803747f3, 0x0, 0x0, {0x6}, [@HEADER={0x4}]}, 0x18}}, 0x0) 04:37:07 executing program 5: mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0xf8d351d2cbcfdcfd, 0xffffffffffffffff, 0x0) 04:37:08 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) r3 = socket$kcm(0x29, 0x7, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xa, 0x2, 0x400, 0xc}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000140), &(0x7f00000000c0), 0x1081, r4}, 0x38) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000000480), 0x8) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000006c0)=@bpf_ext={0x1c, 0x6, &(0x7f0000000100)=@raw=[@initr0, @map={0x18, 0x3, 0x1, 0x0, r4}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}], 0x0, 0x1, 0xf8, &(0x7f0000000580)=""/248, 0x0, 0x18, [], 0x0, 0x0, r5, 0x8, &(0x7f0000000500)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000680)={0x0, 0x3, 0x32c96647, 0x9}, 0x10, 0x28c14, r2}, 0x78) sendmsg$kcm(r3, &(0x7f00000004c0)={&(0x7f00000003c0)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, 0x0, 0x0, &(0x7f0000000bc0)=[{0x58, 0x0, 0x3f, "3d036b2fe1c920e033fd51a7135bc633687035d4990a07405974e24f3e4f5bc747dd8cb833517dba325fb8357ec60f4b737260519cbec967f1e58025da9b5821975edd2eb5ce0e"}, {0x120, 0xff, 0x0, "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"}, {0x20, 0x116, 0x100, "e12e82da376bca8fa03c53062e627e"}, {0x10, 0x0, 0xa11}, {0x50, 0x109, 0x0, "48dcf8c1cb65b735b2d5007004b54696aa2a8d0eb98210cf2936121163b1c0584580900f864f0ebc03ba1675bbb924fa22af1c7933e3ea0fe010eb"}, {0x40, 0x88, 0x39, "e91254173524b71a6cf4982e471433e79bae7c4a781a2a354e5dcee630a99252345f0fe48a629be09093e130c018"}], 0x238}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000002c0)='block_bio_queue\x00'}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r1, 0x12, 0x1, 0x0, 0x0}, 0x20) r6 = openat$cgroup_ro(r0, &(0x7f0000000300)='cpuset.effective_mems\x00', 0x0, 0x0) openat$cgroup_freezer_state(r6, &(0x7f0000000380)='freezer.state\x00', 0x2, 0x0) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) socket$kcm(0x2b, 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a80)={0xffffffffffffffff, 0x0, 0x67, 0x62, &(0x7f0000000840)="f99a133c46d257d5200f326d0a5562cd17685e886bf2f9b3f9a2790348e08bc05a864a96cf5d232acf4d9c795667017ab2c3fa3c298204bcf30edef2ac8db7cbfdf4deae19c3fb8efa11f5d49f040b0731924ad772daa2861563518e94c736d15a5ac7a9872008", &(0x7f00000008c0)=""/98, 0x51a, 0x0, 0x1b, 0x0, &(0x7f0000000940)="5a4fa68ec2c72f99361b9b501348d1d5bce04f26173ed66a605e0c", &(0x7f0000000980)}, 0x48) 04:37:08 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x11, 0x2, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) sendmsg(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000fefffe7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010001000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000c9be17044171e1d3d7b196d079c4d4758fa35d17c668a4b6c5f6688e15308a1f8355410c0cec9a66819ce256b8530e31ec24925095a163b9d4e76be266e31a80382240baa44e080addde36e5fdc6c42a7b3f912f6906a6e2313091dd61258a1fda45991fbdce32bebcb3ac17c5146793e6a4785ee8b60092659b941bbd694d1f8898b3e6477afbda84355dba16801c89c08c07ce144961bfbb975b726a0b59b8c79321bc8d0093979391090e0ac8666d2500dd60794bf7cb8ef212f0452eb6415435ab4e6ee740327968dbb729b75a4244ee0f031e5a093bff037d9f7f76aaa845d819fa9f8d1cb2b0d2ec20bbb74d7b35421046847281aae5b1cc0fd183f68ff1bf9af98bacf1b91cf55debb0c8c027901f949834aec6764bce8586a9470f267b12e5ad2274f22103f30e5c1a119dce8693e94b92ae72abe72127d8d23884ea84c82c9d2f5ce635d2b997b21bb82f720095064fcd956de51de721d7f9bd85fec7afc6e6a79f9101e03b356cf1bb813e646dcd43d9a71ef270e3644067cdea1848e7e55a5164a1fb7a9010912fbf136a9721fa4c84f5494a267ea72f87412708bcd54815c4a1d38a999525f3335e5c8f2c2d1f5d7872cd9fa6fd4b86f270"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000380)="97622c", 0x3}], 0x1}, 0x0) getpid() ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0xffffff88, &(0x7f00000000c0)="b9ff0300290d698cb89e40f008001fffffff00004000632977", 0x0, 0x100, 0x6000000000000000}, 0x28) 04:37:08 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080)='ethtool\x00', 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000400)={0x2c, r1, 0x1, 0x0, 0x0, {0xa}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_hsr\x00'}]}]}, 0x2c}}, 0x0) 04:37:08 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f00000089c0)=[{{&(0x7f0000000000)={0xa, 0x4e21, 0x0, @empty}, 0x1c, 0x0}}, {{0x0, 0x0, &(0x7f0000001480)=[{&(0x7f00000012c0)='c', 0x200012c1}], 0x1}}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f00000028c0)="81", 0x1}], 0x1}}], 0x3, 0xe000) 04:37:08 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000002900)=[{{&(0x7f0000000040)={0xa, 0x4e21, 0x0, @remote, 0x1}, 0x1c, 0x0, 0x0, &(0x7f00000014c0)=[@dstopts_2292={{0x18}}], 0x18}}], 0x1, 0x0) 04:37:08 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000200)='ethtool\x00', 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_TSINFO_GET(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000000)={0x18, r1, 0x4c5746e8803747f3, 0x0, 0x0, {0x6}, [@HEADER={0x4}]}, 0x18}}, 0x0) 04:37:08 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f00000050c0)={0x0, 0x0, &(0x7f0000002d80)=[{0x0}, {&(0x7f0000002a00)="9d", 0x1}, {&(0x7f0000002a80)='\a', 0x1}], 0x3}, 0x0) 04:37:08 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000002900)=[{{&(0x7f0000000040)={0xa, 0x4e21, 0x0, @remote, 0x1}, 0x1c, 0x0, 0x0, &(0x7f00000014c0)=[@dstopts_2292={{0x18}}], 0x18}}], 0x1, 0x0) 04:37:08 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x11, 0x2, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) sendmsg(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000380)="97622c", 0x3}], 0x1}, 0x0) getpid() ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0xffffff88, &(0x7f00000000c0)="b9ff0300290d698cb89e40f008001fffffff00004000632977", 0x0, 0x100, 0x6000000000000000}, 0x28) 04:37:08 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x17, 0x0, 0x2, 0x2, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x3}, 0x40) 04:37:08 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000000)=[{0x0}, {&(0x7f0000000600)=""/233, 0xe9}], 0x2}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000200), 0x43400) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40305839, &(0x7f0000000000)) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0xc028660f, &(0x7f00000005c0)=0x400000000) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x6611, 0x0) 04:37:08 executing program 2: setresuid(0x0, 0xee01, 0xffffffffffffffff) r0 = geteuid() setresuid(r0, r0, 0x0) setresuid(0xffffffffffffffff, 0x0, 0x0) 04:37:09 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) r3 = socket$kcm(0x29, 0x7, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xa, 0x2, 0x400, 0xc}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000140), &(0x7f00000000c0), 0x1081, r4}, 0x38) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000000480), 0x8) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000006c0)=@bpf_ext={0x1c, 0x6, &(0x7f0000000100)=@raw=[@initr0, @map={0x18, 0x3, 0x1, 0x0, r4}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}], 0x0, 0x1, 0xf8, &(0x7f0000000580)=""/248, 0x0, 0x18, [], 0x0, 0x0, r5, 0x8, &(0x7f0000000500)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000680)={0x0, 0x3, 0x32c96647, 0x9}, 0x10, 0x28c14, r2}, 0x78) sendmsg$kcm(r3, &(0x7f00000004c0)={&(0x7f00000003c0)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, 0x0, 0x0, &(0x7f0000000bc0)=[{0x58, 0x0, 0x3f, "3d036b2fe1c920e033fd51a7135bc633687035d4990a07405974e24f3e4f5bc747dd8cb833517dba325fb8357ec60f4b737260519cbec967f1e58025da9b5821975edd2eb5ce0e"}, {0x120, 0xff, 0x0, "66a36a9455eecacdd8c163586fbbda03204764abc3a8c9654d37d7c1a2f0137331fa2fc3c6b9c55a1cac3388716c8a76fc203090f4b9a8d9e4e4383140f03e4a858b012a4be6e9627a6c3c2cad945b7222473303ee4ad9cdf1f140621bf10baaf72506be7d90008df69e4c604be55e65d97d52d2badc2bc54195891c461c0f3500918123efc1e58ba54cee893f87f33cfef3bcb68cac978aa5771ed9240b9cf9e44c0f9dc631daaa13163c7cfa501090e5f3800ba5f26eaade9b17afd51fb7a9dee8f4b64db02d16f940369bcc3e3f6aaed6a980b9bef7f37844519af3e31b6887d4daad7bc530e9a2c04fc6f0e4717820569dbc831ef37c4bf3b8733f353ed53179f0ce0a8b9ac8c05b1b1a3f0e12"}, {0x20, 0x116, 0x100, "e12e82da376bca8fa03c53062e627e"}, {0x10, 0x0, 0xa11}, {0x50, 0x109, 0x0, "48dcf8c1cb65b735b2d5007004b54696aa2a8d0eb98210cf2936121163b1c0584580900f864f0ebc03ba1675bbb924fa22af1c7933e3ea0fe010eb"}, {0x40, 0x88, 0x39, "e91254173524b71a6cf4982e471433e79bae7c4a781a2a354e5dcee630a99252345f0fe48a629be09093e130c018"}], 0x238}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000002c0)='block_bio_queue\x00'}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r1, 0x12, 0x1, 0x0, 0x0}, 0x20) r6 = openat$cgroup_ro(r0, &(0x7f0000000300)='cpuset.effective_mems\x00', 0x0, 0x0) openat$cgroup_freezer_state(r6, &(0x7f0000000380)='freezer.state\x00', 0x2, 0x0) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) socket$kcm(0x2b, 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a80)={0xffffffffffffffff, 0x0, 0x67, 0x62, &(0x7f0000000840)="f99a133c46d257d5200f326d0a5562cd17685e886bf2f9b3f9a2790348e08bc05a864a96cf5d232acf4d9c795667017ab2c3fa3c298204bcf30edef2ac8db7cbfdf4deae19c3fb8efa11f5d49f040b0731924ad772daa2861563518e94c736d15a5ac7a9872008", &(0x7f00000008c0)=""/98, 0x51a, 0x0, 0x1b, 0x0, &(0x7f0000000940)="5a4fa68ec2c72f99361b9b501348d1d5bce04f26173ed66a605e0c", &(0x7f0000000980)}, 0x48) 04:37:09 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x11, 0x2, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) sendmsg(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000380)="97622c", 0x3}], 0x1}, 0x0) getpid() ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0xffffff88, &(0x7f00000000c0)="b9ff0300290d698cb89e40f008001fffffff00004000632977", 0x0, 0x100, 0x6000000000000000}, 0x28) 04:37:09 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000002900)=[{{&(0x7f0000000040)={0xa, 0x4e21, 0x0, @remote, 0x1}, 0x1c, 0x0, 0x0, &(0x7f00000014c0)=[@dstopts_2292={{0x18}}], 0x18}}], 0x1, 0x0) 04:37:09 executing program 5: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000100)='/dev/capi20\x00', 0x0, 0x0) ioctl$CAPI_GET_SERIAL(r0, 0xc0044306, &(0x7f0000000140)=0x5) 04:37:09 executing program 2: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPAN_DISPLAY(r0, 0x4606, &(0x7f0000000180)) 04:37:09 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000000)=[{0x0}, {&(0x7f0000000600)=""/233, 0xe9}], 0x2}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000200), 0x43400) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40305839, &(0x7f0000000000)) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0xc028660f, &(0x7f00000005c0)=0x400000000) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x6611, 0x0) 04:37:09 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x11, 0x2, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) sendmsg(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000380)="97622c", 0x3}], 0x1}, 0x0) getpid() ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0xffffff88, &(0x7f00000000c0)="b9ff0300290d698cb89e40f008001fffffff00004000632977", 0x0, 0x100, 0x6000000000000000}, 0x28) 04:37:09 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000000)=[{0x0}, {&(0x7f0000000600)=""/233, 0xe9}], 0x2}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000200), 0x43400) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40305839, &(0x7f0000000000)) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0xc028660f, &(0x7f00000005c0)=0x400000000) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x6611, 0x0) 04:37:09 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00', 0xffffffffffffffff) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)={0x28, r1, 0x1, 0x0, 0x0, {{}, {}, {0x5, 0x14, 'syz0\x00'}}}, 0x28}}, 0x0) 04:37:09 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r0, 0x89a0, &(0x7f0000000740)={'syztnl0\x00', 0x0}) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGKBDIACR(r3, 0x4b4a, &(0x7f0000001480)=""/4096) ioctl$BTRFS_IOC_ADD_DEV(0xffffffffffffffff, 0x5000940a, &(0x7f0000002480)={{r3}, "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"}) ioctl$KDGKBDIACR(r2, 0x4b4a, &(0x7f0000001480)=""/4096) ioctl$PIO_FONT(r2, 0x4b61, &(0x7f0000000040)="dcdff3a952b15999ada47ae8044439f20ac8d54743b3") ioctl$KDGKBDIACR(r1, 0x4b4a, &(0x7f0000001480)=""/4096) finit_module(r1, &(0x7f0000000000)='syztnl0\x00', 0x3) 04:37:09 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x11, 0x2, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) sendmsg(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000380)="97622c", 0x3}], 0x1}, 0x0) getpid() ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0xffffff88, &(0x7f00000000c0)="b9ff0300290d698cb89e40f008001fffffff00004000632977", 0x0, 0x100, 0x6000000000000000}, 0x28) 04:37:09 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00', 0xffffffffffffffff) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)={0x28, r1, 0x1, 0x0, 0x0, {{}, {}, {0x5, 0x14, 'syz0\x00'}}}, 0x28}}, 0x0) 04:37:10 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) r3 = socket$kcm(0x29, 0x7, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xa, 0x2, 0x400, 0xc}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000140), &(0x7f00000000c0), 0x1081, r4}, 0x38) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000000480), 0x8) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000006c0)=@bpf_ext={0x1c, 0x6, &(0x7f0000000100)=@raw=[@initr0, @map={0x18, 0x3, 0x1, 0x0, r4}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}], 0x0, 0x1, 0xf8, &(0x7f0000000580)=""/248, 0x0, 0x18, [], 0x0, 0x0, r5, 0x8, &(0x7f0000000500)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000680)={0x0, 0x3, 0x32c96647, 0x9}, 0x10, 0x28c14, r2}, 0x78) sendmsg$kcm(r3, &(0x7f00000004c0)={&(0x7f00000003c0)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, 0x0, 0x0, &(0x7f0000000bc0)=[{0x58, 0x0, 0x3f, "3d036b2fe1c920e033fd51a7135bc633687035d4990a07405974e24f3e4f5bc747dd8cb833517dba325fb8357ec60f4b737260519cbec967f1e58025da9b5821975edd2eb5ce0e"}, {0x120, 0xff, 0x0, "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"}, {0x20, 0x116, 0x100, "e12e82da376bca8fa03c53062e627e"}, {0x10, 0x0, 0xa11}, {0x68, 0x109, 0x0, "48dcf8c1cb65b735b2d5007004b54696aa2a8d0eb98210cf2936121163b1c0584580900f864f0ebc03ba1675bbb924fa22af1c7933e3ea0fe010ebefceaa2fd20e15b805012fd2d7a3e171a57996dc09dc5df4ce65f0c01e"}, {0x40, 0x88, 0x39, "e91254173524b71a6cf4982e471433e79bae7c4a781a2a354e5dcee630a99252345f0fe48a629be09093e130c018"}], 0x250}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000002c0)='block_bio_queue\x00'}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r1, 0x12, 0x1, 0x0, 0x0}, 0x20) r6 = openat$cgroup_ro(r0, &(0x7f0000000300)='cpuset.effective_mems\x00', 0x0, 0x0) openat$cgroup_freezer_state(r6, &(0x7f0000000380)='freezer.state\x00', 0x2, 0x0) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) socket$kcm(0x2b, 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a80)={0xffffffffffffffff, 0x0, 0x67, 0x62, &(0x7f0000000840)="f99a133c46d257d5200f326d0a5562cd17685e886bf2f9b3f9a2790348e08bc05a864a96cf5d232acf4d9c795667017ab2c3fa3c298204bcf30edef2ac8db7cbfdf4deae19c3fb8efa11f5d49f040b0731924ad772daa2861563518e94c736d15a5ac7a9872008", &(0x7f00000008c0)=""/98, 0x51a, 0x0, 0x1b, 0x0, &(0x7f0000000940)="5a4fa68ec2c72f99361b9b501348d1d5bce04f26173ed66a605e0c", &(0x7f0000000980)}, 0x48) 04:37:10 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00', 0xffffffffffffffff) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)={0x28, r1, 0x1, 0x0, 0x0, {{}, {}, {0x5, 0x14, 'syz0\x00'}}}, 0x28}}, 0x0) 04:37:10 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x11, 0x2, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) sendmsg(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000380)="97622c", 0x3}], 0x1}, 0x0) getpid() ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0xffffff88, &(0x7f00000000c0)="b9ff0300290d698cb89e40f008001fffffff00004000632977", 0x0, 0x100, 0x6000000000000000}, 0x28) 04:37:10 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=@getneightbl={0x14, 0x42, 0x1}, 0x14}}, 0x0) 04:37:10 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r0, 0x89a0, &(0x7f0000000740)={'syztnl0\x00', 0x0}) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGKBDIACR(r3, 0x4b4a, &(0x7f0000001480)=""/4096) ioctl$BTRFS_IOC_ADD_DEV(0xffffffffffffffff, 0x5000940a, &(0x7f0000002480)={{r3}, "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"}) ioctl$KDGKBDIACR(r2, 0x4b4a, &(0x7f0000001480)=""/4096) ioctl$PIO_FONT(r2, 0x4b61, &(0x7f0000000040)="dcdff3a952b15999ada47ae8044439f20ac8d54743b3") ioctl$KDGKBDIACR(r1, 0x4b4a, &(0x7f0000001480)=""/4096) finit_module(r1, &(0x7f0000000000)='syztnl0\x00', 0x3) 04:37:10 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000000)=[{0x0}, {&(0x7f0000000600)=""/233, 0xe9}], 0x2}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000200), 0x43400) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40305839, &(0x7f0000000000)) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0xc028660f, &(0x7f00000005c0)=0x400000000) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x6611, 0x0) 04:37:10 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r0, 0x89a0, &(0x7f0000000740)={'syztnl0\x00', 0x0}) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGKBDIACR(r3, 0x4b4a, &(0x7f0000001480)=""/4096) ioctl$BTRFS_IOC_ADD_DEV(0xffffffffffffffff, 0x5000940a, &(0x7f0000002480)={{r3}, "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"}) ioctl$KDGKBDIACR(r2, 0x4b4a, &(0x7f0000001480)=""/4096) ioctl$PIO_FONT(r2, 0x4b61, &(0x7f0000000040)="dcdff3a952b15999ada47ae8044439f20ac8d54743b3") ioctl$KDGKBDIACR(r1, 0x4b4a, &(0x7f0000001480)=""/4096) finit_module(r1, &(0x7f0000000000)='syztnl0\x00', 0x3) 04:37:10 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x11, 0x2, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) sendmsg(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000380)="97622c", 0x3}], 0x1}, 0x0) getpid() ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0xffffff88, &(0x7f00000000c0)="b9ff0300290d698cb89e40f008001fffffff00004000632977", 0x0, 0x100, 0x6000000000000000}, 0x28) 04:37:10 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00', 0xffffffffffffffff) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)={0x28, r1, 0x1, 0x0, 0x0, {{}, {}, {0x5, 0x14, 'syz0\x00'}}}, 0x28}}, 0x0) 04:37:10 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x11, 0x2, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) sendmsg(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000380)="97622c", 0x3}], 0x1}, 0x0) getpid() ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0xffffff88, &(0x7f00000000c0)="b9ff0300290d698cb89e40f008001fffffff00004000632977", 0x0, 0x100, 0x6000000000000000}, 0x28) 04:37:10 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)={0x28, 0x0, 0x1, 0x0, 0x0, {{}, {}, {0x5, 0x14, 'syz0\x00'}}}, 0x28}}, 0x0) 04:37:10 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0xe43) r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) [ 515.396598][T21674] netlink: 'syz-executor.5': attribute type 11 has an invalid length. [ 515.409560][T21674] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.5'. 04:37:11 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) r3 = socket$kcm(0x29, 0x7, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xa, 0x2, 0x400, 0xc}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000140), &(0x7f00000000c0), 0x1081, r4}, 0x38) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000000480), 0x8) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000006c0)=@bpf_ext={0x1c, 0x6, &(0x7f0000000100)=@raw=[@initr0, @map={0x18, 0x3, 0x1, 0x0, r4}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}], 0x0, 0x1, 0xf8, &(0x7f0000000580)=""/248, 0x0, 0x18, [], 0x0, 0x0, r5, 0x8, &(0x7f0000000500)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000680)={0x0, 0x3, 0x32c96647, 0x9}, 0x10, 0x28c14, r2}, 0x78) sendmsg$kcm(r3, &(0x7f00000004c0)={&(0x7f00000003c0)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, 0x0, 0x0, &(0x7f0000000bc0)=[{0x58, 0x0, 0x3f, "3d036b2fe1c920e033fd51a7135bc633687035d4990a07405974e24f3e4f5bc747dd8cb833517dba325fb8357ec60f4b737260519cbec967f1e58025da9b5821975edd2eb5ce0e"}, {0x120, 0xff, 0x0, "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"}, {0x20, 0x116, 0x100, "e12e82da376bca8fa03c53062e627e"}, {0x10, 0x0, 0xa11}, {0x68, 0x109, 0x0, "48dcf8c1cb65b735b2d5007004b54696aa2a8d0eb98210cf2936121163b1c0584580900f864f0ebc03ba1675bbb924fa22af1c7933e3ea0fe010ebefceaa2fd20e15b805012fd2d7a3e171a57996dc09dc5df4ce65f0c01e"}, {0x40, 0x88, 0x39, "e91254173524b71a6cf4982e471433e79bae7c4a781a2a354e5dcee630a99252345f0fe48a629be09093e130c018"}], 0x250}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000002c0)='block_bio_queue\x00'}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r1, 0x12, 0x1, 0x0, 0x0}, 0x20) r6 = openat$cgroup_ro(r0, &(0x7f0000000300)='cpuset.effective_mems\x00', 0x0, 0x0) openat$cgroup_freezer_state(r6, &(0x7f0000000380)='freezer.state\x00', 0x2, 0x0) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) socket$kcm(0x2b, 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a80)={0xffffffffffffffff, 0x0, 0x67, 0x62, &(0x7f0000000840)="f99a133c46d257d5200f326d0a5562cd17685e886bf2f9b3f9a2790348e08bc05a864a96cf5d232acf4d9c795667017ab2c3fa3c298204bcf30edef2ac8db7cbfdf4deae19c3fb8efa11f5d49f040b0731924ad772daa2861563518e94c736d15a5ac7a9872008", &(0x7f00000008c0)=""/98, 0x51a, 0x0, 0x1b, 0x0, &(0x7f0000000940)="5a4fa68ec2c72f99361b9b501348d1d5bce04f26173ed66a605e0c", &(0x7f0000000980)}, 0x48) 04:37:11 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)={0x28, 0x0, 0x1, 0x0, 0x0, {{}, {}, {0x5, 0x14, 'syz0\x00'}}}, 0x28}}, 0x0) 04:37:11 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x11, 0x2, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) sendmsg(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000380)="97622c", 0x3}], 0x1}, 0x0) getpid() ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0xffffff88, &(0x7f00000000c0)="b9ff0300290d698cb89e40f008001fffffff00004000632977", 0x0, 0x100, 0x6000000000000000}, 0x28) 04:37:11 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r0, 0x40405515, &(0x7f0000000140)={{0x0, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:37:11 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0xe43) r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) 04:37:11 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000000)=[{0x0}, {&(0x7f0000000600)=""/233, 0xe9}], 0x2}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000200), 0x43400) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40305839, &(0x7f0000000000)) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0xc028660f, &(0x7f00000005c0)=0x400000000) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x6611, 0x0) 04:37:11 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x11, 0x2, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) sendmsg(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000fefffe7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010001000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000c9be17044171e1d3d7b196d079c4d4758fa35d17c668a4b6c5f6688e15308a1f8355410c0cec9a66819ce256b8530e31ec24925095a163b9d4e76be266e31a80382240baa44e080addde36e5fdc6c42a7b3f912f6906a6e2313091dd61258a1fda45991fbdce32bebcb3ac17c5146793e6a4785ee8b60092659b941bbd694d1f8898b3e6477afbda84355dba16801c89c08c07ce144961bfbb975b726a0b59b8c79321bc8d0093979391090e0ac8666d2500dd60794bf7cb8ef212f0452eb6415435ab4e6ee740327968dbb729b75a4244ee0f031e5a093bff037d9f7f76aaa845d819fa9f8d1cb2b0d2ec20bbb74d7b35421046847281aae5b1cc0fd183f68ff1bf9af98bacf1b91cf55debb0c8c027901f949834aec6764bce8586a9470f267b12e5ad2274f22103f30e5c1a119dce8693e94b92ae72abe72127d8d23884ea84c82c9d2f5ce635d2b997b21bb82f720095064fcd956de51de721d7f9bd85fec7afc6e6a79f9101e03b356cf1bb813e646dcd43d9a71ef270e3644067cdea1848e7e55a5164a1fb7a9010912fbf136a9721fa4c84f5494a267ea72f87412708bcd54815c4a1d38a999525f3335e5c8f2c2d1f5d7872cd9fa6fd4b86f2706048deb9588df7"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000380)="97622c", 0x3}], 0x1}, 0x0) getpid() ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0xffffff88, &(0x7f00000000c0)="b9ff0300290d698cb89e40f008001fffffff00004000632977", 0x0, 0x100, 0x6000000000000000}, 0x28) 04:37:11 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)={0x28, 0x0, 0x1, 0x0, 0x0, {{}, {}, {0x5, 0x14, 'syz0\x00'}}}, 0x28}}, 0x0) [ 516.023820][T21692] netlink: 'syz-executor.5': attribute type 11 has an invalid length. [ 516.053747][T21692] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.5'. 04:37:11 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0xe43) r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) 04:37:11 executing program 4: r0 = syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00', 0xffffffffffffffff) sendmsg$TIPC_CMD_SHOW_LINK_STATS(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)={0x28, r0, 0x1, 0x0, 0x0, {{}, {}, {0x5, 0x14, 'syz0\x00'}}}, 0x28}}, 0x0) 04:37:11 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x11, 0x2, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) sendmsg(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000fefffe7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010001000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000c9be17044171e1d3d7b196d079c4d4758fa35d17c668a4b6c5f6688e15308a1f8355410c0cec9a66819ce256b8530e31ec24925095a163b9d4e76be266e31a80382240baa44e080addde36e5fdc6c42a7b3f912f6906a6e2313091dd61258a1fda45991fbdce32bebcb3ac17c5146793e6a4785ee8b60092659b941bbd694d1f8898b3e6477afbda84355dba16801c89c08c07ce144961bfbb975b726a0b59b8c79321bc8d0093979391090e0ac8666d2500dd60794bf7cb8ef212f0452eb6415435ab4e6ee740327968dbb729b75a4244ee0f031e5a093bff037d9f7f76aaa845d819fa9f8d1cb2b0d2ec20bbb74d7b35421046847281aae5b1cc0fd183f68ff1bf9af98bacf1b91cf55debb0c8c027901f949834aec6764bce8586a9470f267b12e5ad2274f22103f30e5c1a119dce8693e94b92ae72abe72127d8d23884ea84c82c9d2f5ce635d2b997b21bb82f720095064fcd956de51de721d7f9bd85fec7afc6e6a79f9101e03b356cf1bb813e646dcd43d9a71ef270e3644067cdea1848e7e55a5164a1fb7a9010912fbf136a9721fa4c84f5494a267ea72f87412708bcd54815c4a1d38a999525f3335e5c8f2c2d1f5d7872cd9fa6fd4b86f2706048deb9588df7"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000380)="97622c", 0x3}], 0x1}, 0x0) getpid() ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0xffffff88, &(0x7f00000000c0)="b9ff0300290d698cb89e40f008001fffffff00004000632977", 0x0, 0x100, 0x6000000000000000}, 0x28) 04:37:12 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0xe43) r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) [ 516.444100][T21714] netlink: 'syz-executor.2': attribute type 11 has an invalid length. [ 516.556131][T21714] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.2'. [ 516.887651][T21721] netlink: 'syz-executor.5': attribute type 11 has an invalid length. [ 516.897714][T21721] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.5'. 04:37:12 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) r3 = socket$kcm(0x29, 0x7, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xa, 0x2, 0x400, 0xc}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000140), &(0x7f00000000c0), 0x1081, r4}, 0x38) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000000480), 0x8) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000006c0)=@bpf_ext={0x1c, 0x6, &(0x7f0000000100)=@raw=[@initr0, @map={0x18, 0x3, 0x1, 0x0, r4}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}], 0x0, 0x1, 0xf8, &(0x7f0000000580)=""/248, 0x0, 0x18, [], 0x0, 0x0, r5, 0x8, &(0x7f0000000500)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000680)={0x0, 0x3, 0x32c96647, 0x9}, 0x10, 0x28c14, r2}, 0x78) sendmsg$kcm(r3, &(0x7f00000004c0)={&(0x7f00000003c0)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, 0x0, 0x0, &(0x7f0000000bc0)=[{0x58, 0x0, 0x3f, "3d036b2fe1c920e033fd51a7135bc633687035d4990a07405974e24f3e4f5bc747dd8cb833517dba325fb8357ec60f4b737260519cbec967f1e58025da9b5821975edd2eb5ce0e"}, {0x120, 0xff, 0x0, "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"}, {0x20, 0x116, 0x100, "e12e82da376bca8fa03c53062e627e"}, {0x10, 0x0, 0xa11}, {0x68, 0x109, 0x0, "48dcf8c1cb65b735b2d5007004b54696aa2a8d0eb98210cf2936121163b1c0584580900f864f0ebc03ba1675bbb924fa22af1c7933e3ea0fe010ebefceaa2fd20e15b805012fd2d7a3e171a57996dc09dc5df4ce65f0c01e"}, {0x40, 0x88, 0x39, "e91254173524b71a6cf4982e471433e79bae7c4a781a2a354e5dcee630a99252345f0fe48a629be09093e130c018"}], 0x250}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000002c0)='block_bio_queue\x00'}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r1, 0x12, 0x1, 0x0, 0x0}, 0x20) r6 = openat$cgroup_ro(r0, &(0x7f0000000300)='cpuset.effective_mems\x00', 0x0, 0x0) openat$cgroup_freezer_state(r6, &(0x7f0000000380)='freezer.state\x00', 0x2, 0x0) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) socket$kcm(0x2b, 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a80)={0xffffffffffffffff, 0x0, 0x67, 0x62, &(0x7f0000000840)="f99a133c46d257d5200f326d0a5562cd17685e886bf2f9b3f9a2790348e08bc05a864a96cf5d232acf4d9c795667017ab2c3fa3c298204bcf30edef2ac8db7cbfdf4deae19c3fb8efa11f5d49f040b0731924ad772daa2861563518e94c736d15a5ac7a9872008", &(0x7f00000008c0)=""/98, 0x51a, 0x0, 0x1b, 0x0, &(0x7f0000000940)="5a4fa68ec2c72f99361b9b501348d1d5bce04f26173ed66a605e0c", &(0x7f0000000980)}, 0x48) 04:37:12 executing program 4: r0 = syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00', 0xffffffffffffffff) sendmsg$TIPC_CMD_SHOW_LINK_STATS(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)={0x28, r0, 0x1, 0x0, 0x0, {{}, {}, {0x5, 0x14, 'syz0\x00'}}}, 0x28}}, 0x0) 04:37:12 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x11, 0x2, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) sendmsg(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000380)="97622c", 0x3}], 0x1}, 0x0) getpid() ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0xffffff88, &(0x7f00000000c0)="b9ff0300290d698cb89e40f008001fffffff00004000632977", 0x0, 0x100, 0x6000000000000000}, 0x28) 04:37:12 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000000)=[{0x0}, {&(0x7f0000000600)=""/233, 0xe9}], 0x2}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000200), 0x43400) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40305839, &(0x7f0000000000)) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0xc028660f, &(0x7f00000005c0)=0x400000000) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x6611, 0x0) 04:37:12 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0xe43) r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) 04:37:12 executing program 2: mount$fuse(0x0, 0x0, &(0x7f0000002180)='fuse\x00', 0x0, 0x0) getgid() read$FUSE(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$vxfs(&(0x7f00000127c0)='vxfs\x00', &(0x7f0000012800)='./file0\x00', 0x800, 0x2, &(0x7f0000012980)=[{&(0x7f0000012880)}, {0x0, 0x0, 0xfffffffffffffffe}], 0x4000, &(0x7f0000012a00)={[{'}'}]}) 04:37:12 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x11, 0x2, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) sendmsg(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000380)="97622c", 0x3}], 0x1}, 0x0) getpid() ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0xffffff88, &(0x7f00000000c0)="b9ff0300290d698cb89e40f008001fffffff00004000632977", 0x0, 0x100, 0x6000000000000000}, 0x28) 04:37:12 executing program 4: r0 = syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00', 0xffffffffffffffff) sendmsg$TIPC_CMD_SHOW_LINK_STATS(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)={0x28, r0, 0x1, 0x0, 0x0, {{}, {}, {0x5, 0x14, 'syz0\x00'}}}, 0x28}}, 0x0) [ 517.179577][T21746] netlink: 'syz-executor.5': attribute type 11 has an invalid length. [ 517.189025][T21749] loop2: detected capacity change from 0 to 16383 [ 517.207986][T21746] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.5'. [ 517.242749][T21749] vxfs: WRONG superblock magic 00000000 at 1 [ 517.297758][T21749] vxfs: WRONG superblock magic 00000000 at 8 04:37:13 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x11, 0x2, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) sendmsg(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000380)="97622c", 0x3}], 0x1}, 0x0) getpid() ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0xffffff88, &(0x7f00000000c0)="b9ff0300290d698cb89e40f008001fffffff00004000632977", 0x0, 0x100, 0x6000000000000000}, 0x28) [ 517.351308][T21749] vxfs: can't find superblock. 04:37:13 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(0x0, 0xffffffffffffffff) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)={0x28, r1, 0x1, 0x0, 0x0, {{}, {}, {0x5, 0x14, 'syz0\x00'}}}, 0x28}}, 0x0) 04:37:13 executing program 5: r0 = socket$phonet_pipe(0x23, 0x5, 0x2) sendmmsg(r0, &(0x7f0000006840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 04:37:13 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000000)=[{0x0}, {&(0x7f0000000600)=""/233, 0xe9}], 0x2}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000200), 0x43400) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40305839, &(0x7f0000000000)) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0xc028660f, &(0x7f00000005c0)=0x400000000) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x6611, 0x0) 04:37:13 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) r3 = socket$kcm(0x29, 0x7, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xa, 0x2, 0x400, 0xc}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000140), &(0x7f00000000c0), 0x1081, r4}, 0x38) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000000480), 0x8) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000006c0)=@bpf_ext={0x1c, 0x6, &(0x7f0000000100)=@raw=[@initr0, @map={0x18, 0x3, 0x1, 0x0, r4}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}], 0x0, 0x1, 0xf8, &(0x7f0000000580)=""/248, 0x0, 0x18, [], 0x0, 0x0, r5, 0x8, &(0x7f0000000500)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000680)={0x0, 0x3, 0x32c96647, 0x9}, 0x10, 0x28c14, r2}, 0x78) sendmsg$kcm(r3, &(0x7f00000004c0)={&(0x7f00000003c0)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, 0x0, 0x0, &(0x7f0000000bc0)=[{0x58, 0x0, 0x3f, "3d036b2fe1c920e033fd51a7135bc633687035d4990a07405974e24f3e4f5bc747dd8cb833517dba325fb8357ec60f4b737260519cbec967f1e58025da9b5821975edd2eb5ce0e"}, {0x120, 0xff, 0x0, "66a36a9455eecacdd8c163586fbbda03204764abc3a8c9654d37d7c1a2f0137331fa2fc3c6b9c55a1cac3388716c8a76fc203090f4b9a8d9e4e4383140f03e4a858b012a4be6e9627a6c3c2cad945b7222473303ee4ad9cdf1f140621bf10baaf72506be7d90008df69e4c604be55e65d97d52d2badc2bc54195891c461c0f3500918123efc1e58ba54cee893f87f33cfef3bcb68cac978aa5771ed9240b9cf9e44c0f9dc631daaa13163c7cfa501090e5f3800ba5f26eaade9b17afd51fb7a9dee8f4b64db02d16f940369bcc3e3f6aaed6a980b9bef7f37844519af3e31b6887d4daad7bc530e9a2c04fc6f0e4717820569dbc831ef37c4bf3b8733f353ed53179f0ce0a8b9ac8c05b1b1a3f0e12"}, {0x20, 0x116, 0x100, "e12e82da376bca8fa03c53062e627e"}, {0x10, 0x0, 0xa11}, {0x78, 0x109, 0x0, "48dcf8c1cb65b735b2d5007004b54696aa2a8d0eb98210cf2936121163b1c0584580900f864f0ebc03ba1675bbb924fa22af1c7933e3ea0fe010ebefceaa2fd20e15b805012fd2d7a3e171a57996dc09dc5df4ce65f0c01e583247522e22d559c831115bca323a"}, {0x40, 0x88, 0x39, "e91254173524b71a6cf4982e471433e79bae7c4a781a2a354e5dcee630a99252345f0fe48a629be09093e130c018"}], 0x260}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000002c0)='block_bio_queue\x00'}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r1, 0x12, 0x1, 0x0, 0x0}, 0x20) r6 = openat$cgroup_ro(r0, &(0x7f0000000300)='cpuset.effective_mems\x00', 0x0, 0x0) openat$cgroup_freezer_state(r6, &(0x7f0000000380)='freezer.state\x00', 0x2, 0x0) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) socket$kcm(0x2b, 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a80)={0xffffffffffffffff, 0x0, 0x67, 0x62, &(0x7f0000000840)="f99a133c46d257d5200f326d0a5562cd17685e886bf2f9b3f9a2790348e08bc05a864a96cf5d232acf4d9c795667017ab2c3fa3c298204bcf30edef2ac8db7cbfdf4deae19c3fb8efa11f5d49f040b0731924ad772daa2861563518e94c736d15a5ac7a9872008", &(0x7f00000008c0)=""/98, 0x51a, 0x0, 0x1b, 0x0, &(0x7f0000000940)="5a4fa68ec2c72f99361b9b501348d1d5bce04f26173ed66a605e0c", &(0x7f0000000980)}, 0x48) 04:37:13 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x11, 0x2, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) sendmsg(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000380)="97622c", 0x3}], 0x1}, 0x0) getpid() ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0xffffff88, &(0x7f00000000c0)="b9ff0300290d698cb89e40f008001fffffff00004000632977", 0x0, 0x100, 0x6000000000000000}, 0x28) 04:37:13 executing program 2: mount$fuse(0x0, 0x0, &(0x7f0000002180)='fuse\x00', 0x0, 0x0) getgid() read$FUSE(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$vxfs(&(0x7f00000127c0)='vxfs\x00', &(0x7f0000012800)='./file0\x00', 0x800, 0x2, &(0x7f0000012980)=[{&(0x7f0000012880)}, {0x0, 0x0, 0xfffffffffffffffe}], 0x4000, &(0x7f0000012a00)={[{'}'}]}) 04:37:13 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(0x0, 0xffffffffffffffff) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)={0x28, r1, 0x1, 0x0, 0x0, {{}, {}, {0x5, 0x14, 'syz0\x00'}}}, 0x28}}, 0x0) 04:37:13 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_buf(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)) 04:37:13 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000000)=[{0x0}, {&(0x7f0000000600)=""/233, 0xe9}], 0x2}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000200), 0x43400) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40305839, &(0x7f0000000000)) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0xc028660f, &(0x7f00000005c0)=0x400000000) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x6611, 0x0) 04:37:13 executing program 5: pipe(&(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) io_submit(0x0, 0x1, &(0x7f0000001640)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}]) 04:37:13 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(0x0, 0xffffffffffffffff) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)={0x28, r1, 0x1, 0x0, 0x0, {{}, {}, {0x5, 0x14, 'syz0\x00'}}}, 0x28}}, 0x0) 04:37:13 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x11, 0x2, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) sendmsg(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000380)="97622c", 0x3}], 0x1}, 0x0) getpid() ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0xffffff88, &(0x7f00000000c0)="b9ff0300290d698cb89e40f008001fffffff00004000632977", 0x0, 0x100, 0x6000000000000000}, 0x28) [ 518.160923][T21792] loop2: detected capacity change from 0 to 16383 [ 518.220750][T21792] vxfs: WRONG superblock magic 00000000 at 1 04:37:13 executing program 4: socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00', 0xffffffffffffffff) sendmsg$TIPC_CMD_SHOW_LINK_STATS(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)={0x28, r0, 0x1, 0x0, 0x0, {{}, {}, {0x5, 0x14, 'syz0\x00'}}}, 0x28}}, 0x0) 04:37:13 executing program 5: mknodat$loop(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0, 0x1) [ 518.274781][T21792] vxfs: WRONG superblock magic 00000000 at 8 04:37:14 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x11, 0x2, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) sendmsg(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000380)="97622c", 0x3}], 0x1}, 0x0) getpid() ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0xffffff88, &(0x7f00000000c0)="b9ff0300290d698cb89e40f008001fffffff00004000632977", 0x0, 0x100, 0x6000000000000000}, 0x28) [ 518.334966][T21792] vxfs: can't find superblock. 04:37:14 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) r3 = socket$kcm(0x29, 0x7, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xa, 0x2, 0x400, 0xc}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000140), &(0x7f00000000c0), 0x1081, r4}, 0x38) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000000480), 0x8) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000006c0)=@bpf_ext={0x1c, 0x6, &(0x7f0000000100)=@raw=[@initr0, @map={0x18, 0x3, 0x1, 0x0, r4}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}], 0x0, 0x1, 0xf8, &(0x7f0000000580)=""/248, 0x0, 0x18, [], 0x0, 0x0, r5, 0x8, &(0x7f0000000500)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000680)={0x0, 0x3, 0x32c96647, 0x9}, 0x10, 0x28c14, r2}, 0x78) sendmsg$kcm(r3, &(0x7f00000004c0)={&(0x7f00000003c0)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, 0x0, 0x0, &(0x7f0000000bc0)=[{0x58, 0x0, 0x3f, "3d036b2fe1c920e033fd51a7135bc633687035d4990a07405974e24f3e4f5bc747dd8cb833517dba325fb8357ec60f4b737260519cbec967f1e58025da9b5821975edd2eb5ce0e"}, {0x120, 0xff, 0x0, "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"}, {0x20, 0x116, 0x100, "e12e82da376bca8fa03c53062e627e"}, {0x10, 0x0, 0xa11}, {0x78, 0x109, 0x0, "48dcf8c1cb65b735b2d5007004b54696aa2a8d0eb98210cf2936121163b1c0584580900f864f0ebc03ba1675bbb924fa22af1c7933e3ea0fe010ebefceaa2fd20e15b805012fd2d7a3e171a57996dc09dc5df4ce65f0c01e583247522e22d559c831115bca323a"}, {0x40, 0x88, 0x39, "e91254173524b71a6cf4982e471433e79bae7c4a781a2a354e5dcee630a99252345f0fe48a629be09093e130c018"}], 0x260}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000002c0)='block_bio_queue\x00'}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r1, 0x12, 0x1, 0x0, 0x0}, 0x20) r6 = openat$cgroup_ro(r0, &(0x7f0000000300)='cpuset.effective_mems\x00', 0x0, 0x0) openat$cgroup_freezer_state(r6, &(0x7f0000000380)='freezer.state\x00', 0x2, 0x0) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) socket$kcm(0x2b, 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a80)={0xffffffffffffffff, 0x0, 0x67, 0x62, &(0x7f0000000840)="f99a133c46d257d5200f326d0a5562cd17685e886bf2f9b3f9a2790348e08bc05a864a96cf5d232acf4d9c795667017ab2c3fa3c298204bcf30edef2ac8db7cbfdf4deae19c3fb8efa11f5d49f040b0731924ad772daa2861563518e94c736d15a5ac7a9872008", &(0x7f00000008c0)=""/98, 0x51a, 0x0, 0x1b, 0x0, &(0x7f0000000940)="5a4fa68ec2c72f99361b9b501348d1d5bce04f26173ed66a605e0c", &(0x7f0000000980)}, 0x48) 04:37:14 executing program 4: socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00', 0xffffffffffffffff) sendmsg$TIPC_CMD_SHOW_LINK_STATS(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)={0x28, r0, 0x1, 0x0, 0x0, {{}, {}, {0x5, 0x14, 'syz0\x00'}}}, 0x28}}, 0x0) 04:37:14 executing program 5: pipe(&(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) pwritev2(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 04:37:14 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x11, 0x2, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) sendmsg(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000380)="97622c", 0x3}], 0x1}, 0x0) getpid() ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0xffffff88, &(0x7f00000000c0)="b9ff0300290d698cb89e40f008001fffffff00004000632977", 0x0, 0x100, 0x6000000000000000}, 0x28) 04:37:14 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000000)=[{0x0}, {&(0x7f0000000600)=""/233, 0xe9}], 0x2}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000200), 0x43400) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40305839, &(0x7f0000000000)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x6611, 0x0) 04:37:14 executing program 2: mount$fuse(0x0, 0x0, &(0x7f0000002180)='fuse\x00', 0x0, 0x0) getgid() read$FUSE(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$vxfs(&(0x7f00000127c0)='vxfs\x00', &(0x7f0000012800)='./file0\x00', 0x800, 0x2, &(0x7f0000012980)=[{&(0x7f0000012880)}, {0x0, 0x0, 0xfffffffffffffffe}], 0x4000, &(0x7f0000012a00)={[{'}'}]}) 04:37:14 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(r0, &(0x7f0000000080)='trusted.overlay.origin\x00', 0x0, 0x0, 0x3) 04:37:14 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x11, 0x2, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) sendmsg(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000380)="97622c", 0x3}], 0x1}, 0x0) getpid() ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0xffffff88, &(0x7f00000000c0)="b9ff0300290d698cb89e40f008001fffffff00004000632977", 0x0, 0x100, 0x6000000000000000}, 0x28) 04:37:14 executing program 4: socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00', 0xffffffffffffffff) sendmsg$TIPC_CMD_SHOW_LINK_STATS(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)={0x28, r0, 0x1, 0x0, 0x0, {{}, {}, {0x5, 0x14, 'syz0\x00'}}}, 0x28}}, 0x0) [ 519.021095][T21825] loop2: detected capacity change from 0 to 16383 [ 519.089040][T21825] vxfs: WRONG superblock magic 00000000 at 1 04:37:14 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00', 0xffffffffffffffff) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, 0x0, 0x0) 04:37:14 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x11, 0x2, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) sendmsg(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000380)="97622c", 0x3}], 0x1}, 0x0) getpid() ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0xffffff88, &(0x7f00000000c0)="b9ff0300290d698cb89e40f008001fffffff00004000632977", 0x0, 0x100, 0x6000000000000000}, 0x28) 04:37:14 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_group_source_req(r0, 0x0, 0x2f, &(0x7f00000010c0)={0x0, {{0x2, 0x0, @loopback}}, {{0x2, 0x0, @multicast2}}}, 0x108) [ 519.137477][T21825] vxfs: WRONG superblock magic 00000000 at 8 [ 519.197896][T21825] vxfs: can't find superblock. 04:37:15 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) r3 = socket$kcm(0x29, 0x7, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xa, 0x2, 0x400, 0xc}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000140), &(0x7f00000000c0), 0x1081, r4}, 0x38) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000000480), 0x8) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000006c0)=@bpf_ext={0x1c, 0x6, &(0x7f0000000100)=@raw=[@initr0, @map={0x18, 0x3, 0x1, 0x0, r4}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}], 0x0, 0x1, 0xf8, &(0x7f0000000580)=""/248, 0x0, 0x18, [], 0x0, 0x0, r5, 0x8, &(0x7f0000000500)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000680)={0x0, 0x3, 0x32c96647, 0x9}, 0x10, 0x28c14, r2}, 0x78) sendmsg$kcm(r3, &(0x7f00000004c0)={&(0x7f00000003c0)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, 0x0, 0x0, &(0x7f0000000bc0)=[{0x58, 0x0, 0x3f, "3d036b2fe1c920e033fd51a7135bc633687035d4990a07405974e24f3e4f5bc747dd8cb833517dba325fb8357ec60f4b737260519cbec967f1e58025da9b5821975edd2eb5ce0e"}, {0x120, 0xff, 0x0, "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"}, {0x20, 0x116, 0x100, "e12e82da376bca8fa03c53062e627e"}, {0x10, 0x0, 0xa11}, {0x78, 0x109, 0x0, "48dcf8c1cb65b735b2d5007004b54696aa2a8d0eb98210cf2936121163b1c0584580900f864f0ebc03ba1675bbb924fa22af1c7933e3ea0fe010ebefceaa2fd20e15b805012fd2d7a3e171a57996dc09dc5df4ce65f0c01e583247522e22d559c831115bca323a"}, {0x40, 0x88, 0x39, "e91254173524b71a6cf4982e471433e79bae7c4a781a2a354e5dcee630a99252345f0fe48a629be09093e130c018"}], 0x260}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000002c0)='block_bio_queue\x00'}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r1, 0x12, 0x1, 0x0, 0x0}, 0x20) r6 = openat$cgroup_ro(r0, &(0x7f0000000300)='cpuset.effective_mems\x00', 0x0, 0x0) openat$cgroup_freezer_state(r6, &(0x7f0000000380)='freezer.state\x00', 0x2, 0x0) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) socket$kcm(0x2b, 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a80)={0xffffffffffffffff, 0x0, 0x67, 0x62, &(0x7f0000000840)="f99a133c46d257d5200f326d0a5562cd17685e886bf2f9b3f9a2790348e08bc05a864a96cf5d232acf4d9c795667017ab2c3fa3c298204bcf30edef2ac8db7cbfdf4deae19c3fb8efa11f5d49f040b0731924ad772daa2861563518e94c736d15a5ac7a9872008", &(0x7f00000008c0)=""/98, 0x51a, 0x0, 0x1b, 0x0, &(0x7f0000000940)="5a4fa68ec2c72f99361b9b501348d1d5bce04f26173ed66a605e0c", &(0x7f0000000980)}, 0x48) 04:37:15 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00', 0xffffffffffffffff) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, 0x0, 0x0) 04:37:15 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x11, 0x2, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) sendmsg(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) getpid() ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0xffffff88, &(0x7f00000000c0)="b9ff0300290d698cb89e40f008001fffffff00004000632977", 0x0, 0x100, 0x6000000000000000}, 0x28) 04:37:15 executing program 5: r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_congestion_control\x00', 0x1, 0x0) fsetxattr(r0, &(0x7f0000000040)=ANY=[], 0x0, 0x0, 0x0) 04:37:15 executing program 2: mount$fuse(0x0, 0x0, &(0x7f0000002180)='fuse\x00', 0x0, 0x0) getgid() read$FUSE(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$vxfs(&(0x7f00000127c0)='vxfs\x00', &(0x7f0000012800)='./file0\x00', 0x800, 0x2, &(0x7f0000012980)=[{&(0x7f0000012880)}, {0x0, 0x0, 0xfffffffffffffffe}], 0x4000, &(0x7f0000012a00)={[{'}'}]}) 04:37:15 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000000)=[{0x0}, {&(0x7f0000000600)=""/233, 0xe9}], 0x2}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000200), 0x43400) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40305839, &(0x7f0000000000)) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x6611, 0x0) 04:37:15 executing program 5: r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_congestion_control\x00', 0x1, 0x0) fsetxattr(r0, &(0x7f0000000040)=ANY=[], 0x0, 0x0, 0x0) [ 519.889815][T21858] loop2: detected capacity change from 0 to 16383 04:37:15 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00', 0xffffffffffffffff) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, 0x0, 0x0) [ 519.935208][T21858] vxfs: WRONG superblock magic 00000000 at 1 [ 519.991045][T21858] vxfs: WRONG superblock magic 00000000 at 8 [ 520.051945][T21858] vxfs: can't find superblock. 04:37:15 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x11, 0x2, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) sendmsg(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) getpid() ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0xffffff88, &(0x7f00000000c0)="b9ff0300290d698cb89e40f008001fffffff00004000632977", 0x0, 0x100, 0x6000000000000000}, 0x28) 04:37:15 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000000)=[{0x0}, {&(0x7f0000000600)=""/233, 0xe9}], 0x2}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000200), 0x43400) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40305839, &(0x7f0000000000)) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x6611, 0x0) 04:37:15 executing program 5: r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_congestion_control\x00', 0x1, 0x0) fsetxattr(r0, &(0x7f0000000040)=ANY=[], 0x0, 0x0, 0x0) 04:37:15 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00', 0xffffffffffffffff) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0) 04:37:16 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) r3 = socket$kcm(0x29, 0x7, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xa, 0x2, 0x400, 0xc}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000140), &(0x7f00000000c0), 0x1081, r4}, 0x38) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000000480), 0x8) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000006c0)=@bpf_ext={0x1c, 0x6, &(0x7f0000000100)=@raw=[@initr0, @map={0x18, 0x3, 0x1, 0x0, r4}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}], 0x0, 0x1, 0xf8, &(0x7f0000000580)=""/248, 0x0, 0x18, [], 0x0, 0x0, r5, 0x8, &(0x7f0000000500)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000680)={0x0, 0x3, 0x32c96647, 0x9}, 0x10, 0x28c14, r2}, 0x78) sendmsg$kcm(r3, &(0x7f00000004c0)={&(0x7f00000003c0)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, 0x0, 0x0, &(0x7f0000000bc0)=[{0x58, 0x0, 0x3f, "3d036b2fe1c920e033fd51a7135bc633687035d4990a07405974e24f3e4f5bc747dd8cb833517dba325fb8357ec60f4b737260519cbec967f1e58025da9b5821975edd2eb5ce0e"}, {0x120, 0xff, 0x0, "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"}, {0x20, 0x116, 0x100, "e12e82da376bca8fa03c53062e627e"}, {0x10, 0x0, 0xa11}, {0x80, 0x109, 0x0, "48dcf8c1cb65b735b2d5007004b54696aa2a8d0eb98210cf2936121163b1c0584580900f864f0ebc03ba1675bbb924fa22af1c7933e3ea0fe010ebefceaa2fd20e15b805012fd2d7a3e171a57996dc09dc5df4ce65f0c01e583247522e22d559c831115bca323aa68746a2dd9dc8"}, {0x40, 0x88, 0x39, "e91254173524b71a6cf4982e471433e79bae7c4a781a2a354e5dcee630a99252345f0fe48a629be09093e130c018"}], 0x268}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000002c0)='block_bio_queue\x00'}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r1, 0x12, 0x1, 0x0, 0x0}, 0x20) r6 = openat$cgroup_ro(r0, &(0x7f0000000300)='cpuset.effective_mems\x00', 0x0, 0x0) openat$cgroup_freezer_state(r6, &(0x7f0000000380)='freezer.state\x00', 0x2, 0x0) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) socket$kcm(0x2b, 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a80)={0xffffffffffffffff, 0x0, 0x67, 0x62, &(0x7f0000000840)="f99a133c46d257d5200f326d0a5562cd17685e886bf2f9b3f9a2790348e08bc05a864a96cf5d232acf4d9c795667017ab2c3fa3c298204bcf30edef2ac8db7cbfdf4deae19c3fb8efa11f5d49f040b0731924ad772daa2861563518e94c736d15a5ac7a9872008", &(0x7f00000008c0)=""/98, 0x51a, 0x0, 0x1b, 0x0, &(0x7f0000000940)="5a4fa68ec2c72f99361b9b501348d1d5bce04f26173ed66a605e0c", &(0x7f0000000980)}, 0x48) 04:37:16 executing program 2: mount$fuse(0x0, 0x0, &(0x7f0000002180)='fuse\x00', 0x0, 0x0) getgid() syz_mount_image$vxfs(&(0x7f00000127c0)='vxfs\x00', &(0x7f0000012800)='./file0\x00', 0x800, 0x2, &(0x7f0000012980)=[{&(0x7f0000012880)}, {0x0, 0x0, 0xfffffffffffffffe}], 0x4000, &(0x7f0000012a00)={[{'}'}]}) 04:37:16 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00', 0xffffffffffffffff) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0) 04:37:16 executing program 5: r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_congestion_control\x00', 0x1, 0x0) fsetxattr(r0, &(0x7f0000000040)=ANY=[], 0x0, 0x0, 0x0) 04:37:16 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x11, 0x2, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) sendmsg(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) getpid() ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0xffffff88, &(0x7f00000000c0)="b9ff0300290d698cb89e40f008001fffffff00004000632977", 0x0, 0x100, 0x6000000000000000}, 0x28) 04:37:16 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r0, 0x0, 0x61, 0x0, &(0x7f0000001080)) 04:37:16 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00', 0xffffffffffffffff) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0) [ 520.921834][T21890] loop2: detected capacity change from 0 to 16383 [ 521.001402][T21890] vxfs: WRONG superblock magic 00000000 at 1 04:37:16 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000000)=[{0x0}, {&(0x7f0000000600)=""/233, 0xe9}], 0x2}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000200), 0x43400) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40305839, &(0x7f0000000000)) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x6611, 0x0) [ 521.048815][T21890] vxfs: WRONG superblock magic 00000000 at 8 [ 521.093707][T21890] vxfs: can't find superblock. 04:37:16 executing program 5: openat$fuse(0xffffffffffffff9c, &(0x7f0000000800)='/dev/fuse\x00', 0x2, 0x0) 04:37:16 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00', 0xffffffffffffffff) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) 04:37:17 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00', 0xffffffffffffffff) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) 04:37:17 executing program 5: pipe(&(0x7f00000005c0)={0xffffffffffffffff}) ioctl$TIOCL_SETVESABLANK(r0, 0x541c, 0x0) 04:37:17 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) r3 = socket$kcm(0x29, 0x7, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xa, 0x2, 0x400, 0xc}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000140), &(0x7f00000000c0), 0x1081, r4}, 0x38) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000000480), 0x8) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000006c0)=@bpf_ext={0x1c, 0x6, &(0x7f0000000100)=@raw=[@initr0, @map={0x18, 0x3, 0x1, 0x0, r4}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}], 0x0, 0x1, 0xf8, &(0x7f0000000580)=""/248, 0x0, 0x18, [], 0x0, 0x0, r5, 0x8, &(0x7f0000000500)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000680)={0x0, 0x3, 0x32c96647, 0x9}, 0x10, 0x28c14, r2}, 0x78) sendmsg$kcm(r3, &(0x7f00000004c0)={&(0x7f00000003c0)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, 0x0, 0x0, &(0x7f0000000bc0)=[{0x58, 0x0, 0x3f, "3d036b2fe1c920e033fd51a7135bc633687035d4990a07405974e24f3e4f5bc747dd8cb833517dba325fb8357ec60f4b737260519cbec967f1e58025da9b5821975edd2eb5ce0e"}, {0x120, 0xff, 0x0, "66a36a9455eecacdd8c163586fbbda03204764abc3a8c9654d37d7c1a2f0137331fa2fc3c6b9c55a1cac3388716c8a76fc203090f4b9a8d9e4e4383140f03e4a858b012a4be6e9627a6c3c2cad945b7222473303ee4ad9cdf1f140621bf10baaf72506be7d90008df69e4c604be55e65d97d52d2badc2bc54195891c461c0f3500918123efc1e58ba54cee893f87f33cfef3bcb68cac978aa5771ed9240b9cf9e44c0f9dc631daaa13163c7cfa501090e5f3800ba5f26eaade9b17afd51fb7a9dee8f4b64db02d16f940369bcc3e3f6aaed6a980b9bef7f37844519af3e31b6887d4daad7bc530e9a2c04fc6f0e4717820569dbc831ef37c4bf3b8733f353ed53179f0ce0a8b9ac8c05b1b1a3f0e12"}, {0x20, 0x116, 0x100, "e12e82da376bca8fa03c53062e627e"}, {0x10, 0x0, 0xa11}, {0x80, 0x109, 0x0, "48dcf8c1cb65b735b2d5007004b54696aa2a8d0eb98210cf2936121163b1c0584580900f864f0ebc03ba1675bbb924fa22af1c7933e3ea0fe010ebefceaa2fd20e15b805012fd2d7a3e171a57996dc09dc5df4ce65f0c01e583247522e22d559c831115bca323aa68746a2dd9dc8"}, {0x40, 0x88, 0x39, "e91254173524b71a6cf4982e471433e79bae7c4a781a2a354e5dcee630a99252345f0fe48a629be09093e130c018"}], 0x268}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000002c0)='block_bio_queue\x00'}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r1, 0x12, 0x1, 0x0, 0x0}, 0x20) r6 = openat$cgroup_ro(r0, &(0x7f0000000300)='cpuset.effective_mems\x00', 0x0, 0x0) openat$cgroup_freezer_state(r6, &(0x7f0000000380)='freezer.state\x00', 0x2, 0x0) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) socket$kcm(0x2b, 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a80)={0xffffffffffffffff, 0x0, 0x67, 0x62, &(0x7f0000000840)="f99a133c46d257d5200f326d0a5562cd17685e886bf2f9b3f9a2790348e08bc05a864a96cf5d232acf4d9c795667017ab2c3fa3c298204bcf30edef2ac8db7cbfdf4deae19c3fb8efa11f5d49f040b0731924ad772daa2861563518e94c736d15a5ac7a9872008", &(0x7f00000008c0)=""/98, 0x51a, 0x0, 0x1b, 0x0, &(0x7f0000000940)="5a4fa68ec2c72f99361b9b501348d1d5bce04f26173ed66a605e0c", &(0x7f0000000980)}, 0x48) 04:37:17 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x11, 0x2, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) sendmsg(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) getpid() ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0xffffff88, &(0x7f00000000c0)="b9ff0300290d698cb89e40f008001fffffff00004000632977", 0x0, 0x100, 0x6000000000000000}, 0x28) 04:37:17 executing program 2: mount$fuse(0x0, 0x0, &(0x7f0000002180)='fuse\x00', 0x0, 0x0) syz_mount_image$vxfs(&(0x7f00000127c0)='vxfs\x00', &(0x7f0000012800)='./file0\x00', 0x800, 0x2, &(0x7f0000012980)=[{&(0x7f0000012880)}, {0x0, 0x0, 0xfffffffffffffffe}], 0x4000, &(0x7f0000012a00)={[{'}'}]}) 04:37:17 executing program 5: r0 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, 0x0) 04:37:17 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00', 0xffffffffffffffff) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) 04:37:17 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000000)=[{0x0}, {&(0x7f0000000600)=""/233, 0xe9}], 0x2}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000200), 0x43400) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x6611, 0x0) 04:37:17 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) timerfd_gettime(r0, 0x0) 04:37:17 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00', 0xffffffffffffffff) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)={0x28, 0x0, 0x1, 0x0, 0x0, {{}, {}, {0x5, 0x14, 'syz0\x00'}}}, 0x28}}, 0x0) [ 521.918399][T21926] loop2: detected capacity change from 0 to 16383 [ 521.989954][T21926] vxfs: WRONG superblock magic 00000000 at 1 [ 522.056754][T21926] vxfs: WRONG superblock magic 00000000 at 8 [ 522.104970][T21926] vxfs: can't find superblock. 04:37:17 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000000)=[{0x0}, {&(0x7f0000000600)=""/233, 0xe9}], 0x2}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000200), 0x43400) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x6611, 0x0) 04:37:17 executing program 2: syz_mount_image$vxfs(&(0x7f00000127c0)='vxfs\x00', &(0x7f0000012800)='./file0\x00', 0x800, 0x2, &(0x7f0000012980)=[{&(0x7f0000012880)}, {0x0, 0x0, 0xfffffffffffffffe}], 0x4000, &(0x7f0000012a00)={[{'}'}]}) 04:37:17 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x11, 0x2, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) sendmsg(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) getpid() ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0xffffff88, &(0x7f00000000c0)="b9ff0300290d698cb89e40f008001fffffff00004000632977", 0x0, 0x100, 0x6000000000000000}, 0x28) 04:37:17 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00', 0xffffffffffffffff) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)={0x28, 0x0, 0x1, 0x0, 0x0, {{}, {}, {0x5, 0x14, 'syz0\x00'}}}, 0x28}}, 0x0) [ 522.535173][T21945] loop2: detected capacity change from 0 to 16383 [ 522.656342][T21945] vxfs: WRONG superblock magic 00000000 at 1 [ 522.727129][T21945] vxfs: WRONG superblock magic 00000000 at 8 [ 522.781975][T21945] vxfs: can't find superblock. 04:37:18 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) r3 = socket$kcm(0x29, 0x7, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xa, 0x2, 0x400, 0xc}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000140), &(0x7f00000000c0), 0x1081, r4}, 0x38) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000000480), 0x8) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000006c0)=@bpf_ext={0x1c, 0x6, &(0x7f0000000100)=@raw=[@initr0, @map={0x18, 0x3, 0x1, 0x0, r4}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}], 0x0, 0x1, 0xf8, &(0x7f0000000580)=""/248, 0x0, 0x18, [], 0x0, 0x0, r5, 0x8, &(0x7f0000000500)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000680)={0x0, 0x3, 0x32c96647, 0x9}, 0x10, 0x28c14, r2}, 0x78) sendmsg$kcm(r3, &(0x7f00000004c0)={&(0x7f00000003c0)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, 0x0, 0x0, &(0x7f0000000bc0)=[{0x58, 0x0, 0x3f, "3d036b2fe1c920e033fd51a7135bc633687035d4990a07405974e24f3e4f5bc747dd8cb833517dba325fb8357ec60f4b737260519cbec967f1e58025da9b5821975edd2eb5ce0e"}, {0x120, 0xff, 0x0, "66a36a9455eecacdd8c163586fbbda03204764abc3a8c9654d37d7c1a2f0137331fa2fc3c6b9c55a1cac3388716c8a76fc203090f4b9a8d9e4e4383140f03e4a858b012a4be6e9627a6c3c2cad945b7222473303ee4ad9cdf1f140621bf10baaf72506be7d90008df69e4c604be55e65d97d52d2badc2bc54195891c461c0f3500918123efc1e58ba54cee893f87f33cfef3bcb68cac978aa5771ed9240b9cf9e44c0f9dc631daaa13163c7cfa501090e5f3800ba5f26eaade9b17afd51fb7a9dee8f4b64db02d16f940369bcc3e3f6aaed6a980b9bef7f37844519af3e31b6887d4daad7bc530e9a2c04fc6f0e4717820569dbc831ef37c4bf3b8733f353ed53179f0ce0a8b9ac8c05b1b1a3f0e12"}, {0x20, 0x116, 0x100, "e12e82da376bca8fa03c53062e627e"}, {0x10, 0x0, 0xa11}, {0x80, 0x109, 0x0, "48dcf8c1cb65b735b2d5007004b54696aa2a8d0eb98210cf2936121163b1c0584580900f864f0ebc03ba1675bbb924fa22af1c7933e3ea0fe010ebefceaa2fd20e15b805012fd2d7a3e171a57996dc09dc5df4ce65f0c01e583247522e22d559c831115bca323aa68746a2dd9dc8"}, {0x40, 0x88, 0x39, "e91254173524b71a6cf4982e471433e79bae7c4a781a2a354e5dcee630a99252345f0fe48a629be09093e130c018"}], 0x268}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000002c0)='block_bio_queue\x00'}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r1, 0x12, 0x1, 0x0, 0x0}, 0x20) r6 = openat$cgroup_ro(r0, &(0x7f0000000300)='cpuset.effective_mems\x00', 0x0, 0x0) openat$cgroup_freezer_state(r6, &(0x7f0000000380)='freezer.state\x00', 0x2, 0x0) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) socket$kcm(0x2b, 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a80)={0xffffffffffffffff, 0x0, 0x67, 0x62, &(0x7f0000000840)="f99a133c46d257d5200f326d0a5562cd17685e886bf2f9b3f9a2790348e08bc05a864a96cf5d232acf4d9c795667017ab2c3fa3c298204bcf30edef2ac8db7cbfdf4deae19c3fb8efa11f5d49f040b0731924ad772daa2861563518e94c736d15a5ac7a9872008", &(0x7f00000008c0)=""/98, 0x51a, 0x0, 0x1b, 0x0, &(0x7f0000000940)="5a4fa68ec2c72f99361b9b501348d1d5bce04f26173ed66a605e0c", &(0x7f0000000980)}, 0x48) 04:37:18 executing program 5: pipe(&(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$FIONCLEX(r0, 0x5450) 04:37:18 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00', 0xffffffffffffffff) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)={0x28, 0x0, 0x1, 0x0, 0x0, {{}, {}, {0x5, 0x14, 'syz0\x00'}}}, 0x28}}, 0x0) 04:37:18 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x11, 0x2, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) sendmsg(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) getpid() ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0xffffff88, &(0x7f00000000c0)="b9ff0300290d698cb89e40f008001fffffff00004000632977", 0x0, 0x100, 0x6000000000000000}, 0x28) 04:37:18 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000000)=[{0x0}, {&(0x7f0000000600)=""/233, 0xe9}], 0x2}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000200), 0x43400) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x6611, 0x0) 04:37:18 executing program 2: syz_mount_image$vxfs(0x0, &(0x7f0000012800)='./file0\x00', 0x800, 0x2, &(0x7f0000012980)=[{&(0x7f0000012880)}, {0x0, 0x0, 0xfffffffffffffffe}], 0x4000, &(0x7f0000012a00)={[{'}'}]}) 04:37:18 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00', 0xffffffffffffffff) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)={0x28, r1, 0x0, 0x0, 0x0, {{}, {}, {0x5, 0x14, 'syz0\x00'}}}, 0x28}}, 0x0) 04:37:18 executing program 5: pipe(&(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TIOCSSOFTCAR(r0, 0x541a, 0x0) [ 523.074599][T21959] loop2: detected capacity change from 0 to 16383 04:37:18 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000000)=[{0x0}, {&(0x7f0000000600)=""/233, 0xe9}], 0x2}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x6611, 0x0) 04:37:19 executing program 2: syz_mount_image$vxfs(0x0, &(0x7f0000012800)='./file0\x00', 0x800, 0x2, &(0x7f0000012980)=[{&(0x7f0000012880)}, {0x0, 0x0, 0xfffffffffffffffe}], 0x4000, &(0x7f0000012a00)={[{'}'}]}) 04:37:19 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x11, 0x2, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) sendmsg(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)}, 0x0) getpid() ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0xffffff88, &(0x7f00000000c0)="b9ff0300290d698cb89e40f008001fffffff00004000632977", 0x0, 0x100, 0x6000000000000000}, 0x28) 04:37:19 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00', 0xffffffffffffffff) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)={0x28, r1, 0x0, 0x0, 0x0, {{}, {}, {0x5, 0x14, 'syz0\x00'}}}, 0x28}}, 0x0) [ 523.672660][T21978] loop2: detected capacity change from 0 to 16383 04:37:19 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) r3 = socket$kcm(0x29, 0x7, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xa, 0x2, 0x400, 0xc}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000140), &(0x7f00000000c0), 0x1081, r4}, 0x38) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000000480), 0x8) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000006c0)=@bpf_ext={0x1c, 0x6, &(0x7f0000000100)=@raw=[@initr0, @map={0x18, 0x3, 0x1, 0x0, r4}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}], 0x0, 0x1, 0xf8, &(0x7f0000000580)=""/248, 0x0, 0x18, [], 0x0, 0x0, r5, 0x8, &(0x7f0000000500)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000680)={0x0, 0x3, 0x32c96647, 0x9}, 0x10, 0x28c14, r2}, 0x78) sendmsg$kcm(r3, &(0x7f00000004c0)={&(0x7f00000003c0)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, 0x0, 0x0, &(0x7f0000000bc0)=[{0x58, 0x0, 0x3f, "3d036b2fe1c920e033fd51a7135bc633687035d4990a07405974e24f3e4f5bc747dd8cb833517dba325fb8357ec60f4b737260519cbec967f1e58025da9b5821975edd2eb5ce0e"}, {0x120, 0xff, 0x0, "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"}, {0x20, 0x116, 0x100, "e12e82da376bca8fa03c53062e627e"}, {0x10, 0x0, 0xa11}, {0x88, 0x109, 0x0, "48dcf8c1cb65b735b2d5007004b54696aa2a8d0eb98210cf2936121163b1c0584580900f864f0ebc03ba1675bbb924fa22af1c7933e3ea0fe010ebefceaa2fd20e15b805012fd2d7a3e171a57996dc09dc5df4ce65f0c01e583247522e22d559c831115bca323aa68746a2dd9dc875023459"}, {0x40, 0x88, 0x39, "e91254173524b71a6cf4982e471433e79bae7c4a781a2a354e5dcee630a99252345f0fe48a629be09093e130c018"}], 0x270}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000002c0)='block_bio_queue\x00'}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r1, 0x12, 0x1, 0x0, 0x0}, 0x20) r6 = openat$cgroup_ro(r0, &(0x7f0000000300)='cpuset.effective_mems\x00', 0x0, 0x0) openat$cgroup_freezer_state(r6, &(0x7f0000000380)='freezer.state\x00', 0x2, 0x0) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) socket$kcm(0x2b, 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a80)={0xffffffffffffffff, 0x0, 0x67, 0x62, &(0x7f0000000840)="f99a133c46d257d5200f326d0a5562cd17685e886bf2f9b3f9a2790348e08bc05a864a96cf5d232acf4d9c795667017ab2c3fa3c298204bcf30edef2ac8db7cbfdf4deae19c3fb8efa11f5d49f040b0731924ad772daa2861563518e94c736d15a5ac7a9872008", &(0x7f00000008c0)=""/98, 0x51a, 0x0, 0x1b, 0x0, &(0x7f0000000940)="5a4fa68ec2c72f99361b9b501348d1d5bce04f26173ed66a605e0c", &(0x7f0000000980)}, 0x48) 04:37:19 executing program 5: capset(&(0x7f0000000180)={0x19980330}, &(0x7f00000001c0)={0xffffffff}) 04:37:19 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00', 0xffffffffffffffff) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)={0x28, r1, 0x0, 0x0, 0x0, {{}, {}, {0x5, 0x14, 'syz0\x00'}}}, 0x28}}, 0x0) 04:37:19 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000000)=[{0x0}, {&(0x7f0000000600)=""/233, 0xe9}], 0x2}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x6611, 0x0) 04:37:19 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x11, 0x2, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) sendmsg(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)}, 0x0) getpid() ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0xffffff88, &(0x7f00000000c0)="b9ff0300290d698cb89e40f008001fffffff00004000632977", 0x0, 0x100, 0x6000000000000000}, 0x28) 04:37:19 executing program 2: syz_mount_image$vxfs(0x0, &(0x7f0000012800)='./file0\x00', 0x800, 0x2, &(0x7f0000012980)=[{&(0x7f0000012880)}, {0x0, 0x0, 0xfffffffffffffffe}], 0x4000, &(0x7f0000012a00)={[{'}'}]}) [ 524.077757][T21989] capability: warning: `syz-executor.5' uses 32-bit capabilities (legacy support in use) 04:37:19 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) setsockopt$EBT_SO_SET_COUNTERS(r0, 0x0, 0x81, 0x0, 0x0) [ 524.131054][T21991] loop2: detected capacity change from 0 to 16383 04:37:19 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r0, 0x89fb, 0x0) 04:37:20 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000000)=[{0x0}, {&(0x7f0000000600)=""/233, 0xe9}], 0x2}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x6611, 0x0) 04:37:20 executing program 4: pipe2(&(0x7f0000000f40), 0x800) 04:37:20 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x11, 0x2, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) sendmsg(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)}, 0x0) getpid() ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0xffffff88, &(0x7f00000000c0)="b9ff0300290d698cb89e40f008001fffffff00004000632977", 0x0, 0x100, 0x6000000000000000}, 0x28) 04:37:20 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) setresuid(0x0, 0xee01, 0xffffffffffffffff) ioctl$KDFONTOP_COPY(r0, 0x4b72, &(0x7f0000000540)={0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) 04:37:20 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) r3 = socket$kcm(0x29, 0x7, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xa, 0x2, 0x400, 0xc}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000140), &(0x7f00000000c0), 0x1081, r4}, 0x38) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000000480), 0x8) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000006c0)=@bpf_ext={0x1c, 0x6, &(0x7f0000000100)=@raw=[@initr0, @map={0x18, 0x3, 0x1, 0x0, r4}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}], 0x0, 0x1, 0xf8, &(0x7f0000000580)=""/248, 0x0, 0x18, [], 0x0, 0x0, r5, 0x8, &(0x7f0000000500)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000680)={0x0, 0x3, 0x32c96647, 0x9}, 0x10, 0x28c14, r2}, 0x78) sendmsg$kcm(r3, &(0x7f00000004c0)={&(0x7f00000003c0)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, 0x0, 0x0, &(0x7f0000000bc0)=[{0x58, 0x0, 0x3f, "3d036b2fe1c920e033fd51a7135bc633687035d4990a07405974e24f3e4f5bc747dd8cb833517dba325fb8357ec60f4b737260519cbec967f1e58025da9b5821975edd2eb5ce0e"}, {0x120, 0xff, 0x0, "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"}, {0x20, 0x116, 0x100, "e12e82da376bca8fa03c53062e627e"}, {0x10, 0x0, 0xa11}, {0x88, 0x109, 0x0, "48dcf8c1cb65b735b2d5007004b54696aa2a8d0eb98210cf2936121163b1c0584580900f864f0ebc03ba1675bbb924fa22af1c7933e3ea0fe010ebefceaa2fd20e15b805012fd2d7a3e171a57996dc09dc5df4ce65f0c01e583247522e22d559c831115bca323aa68746a2dd9dc875023459"}, {0x40, 0x88, 0x39, "e91254173524b71a6cf4982e471433e79bae7c4a781a2a354e5dcee630a99252345f0fe48a629be09093e130c018"}], 0x270}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000002c0)='block_bio_queue\x00'}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r1, 0x12, 0x1, 0x0, 0x0}, 0x20) r6 = openat$cgroup_ro(r0, &(0x7f0000000300)='cpuset.effective_mems\x00', 0x0, 0x0) openat$cgroup_freezer_state(r6, &(0x7f0000000380)='freezer.state\x00', 0x2, 0x0) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) socket$kcm(0x2b, 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a80)={0xffffffffffffffff, 0x0, 0x67, 0x62, &(0x7f0000000840)="f99a133c46d257d5200f326d0a5562cd17685e886bf2f9b3f9a2790348e08bc05a864a96cf5d232acf4d9c795667017ab2c3fa3c298204bcf30edef2ac8db7cbfdf4deae19c3fb8efa11f5d49f040b0731924ad772daa2861563518e94c736d15a5ac7a9872008", &(0x7f00000008c0)=""/98, 0x51a, 0x0, 0x1b, 0x0, &(0x7f0000000940)="5a4fa68ec2c72f99361b9b501348d1d5bce04f26173ed66a605e0c", &(0x7f0000000980)}, 0x48) 04:37:20 executing program 2: syz_mount_image$vxfs(&(0x7f00000127c0)='vxfs\x00', 0x0, 0x800, 0x2, &(0x7f0000012980)=[{&(0x7f0000012880)}, {0x0, 0x0, 0xfffffffffffffffe}], 0x4000, &(0x7f0000012a00)={[{'}'}]}) 04:37:20 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) setresuid(0x0, 0xee01, 0xffffffffffffffff) ioctl$TIOCSLCKTRMIOS(r0, 0x4b60, 0x0) 04:37:20 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) setresuid(0x0, 0xee01, 0xffffffffffffffff) ioctl$TIOCSLCKTRMIOS(r0, 0x4b4d, 0x0) 04:37:20 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000000)=[{0x0}, {&(0x7f0000000600)=""/233, 0xe9}], 0x2}, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x6611, 0x0) 04:37:20 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x11, 0x2, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) sendmsg(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000fefffe7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010001000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000c9be17044171e1d3d7b196d079c4d4758fa35d17c668a4b6c5f6688e15308a1f8355410c0cec9a66819ce256b8530e31ec24925095a163b9d4e76be266e31a80382240baa44e080addde36e5fdc6c42a7b3f912f6906a6e2313091dd61258a1fda45991fbdce32bebcb3ac17c5146793e6a4785ee8b60092659b941bbd694d1f8898b3e6477afbda84355dba16801c89c08c07ce144961bfbb975b726a0b59b8c79321bc8d0093979391090e0ac8666d2500dd60794bf7cb8ef212f0452eb6415435ab4e6ee740327968dbb729b75a4244ee0f031e5a093bff037d9f7f76aaa845d819fa9f8d1cb2b0d2ec20bbb74d7b35421046847281aae5b1cc0fd183f68ff1bf9af98bacf1b91cf55debb0c8c027901f949834aec6764bce8586a9470f267b12e5ad2274f22103f30e5c1a119dce8693e94b92ae72abe72127d8d23884ea84c82c9d2f5ce635d2b997b21bb82f720095064fcd956de51de721d7f9bd85fec7afc6e6a79f9101e03b356cf1bb813e646dcd43d9a71ef270e3644067cdea1848e7e55a5164a1fb7a9010912fbf136a9721fa4c84f5494a267ea72f87412708bcd54815c4a1d38a999525f3335e5c8f2c2d1f5d7872cd9fa6fd4b86f2706048deb9588df7ed"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{0x0}], 0x1}, 0x0) getpid() ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0xffffff88, &(0x7f00000000c0)="b9ff0300290d698cb89e40f008001fffffff00004000632977", 0x0, 0x100, 0x6000000000000000}, 0x28) 04:37:20 executing program 4: sendmsg$NL802154_CMD_NEW_SEC_LEVEL(0xffffffffffffffff, 0x0, 0xfc1b416c8a0b18c4) 04:37:20 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) setresuid(0x0, 0xee01, 0xffffffffffffffff) ioctl$KDGKBTYPE(r0, 0x4b31, &(0x7f0000000000)) [ 525.125135][T22026] loop2: detected capacity change from 0 to 16383 04:37:20 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000000)=[{0x0}, {&(0x7f0000000600)=""/233, 0xe9}], 0x2}, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x6611, 0x0) 04:37:21 executing program 4: openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) 04:37:21 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x11, 0x2, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) sendmsg(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{0x0}], 0x1}, 0x0) getpid() ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0xffffff88, &(0x7f00000000c0)="b9ff0300290d698cb89e40f008001fffffff00004000632977", 0x0, 0x100, 0x6000000000000000}, 0x28) 04:37:21 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_DEVKEY(r0, &(0x7f0000000280)={&(0x7f0000000100), 0xc, &(0x7f0000000240)={0x0}}, 0x0) 04:37:21 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) r3 = socket$kcm(0x29, 0x7, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xa, 0x2, 0x400, 0xc}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000140), &(0x7f00000000c0), 0x1081, r4}, 0x38) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000000480), 0x8) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000006c0)=@bpf_ext={0x1c, 0x6, &(0x7f0000000100)=@raw=[@initr0, @map={0x18, 0x3, 0x1, 0x0, r4}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}], 0x0, 0x1, 0xf8, &(0x7f0000000580)=""/248, 0x0, 0x18, [], 0x0, 0x0, r5, 0x8, &(0x7f0000000500)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000680)={0x0, 0x3, 0x32c96647, 0x9}, 0x10, 0x28c14, r2}, 0x78) sendmsg$kcm(r3, &(0x7f00000004c0)={&(0x7f00000003c0)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, 0x0, 0x0, &(0x7f0000000bc0)=[{0x58, 0x0, 0x3f, "3d036b2fe1c920e033fd51a7135bc633687035d4990a07405974e24f3e4f5bc747dd8cb833517dba325fb8357ec60f4b737260519cbec967f1e58025da9b5821975edd2eb5ce0e"}, {0x120, 0xff, 0x0, "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"}, {0x20, 0x116, 0x100, "e12e82da376bca8fa03c53062e627e"}, {0x10, 0x0, 0xa11}, {0x88, 0x109, 0x0, "48dcf8c1cb65b735b2d5007004b54696aa2a8d0eb98210cf2936121163b1c0584580900f864f0ebc03ba1675bbb924fa22af1c7933e3ea0fe010ebefceaa2fd20e15b805012fd2d7a3e171a57996dc09dc5df4ce65f0c01e583247522e22d559c831115bca323aa68746a2dd9dc875023459"}, {0x40, 0x88, 0x39, "e91254173524b71a6cf4982e471433e79bae7c4a781a2a354e5dcee630a99252345f0fe48a629be09093e130c018"}], 0x270}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000002c0)='block_bio_queue\x00'}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r1, 0x12, 0x1, 0x0, 0x0}, 0x20) r6 = openat$cgroup_ro(r0, &(0x7f0000000300)='cpuset.effective_mems\x00', 0x0, 0x0) openat$cgroup_freezer_state(r6, &(0x7f0000000380)='freezer.state\x00', 0x2, 0x0) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) socket$kcm(0x2b, 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a80)={0xffffffffffffffff, 0x0, 0x67, 0x62, &(0x7f0000000840)="f99a133c46d257d5200f326d0a5562cd17685e886bf2f9b3f9a2790348e08bc05a864a96cf5d232acf4d9c795667017ab2c3fa3c298204bcf30edef2ac8db7cbfdf4deae19c3fb8efa11f5d49f040b0731924ad772daa2861563518e94c736d15a5ac7a9872008", &(0x7f00000008c0)=""/98, 0x51a, 0x0, 0x1b, 0x0, &(0x7f0000000940)="5a4fa68ec2c72f99361b9b501348d1d5bce04f26173ed66a605e0c", &(0x7f0000000980)}, 0x48) 04:37:21 executing program 2: syz_mount_image$vxfs(&(0x7f00000127c0)='vxfs\x00', 0x0, 0x800, 0x2, &(0x7f0000012980)=[{&(0x7f0000012880)}, {0x0, 0x0, 0xfffffffffffffffe}], 0x4000, &(0x7f0000012a00)={[{'}'}]}) 04:37:21 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) setresuid(0x0, 0xee01, 0xffffffffffffffff) ioctl$KDGKBTYPE(r0, 0x4b31, &(0x7f0000000000)) 04:37:21 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x1e, 0x0, &(0x7f0000000240)) 04:37:21 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000000)=[{0x0}, {&(0x7f0000000600)=""/233, 0xe9}], 0x2}, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x6611, 0x0) 04:37:21 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x11, 0x2, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) sendmsg(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000fefffe7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010001000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000c9be17044171e1d3d7b196d079c4d4758fa35d17c668a4b6c5f6688e15308a1f8355410c0cec9a66819ce256b8530e31ec24925095a163b9d4e76be266e31a80382240baa44e080addde36e5fdc6c42a7b3f912f6906a6e2313091dd61258a1fda45991fbdce32bebcb3ac17c5146793e6a4785ee8b60092659b941bbd694d1f8898b3e6477afbda84355dba16801c89c08c07ce144961bfbb975b726a0b59b8c79321bc8d0093979391090e0ac8666d2500dd60794bf7cb8ef212f0452eb6415435ab4e6ee740327968dbb729b75a4244ee0f031e5a093bff037d9f7f76aaa845d819fa9f8d1cb2b0d2ec20bbb74d7b35421046847281aae5b1cc0fd183f68ff1bf9af98bacf1b91cf55debb0c8c027901f949834aec6764bce8586a9470f267b12e5ad2274f22103f30e5c1a119dce8693e94b92ae72abe72127d8d23884ea84c82c9d2f5ce635d2b997b21bb82f720095064fcd956de51de721d7f9bd85fec7afc6e6a79f9101e03b356cf1bb813e646dcd43d9a71ef270e3644067cdea1848e7e55a5164a1fb7a9010912fbf136a9721fa4c84f5494a267ea72f87412708bcd54815c4a1d38a999525f3335e5c8f2c2d1f5d7872cd9fa6fd4b86f2706048deb9588df7ed"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{0x0}], 0x1}, 0x0) getpid() ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0xffffff88, &(0x7f00000000c0)="b9ff0300290d698cb89e40f008001fffffff00004000632977", 0x0, 0x100, 0x6000000000000000}, 0x28) 04:37:21 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) setresuid(0x0, 0xee01, 0xffffffffffffffff) ioctl$TIOCSLCKTRMIOS(r0, 0x4bfb, 0x0) 04:37:21 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) setresuid(0x0, 0xee01, 0xffffffffffffffff) ioctl$KDGKBTYPE(r0, 0x4b31, &(0x7f0000000000)) [ 526.132207][T22058] loop2: detected capacity change from 0 to 16383 04:37:21 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x6611, 0x0) 04:37:22 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x11, 0x2, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) sendmsg(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000380)}], 0x1}, 0x0) getpid() ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0xffffff88, &(0x7f00000000c0)="b9ff0300290d698cb89e40f008001fffffff00004000632977", 0x0, 0x100, 0x6000000000000000}, 0x28) 04:37:22 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCSLCKTRMIOS(r0, 0x802c542a, 0x0) 04:37:22 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) setresuid(0x0, 0xee01, 0xffffffffffffffff) ioctl$KDGKBTYPE(r0, 0x4b31, &(0x7f0000000000)) 04:37:22 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) r3 = socket$kcm(0x29, 0x7, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xa, 0x2, 0x400, 0xc}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000140), &(0x7f00000000c0), 0x1081, r4}, 0x38) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000000480), 0x8) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000006c0)=@bpf_ext={0x1c, 0x6, &(0x7f0000000100)=@raw=[@initr0, @map={0x18, 0x3, 0x1, 0x0, r4}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}], 0x0, 0x1, 0xf8, &(0x7f0000000580)=""/248, 0x0, 0x18, [], 0x0, 0x0, r5, 0x8, &(0x7f0000000500)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000680)={0x0, 0x3, 0x32c96647, 0x9}, 0x10, 0x28c14, r2}, 0x78) sendmsg$kcm(r3, &(0x7f00000004c0)={&(0x7f00000003c0)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, 0x0, 0x0, &(0x7f0000000bc0)=[{0x58, 0x0, 0x3f, "3d036b2fe1c920e033fd51a7135bc633687035d4990a07405974e24f3e4f5bc747dd8cb833517dba325fb8357ec60f4b737260519cbec967f1e58025da9b5821975edd2eb5ce0e"}, {0x120, 0xff, 0x0, "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"}, {0x20, 0x116, 0x100, "e12e82da376bca8fa03c53062e627e"}, {0x10, 0x0, 0xa11}, {0x88, 0x109, 0x0, "48dcf8c1cb65b735b2d5007004b54696aa2a8d0eb98210cf2936121163b1c0584580900f864f0ebc03ba1675bbb924fa22af1c7933e3ea0fe010ebefceaa2fd20e15b805012fd2d7a3e171a57996dc09dc5df4ce65f0c01e583247522e22d559c831115bca323aa68746a2dd9dc875023459b72e"}, {0x40, 0x88, 0x39, "e91254173524b71a6cf4982e471433e79bae7c4a781a2a354e5dcee630a99252345f0fe48a629be09093e130c018"}], 0x270}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000002c0)='block_bio_queue\x00'}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r1, 0x12, 0x1, 0x0, 0x0}, 0x20) r6 = openat$cgroup_ro(r0, &(0x7f0000000300)='cpuset.effective_mems\x00', 0x0, 0x0) openat$cgroup_freezer_state(r6, &(0x7f0000000380)='freezer.state\x00', 0x2, 0x0) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) socket$kcm(0x2b, 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a80)={0xffffffffffffffff, 0x0, 0x67, 0x62, &(0x7f0000000840)="f99a133c46d257d5200f326d0a5562cd17685e886bf2f9b3f9a2790348e08bc05a864a96cf5d232acf4d9c795667017ab2c3fa3c298204bcf30edef2ac8db7cbfdf4deae19c3fb8efa11f5d49f040b0731924ad772daa2861563518e94c736d15a5ac7a9872008", &(0x7f00000008c0)=""/98, 0x51a, 0x0, 0x1b, 0x0, &(0x7f0000000940)="5a4fa68ec2c72f99361b9b501348d1d5bce04f26173ed66a605e0c", &(0x7f0000000980)}, 0x48) 04:37:22 executing program 2: syz_mount_image$vxfs(&(0x7f00000127c0)='vxfs\x00', 0x0, 0x800, 0x2, &(0x7f0000012980)=[{&(0x7f0000012880)}, {0x0, 0x0, 0xfffffffffffffffe}], 0x4000, &(0x7f0000012a00)={[{'}'}]}) 04:37:22 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x6611, 0x0) 04:37:22 executing program 4: getpid() timer_create(0xfffffffe, &(0x7f0000000000)={0x0, 0x1c}, &(0x7f0000000040)) 04:37:22 executing program 5: r0 = socket(0x28, 0x1, 0x0) setsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x10e, 0x4, 0x0, 0x0) 04:37:22 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x11, 0x2, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) sendmsg(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000380)}], 0x1}, 0x0) getpid() ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0xffffff88, &(0x7f00000000c0)="b9ff0300290d698cb89e40f008001fffffff00004000632977", 0x0, 0x100, 0x6000000000000000}, 0x28) 04:37:22 executing program 5: r0 = socket(0x11, 0x3, 0x0) r1 = dup(r0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8953, 0x0) 04:37:22 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r0, 0x10e, 0x2, &(0x7f0000000340)=0x13, 0x4) [ 527.137326][T22089] loop2: detected capacity change from 0 to 16383 04:37:22 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x6611, 0x0) 04:37:23 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGKBTYPE(r0, 0x4b62, &(0x7f0000000200)) 04:37:23 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x11, 0x2, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) sendmsg(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000fefffe7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010001000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000c9be17044171e1d3d7b196d079c4d4758fa35d17c668a4b6c5f6688e15308a1f8355410c0cec9a66819ce256b8530e31ec24925095a163b9d4e76be266e31a80382240baa44e080addde36e5fdc6c42a7b3f912f6906a6e2313091dd61258a1fda45991fbdce32bebcb3ac17c5146793e6a4785ee8b60092659b941bbd694d1f8898b3e6477afbda84355dba16801c89c08c07ce144961bfbb975b726a0b59b8c79321bc8d0093979391090e0ac8666d2500dd60794bf7cb8ef212f0452eb6415435ab4e6ee740327968dbb729b75a4244ee0f031e5a093bff037d9f7f76aaa845d819fa9f8d1cb2b0d2ec20bbb74d7b35421046847281aae5b1cc0fd183f68ff1bf9af98bacf1b91cf55debb0c8c027901f949834aec6764bce8586a9470f267b12e5ad2274f22103f30e5c1a119dce8693e94b92ae72abe72127d8d23884ea84c82c9d2f5ce635d2b997b21bb82f720095064fcd956de51de721d7f9bd85fec7afc6e6a79f9101e03b356cf1bb813e646dcd43d9a71ef270e3644067cdea1848e7e55a5164a1fb7a9010912fbf136a9721fa4c84f5494a267ea72f87412708bcd54815c4a1d38a999525f3335e5c8f2c2d1f5d7872cd9fa6fd4b86f2706048deb9588df7ed"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000380)}], 0x1}, 0x0) getpid() ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0xffffff88, &(0x7f00000000c0)="b9ff0300290d698cb89e40f008001fffffff00004000632977", 0x0, 0x100, 0x6000000000000000}, 0x28) 04:37:23 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x0, 0x0) getsockopt$bt_BT_SNDMTU(r0, 0x112, 0xc, 0x0, 0x0) 04:37:23 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) r3 = socket$kcm(0x29, 0x7, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xa, 0x2, 0x400, 0xc}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000140), &(0x7f00000000c0), 0x1081, r4}, 0x38) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000000480), 0x8) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000006c0)=@bpf_ext={0x1c, 0x6, &(0x7f0000000100)=@raw=[@initr0, @map={0x18, 0x3, 0x1, 0x0, r4}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}], 0x0, 0x1, 0xf8, &(0x7f0000000580)=""/248, 0x0, 0x18, [], 0x0, 0x0, r5, 0x8, &(0x7f0000000500)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000680)={0x0, 0x3, 0x32c96647, 0x9}, 0x10, 0x28c14, r2}, 0x78) sendmsg$kcm(r3, &(0x7f00000004c0)={&(0x7f00000003c0)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, 0x0, 0x0, &(0x7f0000000bc0)=[{0x58, 0x0, 0x3f, "3d036b2fe1c920e033fd51a7135bc633687035d4990a07405974e24f3e4f5bc747dd8cb833517dba325fb8357ec60f4b737260519cbec967f1e58025da9b5821975edd2eb5ce0e"}, {0x120, 0xff, 0x0, "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"}, {0x20, 0x116, 0x100, "e12e82da376bca8fa03c53062e627e"}, {0x10, 0x0, 0xa11}, {0x88, 0x109, 0x0, "48dcf8c1cb65b735b2d5007004b54696aa2a8d0eb98210cf2936121163b1c0584580900f864f0ebc03ba1675bbb924fa22af1c7933e3ea0fe010ebefceaa2fd20e15b805012fd2d7a3e171a57996dc09dc5df4ce65f0c01e583247522e22d559c831115bca323aa68746a2dd9dc875023459b72e"}, {0x40, 0x88, 0x39, "e91254173524b71a6cf4982e471433e79bae7c4a781a2a354e5dcee630a99252345f0fe48a629be09093e130c018"}], 0x270}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000002c0)='block_bio_queue\x00'}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r1, 0x12, 0x1, 0x0, 0x0}, 0x20) r6 = openat$cgroup_ro(r0, &(0x7f0000000300)='cpuset.effective_mems\x00', 0x0, 0x0) openat$cgroup_freezer_state(r6, &(0x7f0000000380)='freezer.state\x00', 0x2, 0x0) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) socket$kcm(0x2b, 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a80)={0xffffffffffffffff, 0x0, 0x67, 0x62, &(0x7f0000000840)="f99a133c46d257d5200f326d0a5562cd17685e886bf2f9b3f9a2790348e08bc05a864a96cf5d232acf4d9c795667017ab2c3fa3c298204bcf30edef2ac8db7cbfdf4deae19c3fb8efa11f5d49f040b0731924ad772daa2861563518e94c736d15a5ac7a9872008", &(0x7f00000008c0)=""/98, 0x51a, 0x0, 0x1b, 0x0, &(0x7f0000000940)="5a4fa68ec2c72f99361b9b501348d1d5bce04f26173ed66a605e0c", &(0x7f0000000980)}, 0x48) 04:37:23 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$netlink(r0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[@cred={{0x1c, 0x4, 0x2, {0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xee00}}}], 0x40}, 0x0) 04:37:23 executing program 2: syz_mount_image$vxfs(&(0x7f00000127c0)='vxfs\x00', &(0x7f0000012800)='./file0\x00', 0x0, 0x2, &(0x7f0000012980)=[{&(0x7f0000012880)}, {0x0, 0x0, 0xfffffffffffffffe}], 0x4000, &(0x7f0000012a00)={[{'}'}]}) 04:37:23 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) setresuid(0x0, 0xee01, 0xffffffffffffffff) ioctl$TIOCSLCKTRMIOS(r0, 0x4b46, 0x0) 04:37:23 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000000)=[{0x0}, {&(0x7f0000000600)=""/233, 0xe9}], 0x2}, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x6611, 0x0) 04:37:23 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x11, 0x2, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) sendmsg(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000380)="9762", 0x2}], 0x1}, 0x0) getpid() ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0xffffff88, &(0x7f00000000c0)="b9ff0300290d698cb89e40f008001fffffff00004000632977", 0x0, 0x100, 0x6000000000000000}, 0x28) 04:37:23 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) ioctl$FIONREAD(r0, 0x541b, 0x0) 04:37:23 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) setresuid(0x0, 0xee01, 0xffffffffffffffff) ioctl$TIOCSLCKTRMIOS(r0, 0x4b46, 0x0) [ 528.141814][T22121] loop2: detected capacity change from 0 to 16383 [ 528.213284][T22121] vxfs: WRONG superblock magic 00000000 at 1 [ 528.258315][T22121] vxfs: WRONG superblock magic 00000000 at 8 04:37:24 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000000)=[{0x0}, {&(0x7f0000000600)=""/233, 0xe9}], 0x2}, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x6611, 0x0) [ 528.311966][T22121] vxfs: can't find superblock. 04:37:24 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x11, 0x2, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) sendmsg(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000380)="9762", 0x2}], 0x1}, 0x0) getpid() ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0xffffff88, &(0x7f00000000c0)="b9ff0300290d698cb89e40f008001fffffff00004000632977", 0x0, 0x100, 0x6000000000000000}, 0x28) 04:37:24 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) setresuid(0x0, 0xee01, 0xffffffffffffffff) ioctl$TIOCSLCKTRMIOS(r0, 0x4b46, 0x0) 04:37:24 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) setresuid(0x0, 0xee01, 0xffffffffffffffff) ioctl$KDGKBTYPE(r0, 0x5601, &(0x7f0000000000)) 04:37:24 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) r3 = socket$kcm(0x29, 0x7, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xa, 0x2, 0x400, 0xc}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000140), &(0x7f00000000c0), 0x1081, r4}, 0x38) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000000480), 0x8) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000006c0)=@bpf_ext={0x1c, 0x6, &(0x7f0000000100)=@raw=[@initr0, @map={0x18, 0x3, 0x1, 0x0, r4}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}], 0x0, 0x1, 0xf8, &(0x7f0000000580)=""/248, 0x0, 0x18, [], 0x0, 0x0, r5, 0x8, &(0x7f0000000500)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000680)={0x0, 0x3, 0x32c96647, 0x9}, 0x10, 0x28c14, r2}, 0x78) sendmsg$kcm(r3, &(0x7f00000004c0)={&(0x7f00000003c0)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, 0x0, 0x0, &(0x7f0000000bc0)=[{0x58, 0x0, 0x3f, "3d036b2fe1c920e033fd51a7135bc633687035d4990a07405974e24f3e4f5bc747dd8cb833517dba325fb8357ec60f4b737260519cbec967f1e58025da9b5821975edd2eb5ce0e"}, {0x120, 0xff, 0x0, "66a36a9455eecacdd8c163586fbbda03204764abc3a8c9654d37d7c1a2f0137331fa2fc3c6b9c55a1cac3388716c8a76fc203090f4b9a8d9e4e4383140f03e4a858b012a4be6e9627a6c3c2cad945b7222473303ee4ad9cdf1f140621bf10baaf72506be7d90008df69e4c604be55e65d97d52d2badc2bc54195891c461c0f3500918123efc1e58ba54cee893f87f33cfef3bcb68cac978aa5771ed9240b9cf9e44c0f9dc631daaa13163c7cfa501090e5f3800ba5f26eaade9b17afd51fb7a9dee8f4b64db02d16f940369bcc3e3f6aaed6a980b9bef7f37844519af3e31b6887d4daad7bc530e9a2c04fc6f0e4717820569dbc831ef37c4bf3b8733f353ed53179f0ce0a8b9ac8c05b1b1a3f0e12"}, {0x20, 0x116, 0x100, "e12e82da376bca8fa03c53062e627e"}, {0x10, 0x0, 0xa11}, {0x88, 0x109, 0x0, "48dcf8c1cb65b735b2d5007004b54696aa2a8d0eb98210cf2936121163b1c0584580900f864f0ebc03ba1675bbb924fa22af1c7933e3ea0fe010ebefceaa2fd20e15b805012fd2d7a3e171a57996dc09dc5df4ce65f0c01e583247522e22d559c831115bca323aa68746a2dd9dc875023459b72e"}, {0x40, 0x88, 0x39, "e91254173524b71a6cf4982e471433e79bae7c4a781a2a354e5dcee630a99252345f0fe48a629be09093e130c018"}], 0x270}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000002c0)='block_bio_queue\x00'}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r1, 0x12, 0x1, 0x0, 0x0}, 0x20) r6 = openat$cgroup_ro(r0, &(0x7f0000000300)='cpuset.effective_mems\x00', 0x0, 0x0) openat$cgroup_freezer_state(r6, &(0x7f0000000380)='freezer.state\x00', 0x2, 0x0) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) socket$kcm(0x2b, 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a80)={0xffffffffffffffff, 0x0, 0x67, 0x62, &(0x7f0000000840)="f99a133c46d257d5200f326d0a5562cd17685e886bf2f9b3f9a2790348e08bc05a864a96cf5d232acf4d9c795667017ab2c3fa3c298204bcf30edef2ac8db7cbfdf4deae19c3fb8efa11f5d49f040b0731924ad772daa2861563518e94c736d15a5ac7a9872008", &(0x7f00000008c0)=""/98, 0x51a, 0x0, 0x1b, 0x0, &(0x7f0000000940)="5a4fa68ec2c72f99361b9b501348d1d5bce04f26173ed66a605e0c", &(0x7f0000000980)}, 0x48) 04:37:24 executing program 2: syz_mount_image$vxfs(&(0x7f00000127c0)='vxfs\x00', &(0x7f0000012800)='./file0\x00', 0x0, 0x0, 0x0, 0x4000, &(0x7f0000012a00)={[{'}'}]}) 04:37:24 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) setresuid(0x0, 0xee01, 0xffffffffffffffff) ioctl$TIOCSLCKTRMIOS(r0, 0x4b46, 0x0) 04:37:24 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) setresuid(0x0, 0xee01, 0xffffffffffffffff) ioctl$TIOCSLCKTRMIOS(r0, 0x560a, 0x0) 04:37:24 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000000)=[{0x0}, {&(0x7f0000000600)=""/233, 0xe9}], 0x2}, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x6611, 0x0) 04:37:24 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x11, 0x2, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) sendmsg(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000380)="9762", 0x2}], 0x1}, 0x0) getpid() ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0xffffff88, &(0x7f00000000c0)="b9ff0300290d698cb89e40f008001fffffff00004000632977", 0x0, 0x100, 0x6000000000000000}, 0x28) 04:37:24 executing program 5: setresuid(0x0, 0x0, 0xee00) r0 = fork() tkill(r0, 0x0) 04:37:24 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) setresuid(0x0, 0xee01, 0xffffffffffffffff) ioctl$TIOCSLCKTRMIOS(r0, 0x560a, 0x0) 04:37:24 executing program 2: syz_mount_image$vxfs(&(0x7f00000127c0)='vxfs\x00', &(0x7f0000012800)='./file0\x00', 0x0, 0x0, 0x0, 0x4000, &(0x7f0000012a00)={[{'}'}]}) 04:37:25 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000000)=[{0x0}, {&(0x7f0000000600)=""/233, 0xe9}], 0x2}, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x6611, 0x0) 04:37:25 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) setresuid(0x0, 0xee01, 0xffffffffffffffff) ioctl$TIOCSLCKTRMIOS(r0, 0x560a, 0x0) 04:37:25 executing program 5: setresuid(0x0, 0x0, 0xee00) r0 = fork() tkill(r0, 0x0) 04:37:25 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) r3 = socket$kcm(0x29, 0x7, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xa, 0x2, 0x400, 0xc}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000140), &(0x7f00000000c0), 0x1081, r4}, 0x38) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000000480), 0x8) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000006c0)=@bpf_ext={0x1c, 0x6, &(0x7f0000000100)=@raw=[@initr0, @map={0x18, 0x3, 0x1, 0x0, r4}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}], 0x0, 0x1, 0xf8, &(0x7f0000000580)=""/248, 0x0, 0x18, [], 0x0, 0x0, r5, 0x8, &(0x7f0000000500)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000680)={0x0, 0x3, 0x32c96647, 0x9}, 0x10, 0x28c14, r2}, 0x78) sendmsg$kcm(r3, &(0x7f00000004c0)={&(0x7f00000003c0)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, 0x0, 0x0, &(0x7f0000000bc0)=[{0x58, 0x0, 0x3f, "3d036b2fe1c920e033fd51a7135bc633687035d4990a07405974e24f3e4f5bc747dd8cb833517dba325fb8357ec60f4b737260519cbec967f1e58025da9b5821975edd2eb5ce0e"}, {0x120, 0xff, 0x0, "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"}, {0x20, 0x116, 0x100, "e12e82da376bca8fa03c53062e627e"}, {0x88, 0x109, 0x0, "48dcf8c1cb65b735b2d5007004b54696aa2a8d0eb98210cf2936121163b1c0584580900f864f0ebc03ba1675bbb924fa22af1c7933e3ea0fe010ebefceaa2fd20e15b805012fd2d7a3e171a57996dc09dc5df4ce65f0c01e583247522e22d559c831115bca323aa68746a2dd9dc875023459b72ec5"}, {0x40, 0x88, 0x39, "e91254173524b71a6cf4982e471433e79bae7c4a781a2a354e5dcee630a99252345f0fe48a629be09093e130c018"}], 0x260}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000002c0)='block_bio_queue\x00'}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r1, 0x12, 0x1, 0x0, 0x0}, 0x20) r6 = openat$cgroup_ro(r0, &(0x7f0000000300)='cpuset.effective_mems\x00', 0x0, 0x0) openat$cgroup_freezer_state(r6, &(0x7f0000000380)='freezer.state\x00', 0x2, 0x0) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) socket$kcm(0x2b, 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a80)={0xffffffffffffffff, 0x0, 0x67, 0x62, &(0x7f0000000840)="f99a133c46d257d5200f326d0a5562cd17685e886bf2f9b3f9a2790348e08bc05a864a96cf5d232acf4d9c795667017ab2c3fa3c298204bcf30edef2ac8db7cbfdf4deae19c3fb8efa11f5d49f040b0731924ad772daa2861563518e94c736d15a5ac7a9872008", &(0x7f00000008c0)=""/98, 0x51a, 0x0, 0x1b, 0x0, &(0x7f0000000940)="5a4fa68ec2c72f99361b9b501348d1d5bce04f26173ed66a605e0c", &(0x7f0000000980)}, 0x48) 04:37:25 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x11, 0x2, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) sendmsg(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000380)="97622c", 0x3}], 0x1}, 0x0) getpid() ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0xffffff88, &(0x7f00000000c0)="b9ff0300290d698cb89e40f008001fffffff00004000632977", 0x0, 0x100, 0x6000000000000000}, 0x28) 04:37:25 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) setresuid(0x0, 0xee01, 0xffffffffffffffff) ioctl$TIOCSLCKTRMIOS(r0, 0x560a, 0x0) 04:37:25 executing program 5: setresuid(0x0, 0x0, 0xee00) r0 = fork() tkill(r0, 0x0) 04:37:25 executing program 2: syz_mount_image$vxfs(&(0x7f00000127c0)='vxfs\x00', &(0x7f0000012800)='./file0\x00', 0x0, 0x0, 0x0, 0x4000, &(0x7f0000012a00)={[{'}'}]}) 04:37:25 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000000)=[{0x0}, {&(0x7f0000000600)=""/233, 0xe9}], 0x2}, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x6611, 0x0) 04:37:25 executing program 4: r0 = socket(0x2, 0x3, 0x47) r1 = dup(r0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8970, &(0x7f0000000000)={'batadv_slave_1\x00'}) 04:37:26 executing program 5: setresuid(0x0, 0x0, 0xee00) r0 = fork() tkill(r0, 0x0) 04:37:26 executing program 2: syz_mount_image$vxfs(&(0x7f00000127c0)='vxfs\x00', &(0x7f0000012800)='./file0\x00', 0x0, 0x1, &(0x7f0000012980)=[{&(0x7f0000012880)}], 0x4000, &(0x7f0000012a00)={[{'}'}]}) 04:37:26 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000000)=[{0x0}, {&(0x7f0000000600)=""/233, 0xe9}], 0x2}, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x6611, 0x0) 04:37:26 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x11, 0x2, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) sendmsg(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000fefffe7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010001000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000c9be17044171e1d3d7b196d079c4d4758fa35d17c668a4b6c5f6688e15308a1f8355410c0cec9a66819ce256b8530e31ec24925095a163b9d4e76be266e31a80382240baa44e080addde36e5fdc6c42a7b3f912f6906a6e2313091dd61258a1fda45991fbdce32bebcb3ac17c5146793e6a4785ee8b60092659b941bbd694d1f8898b3e6477afbda84355dba16801c89c08c07ce144961bfbb975b726a0b59b8c79321bc8d0093979391090e0ac8666d2500dd60794bf7cb8ef212f0452eb6415435ab4e6ee740327968dbb729b75a4244ee0f031e5a093bff037d9f7f76aaa845d819fa9f8d1cb2b0d2ec20bbb74d7b35421046847281aae5b1cc0fd183f68ff1bf9af98bacf1b91cf55debb0c8c027901f949834aec6764bce8586a9470f267b12e5ad2274f22103f30e5c1a119dce8693e94b92ae72abe72127d8d23884ea84c82c9d2f5ce635d2b997b21bb82f720095064fcd956de51de721d7f9bd85fec7afc6e6a79f9101e03b356cf1bb813e646dcd43d9a71ef270e3644067cdea1848e7e55a5164a1fb7a9010912fbf136a9721fa4c84f5494a267ea72f87412708bcd54815c4a1d38a999525f3335e5c8f2c2d1f5d7872cd9fa6fd4b86f2706048deb9588df7ed"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000380)="97622c", 0x3}], 0x1}, 0x0) getpid() ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0xffffff88, &(0x7f00000000c0)="b9ff0300290d698cb89e40f008001fffffff00004000632977", 0x0, 0x100, 0x6000000000000000}, 0x28) 04:37:26 executing program 4: r0 = socket(0x11, 0x3, 0x0) setsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x107, 0xe, 0x0, 0x4) [ 530.719633][T22198] vxfs: WRONG superblock magic 00000000 at 1 [ 530.773726][T22198] vxfs: WRONG superblock magic 00000000 at 8 [ 530.834190][T22198] vxfs: can't find superblock. 04:37:26 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) r3 = socket$kcm(0x29, 0x7, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xa, 0x2, 0x400, 0xc}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000140), &(0x7f00000000c0), 0x1081, r4}, 0x38) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000000480), 0x8) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000006c0)=@bpf_ext={0x1c, 0x6, &(0x7f0000000100)=@raw=[@initr0, @map={0x18, 0x3, 0x1, 0x0, r4}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}], 0x0, 0x1, 0xf8, &(0x7f0000000580)=""/248, 0x0, 0x18, [], 0x0, 0x0, r5, 0x8, &(0x7f0000000500)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000680)={0x0, 0x3, 0x32c96647, 0x9}, 0x10, 0x28c14, r2}, 0x78) sendmsg$kcm(r3, &(0x7f00000004c0)={&(0x7f00000003c0)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, 0x0, 0x0, &(0x7f0000000bc0)=[{0x58, 0x0, 0x3f, "3d036b2fe1c920e033fd51a7135bc633687035d4990a07405974e24f3e4f5bc747dd8cb833517dba325fb8357ec60f4b737260519cbec967f1e58025da9b5821975edd2eb5ce0e"}, {0x120, 0xff, 0x0, "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"}, {0x20, 0x116, 0x100, "e12e82da376bca8fa03c53062e627e"}, {0x88, 0x109, 0x0, "48dcf8c1cb65b735b2d5007004b54696aa2a8d0eb98210cf2936121163b1c0584580900f864f0ebc03ba1675bbb924fa22af1c7933e3ea0fe010ebefceaa2fd20e15b805012fd2d7a3e171a57996dc09dc5df4ce65f0c01e583247522e22d559c831115bca323aa68746a2dd9dc875023459b72ec5"}, {0x40, 0x88, 0x39, "e91254173524b71a6cf4982e471433e79bae7c4a781a2a354e5dcee630a99252345f0fe48a629be09093e130c018"}], 0x260}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000002c0)='block_bio_queue\x00'}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r1, 0x12, 0x1, 0x0, 0x0}, 0x20) r6 = openat$cgroup_ro(r0, &(0x7f0000000300)='cpuset.effective_mems\x00', 0x0, 0x0) openat$cgroup_freezer_state(r6, &(0x7f0000000380)='freezer.state\x00', 0x2, 0x0) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) socket$kcm(0x2b, 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a80)={0xffffffffffffffff, 0x0, 0x67, 0x62, &(0x7f0000000840)="f99a133c46d257d5200f326d0a5562cd17685e886bf2f9b3f9a2790348e08bc05a864a96cf5d232acf4d9c795667017ab2c3fa3c298204bcf30edef2ac8db7cbfdf4deae19c3fb8efa11f5d49f040b0731924ad772daa2861563518e94c736d15a5ac7a9872008", &(0x7f00000008c0)=""/98, 0x51a, 0x0, 0x1b, 0x0, &(0x7f0000000940)="5a4fa68ec2c72f99361b9b501348d1d5bce04f26173ed66a605e0c", &(0x7f0000000980)}, 0x48) 04:37:26 executing program 5: r0 = socket(0x11, 0xa, 0x0) setsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x107, 0x2, 0x0, 0x0) 04:37:26 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000000)=[{0x0}, {&(0x7f0000000600)=""/233, 0xe9}], 0x2}, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x6611, 0x0) 04:37:26 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) setresuid(0x0, 0xee01, 0xffffffffffffffff) ioctl$TIOCSLCKTRMIOS(r0, 0x5603, 0x0) 04:37:26 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x11, 0x2, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) sendmsg(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000380)="97622c", 0x3}], 0x1}, 0x0) getpid() ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0xffffff88, &(0x7f00000000c0)="b9ff0300290d698cb89e40f008001fffffff00004000632977", 0x0, 0x100, 0x6000000000000000}, 0x28) 04:37:26 executing program 2: syz_mount_image$vxfs(&(0x7f00000127c0)='vxfs\x00', &(0x7f0000012800)='./file0\x00', 0x0, 0x0, &(0x7f0000012980), 0x4000, &(0x7f0000012a00)={[{'}'}]}) 04:37:27 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockname(r0, &(0x7f0000000080)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, &(0x7f0000000000)=0x80) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r1, 0x89fb, 0x0) 04:37:27 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) setresuid(0x0, 0xee01, 0xffffffffffffffff) ioctl$TIOCSLCKTRMIOS(r0, 0x4b49, 0x0) [ 531.367114][T22218] vxfs: WRONG superblock magic 00000000 at 1 [ 531.452860][T22218] vxfs: WRONG superblock magic 00000000 at 8 [ 531.512997][T22218] vxfs: can't find superblock. 04:37:27 executing program 4: r0 = socket(0x10, 0x3, 0x0) r1 = fork() r2 = getegid() sendmsg$netlink(r0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r1, @ANYRES32=0x0, @ANYRES32=r2, @ANYBLOB="000000001c"], 0x58}, 0x0) 04:37:27 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000000)=[{0x0}, {&(0x7f0000000600)=""/233, 0xe9}], 0x2}, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x6611, 0x0) 04:37:27 executing program 2: syz_mount_image$vxfs(&(0x7f00000127c0)='vxfs\x00', &(0x7f0000012800)='./file0\x00', 0x0, 0x0, &(0x7f0000012980), 0x4000, &(0x7f0000012a00)={[{'}'}]}) 04:37:27 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x11, 0x2, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) sendmsg(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000fefffe7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010001000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000c9be17044171e1d3d7b196d079c4d4758fa35d17c668a4b6c5f6688e15308a1f8355410c0cec9a66819ce256b8530e31ec24925095a163b9d4e76be266e31a80382240baa44e080addde36e5fdc6c42a7b3f912f6906a6e2313091dd61258a1fda45991fbdce32bebcb3ac17c5146793e6a4785ee8b60092659b941bbd694d1f8898b3e6477afbda84355dba16801c89c08c07ce144961bfbb975b726a0b59b8c79321bc8d0093979391090e0ac8666d2500dd60794bf7cb8ef212f0452eb6415435ab4e6ee740327968dbb729b75a4244ee0f031e5a093bff037d9f7f76aaa845d819fa9f8d1cb2b0d2ec20bbb74d7b35421046847281aae5b1cc0fd183f68ff1bf9af98bacf1b91cf55debb0c8c027901f949834aec6764bce8586a9470f267b12e5ad2274f22103f30e5c1a119dce8693e94b92ae72abe72127d8d23884ea84c82c9d2f5ce635d2b997b21bb82f720095064fcd956de51de721d7f9bd85fec7afc6e6a79f9101e03b356cf1bb813e646dcd43d9a71ef270e3644067cdea1848e7e55a5164a1fb7a9010912fbf136a9721fa4c84f5494a267ea72f87412708bcd54815c4a1d38a999525f3335e5c8f2c2d1f5d7872cd9fa6fd4b86f2706048deb9588df7ed"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000380)="97622c", 0x3}], 0x1}, 0x0) getpid() ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) [ 531.963143][T22241] vxfs: WRONG superblock magic 00000000 at 1 [ 532.015106][T22241] vxfs: WRONG superblock magic 00000000 at 8 [ 532.069925][T22241] vxfs: can't find superblock. 04:37:27 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) r3 = socket$kcm(0x29, 0x7, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xa, 0x2, 0x400, 0xc}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000140), &(0x7f00000000c0), 0x1081, r4}, 0x38) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000000480), 0x8) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000006c0)=@bpf_ext={0x1c, 0x6, &(0x7f0000000100)=@raw=[@initr0, @map={0x18, 0x3, 0x1, 0x0, r4}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}], 0x0, 0x1, 0xf8, &(0x7f0000000580)=""/248, 0x0, 0x18, [], 0x0, 0x0, r5, 0x8, &(0x7f0000000500)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000680)={0x0, 0x3, 0x32c96647, 0x9}, 0x10, 0x28c14, r2}, 0x78) sendmsg$kcm(r3, &(0x7f00000004c0)={&(0x7f00000003c0)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, 0x0, 0x0, &(0x7f0000000bc0)=[{0x58, 0x0, 0x3f, "3d036b2fe1c920e033fd51a7135bc633687035d4990a07405974e24f3e4f5bc747dd8cb833517dba325fb8357ec60f4b737260519cbec967f1e58025da9b5821975edd2eb5ce0e"}, {0x120, 0xff, 0x0, "66a36a9455eecacdd8c163586fbbda03204764abc3a8c9654d37d7c1a2f0137331fa2fc3c6b9c55a1cac3388716c8a76fc203090f4b9a8d9e4e4383140f03e4a858b012a4be6e9627a6c3c2cad945b7222473303ee4ad9cdf1f140621bf10baaf72506be7d90008df69e4c604be55e65d97d52d2badc2bc54195891c461c0f3500918123efc1e58ba54cee893f87f33cfef3bcb68cac978aa5771ed9240b9cf9e44c0f9dc631daaa13163c7cfa501090e5f3800ba5f26eaade9b17afd51fb7a9dee8f4b64db02d16f940369bcc3e3f6aaed6a980b9bef7f37844519af3e31b6887d4daad7bc530e9a2c04fc6f0e4717820569dbc831ef37c4bf3b8733f353ed53179f0ce0a8b9ac8c05b1b1a3f0e12"}, {0x20, 0x116, 0x100, "e12e82da376bca8fa03c53062e627e"}, {0x88, 0x109, 0x0, "48dcf8c1cb65b735b2d5007004b54696aa2a8d0eb98210cf2936121163b1c0584580900f864f0ebc03ba1675bbb924fa22af1c7933e3ea0fe010ebefceaa2fd20e15b805012fd2d7a3e171a57996dc09dc5df4ce65f0c01e583247522e22d559c831115bca323aa68746a2dd9dc875023459b72ec5"}, {0x40, 0x88, 0x39, "e91254173524b71a6cf4982e471433e79bae7c4a781a2a354e5dcee630a99252345f0fe48a629be09093e130c018"}], 0x260}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000002c0)='block_bio_queue\x00'}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r1, 0x12, 0x1, 0x0, 0x0}, 0x20) r6 = openat$cgroup_ro(r0, &(0x7f0000000300)='cpuset.effective_mems\x00', 0x0, 0x0) openat$cgroup_freezer_state(r6, &(0x7f0000000380)='freezer.state\x00', 0x2, 0x0) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) socket$kcm(0x2b, 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a80)={0xffffffffffffffff, 0x0, 0x67, 0x62, &(0x7f0000000840)="f99a133c46d257d5200f326d0a5562cd17685e886bf2f9b3f9a2790348e08bc05a864a96cf5d232acf4d9c795667017ab2c3fa3c298204bcf30edef2ac8db7cbfdf4deae19c3fb8efa11f5d49f040b0731924ad772daa2861563518e94c736d15a5ac7a9872008", &(0x7f00000008c0)=""/98, 0x51a, 0x0, 0x1b, 0x0, &(0x7f0000000940)="5a4fa68ec2c72f99361b9b501348d1d5bce04f26173ed66a605e0c", &(0x7f0000000980)}, 0x48) 04:37:27 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@RTM_NEWMDB={0x18, 0x54, 0x1}, 0x18}}, 0x0) 04:37:27 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_LIST(r0, &(0x7f0000000880)={0x0, 0x0, &(0x7f0000000840)={0x0}}, 0x0) 04:37:27 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x11, 0x2, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) sendmsg(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000380)="97622c", 0x3}], 0x1}, 0x0) getpid() ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) 04:37:27 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000000)=[{0x0}, {&(0x7f0000000600)=""/233, 0xe9}], 0x2}, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x6611, 0x0) 04:37:27 executing program 2: syz_mount_image$vxfs(&(0x7f00000127c0)='vxfs\x00', &(0x7f0000012800)='./file0\x00', 0x0, 0x0, &(0x7f0000012980), 0x0, &(0x7f0000012a00)={[{'}'}]}) 04:37:28 executing program 5: syz_usb_connect$printer(0x0, 0x2d, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x20, 0x525, 0xa4a8, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x1b, 0x1}}]}}, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x2, [{0x38, 0x0}, {0x0, 0x0}]}) 04:37:28 executing program 4: r0 = socket(0x28, 0x1, 0x0) sendmsg$NL80211_CMD_TDLS_MGMT(r0, &(0x7f00000001c0)={&(0x7f0000000000), 0xc, &(0x7f0000000180)={0x0}}, 0x0) 04:37:28 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x11, 0x2, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) sendmsg(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000380)="97622c", 0x3}], 0x1}, 0x0) getpid() ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) [ 532.367949][T22255] vxfs: WRONG superblock magic 00000000 at 1 [ 532.416395][T22255] vxfs: WRONG superblock magic 00000000 at 8 04:37:28 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_CCA_ED_LEVEL(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={0x0}}, 0x0) sendmsg$NLBL_CALIPSO_C_REMOVE(r0, &(0x7f0000000980)={0x0, 0x0, &(0x7f0000000940)={0x0}}, 0x0) [ 532.465782][T22255] vxfs: can't find superblock. 04:37:28 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000000)=[{0x0}, {&(0x7f0000000600)=""/233, 0xe9}], 0x2}, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x6611, 0x0) 04:37:28 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x11, 0x2, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) sendmsg(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000380)="97622c", 0x3}], 0x1}, 0x0) getpid() ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x2d1, 0xffffff88, &(0x7f00000000c0)="b9ff0300290d698cb89e40f008001fffffff00004000632977", 0x0, 0x100, 0x6000000000000000}, 0x28) [ 532.745654][ T9752] usb 6-1: new high-speed USB device number 93 using dummy_hcd [ 532.987681][ T9752] usb 6-1: Using ep0 maxpacket: 32 04:37:28 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) r3 = socket$kcm(0x29, 0x7, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xa, 0x2, 0x400, 0xc}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000140), &(0x7f00000000c0), 0x1081, r4}, 0x38) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000000480), 0x8) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000006c0)=@bpf_ext={0x1c, 0x6, &(0x7f0000000100)=@raw=[@initr0, @map={0x18, 0x3, 0x1, 0x0, r4}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}], 0x0, 0x1, 0xf8, &(0x7f0000000580)=""/248, 0x0, 0x18, [], 0x0, 0x0, r5, 0x8, &(0x7f0000000500)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000680)={0x0, 0x3, 0x32c96647, 0x9}, 0x10, 0x28c14, r2}, 0x78) sendmsg$kcm(r3, &(0x7f00000004c0)={&(0x7f00000003c0)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, 0x0, 0x0, &(0x7f0000000bc0)=[{0x58, 0x0, 0x3f, "3d036b2fe1c920e033fd51a7135bc633687035d4990a07405974e24f3e4f5bc747dd8cb833517dba325fb8357ec60f4b737260519cbec967f1e58025da9b5821975edd2eb5ce0e"}, {0x120, 0xff, 0x0, "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"}, {0x20, 0x116, 0x100, "e12e82da376bca8fa03c53062e627e"}, {0x10}, {0x88, 0x109, 0x0, "48dcf8c1cb65b735b2d5007004b54696aa2a8d0eb98210cf2936121163b1c0584580900f864f0ebc03ba1675bbb924fa22af1c7933e3ea0fe010ebefceaa2fd20e15b805012fd2d7a3e171a57996dc09dc5df4ce65f0c01e583247522e22d559c831115bca323aa68746a2dd9dc875023459b72ec5"}, {0x40, 0x88, 0x39, "e91254173524b71a6cf4982e471433e79bae7c4a781a2a354e5dcee630a99252345f0fe48a629be09093e130c018"}], 0x270}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000002c0)='block_bio_queue\x00'}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r1, 0x12, 0x1, 0x0, 0x0}, 0x20) r6 = openat$cgroup_ro(r0, &(0x7f0000000300)='cpuset.effective_mems\x00', 0x0, 0x0) openat$cgroup_freezer_state(r6, &(0x7f0000000380)='freezer.state\x00', 0x2, 0x0) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) socket$kcm(0x2b, 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a80)={0xffffffffffffffff, 0x0, 0x67, 0x62, &(0x7f0000000840)="f99a133c46d257d5200f326d0a5562cd17685e886bf2f9b3f9a2790348e08bc05a864a96cf5d232acf4d9c795667017ab2c3fa3c298204bcf30edef2ac8db7cbfdf4deae19c3fb8efa11f5d49f040b0731924ad772daa2861563518e94c736d15a5ac7a9872008", &(0x7f00000008c0)=""/98, 0x51a, 0x0, 0x1b, 0x0, &(0x7f0000000940)="5a4fa68ec2c72f99361b9b501348d1d5bce04f26173ed66a605e0c", &(0x7f0000000980)}, 0x48) 04:37:28 executing program 4: openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/bus/input/devices\x00', 0x0, 0x0) pselect6(0x40, &(0x7f0000000340), &(0x7f00000001c0)={0x9}, 0x0, 0x0, 0x0) 04:37:28 executing program 2: syz_mount_image$vxfs(&(0x7f00000127c0)='vxfs\x00', &(0x7f0000012800)='./file0\x00', 0x0, 0x0, &(0x7f0000012980), 0x0, &(0x7f0000012a00)={[{'}'}]}) 04:37:28 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x11, 0x2, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) sendmsg(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000380)="97622c", 0x3}], 0x1}, 0x0) getpid() ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x2d1, 0xffffff88, &(0x7f00000000c0)="b9ff0300290d698cb89e40f008001fffffff00004000632977", 0x0, 0x100, 0x6000000000000000}, 0x28) 04:37:28 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000000)=[{0x0}, {&(0x7f0000000600)=""/233, 0xe9}], 0x2}, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x6611, 0x0) [ 533.106409][ T9752] usb 6-1: config 1 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 0 04:37:28 executing program 4: openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/bus/input/devices\x00', 0x0, 0x0) pselect6(0x40, &(0x7f0000000340), &(0x7f00000001c0)={0x9}, 0x0, 0x0, 0x0) [ 533.290485][T22287] vxfs: WRONG superblock magic 00000000 at 1 [ 533.329363][T22287] vxfs: WRONG superblock magic 00000000 at 8 [ 533.379505][T22287] vxfs: can't find superblock. [ 533.386591][ T9752] usb 6-1: language id specifier not provided by device, defaulting to English [ 533.725590][ T9752] usb 6-1: New USB device found, idVendor=0525, idProduct=a4a8, bcdDevice= 0.40 [ 533.735469][ T9752] usb 6-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 533.743576][ T9752] usb 6-1: Product: syz [ 533.750081][ T9752] usb 6-1: SerialNumber: syz [ 534.002236][ T9752] usb 6-1: USB disconnect, device number 93 [ 534.775385][ T9752] usb 6-1: new high-speed USB device number 94 using dummy_hcd [ 535.026039][ T9752] usb 6-1: Using ep0 maxpacket: 32 [ 535.146044][ T9752] usb 6-1: config 1 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 0 04:37:31 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGKBTYPE(r0, 0x2, &(0x7f0000000200)) 04:37:31 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x11, 0x2, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) sendmsg(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000380)="97622c", 0x3}], 0x1}, 0x0) getpid() ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x2d1, 0xffffff88, &(0x7f00000000c0)="b9ff0300290d698cb89e40f008001fffffff00004000632977", 0x0, 0x100, 0x6000000000000000}, 0x28) 04:37:31 executing program 4: openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/bus/input/devices\x00', 0x0, 0x0) pselect6(0x40, &(0x7f0000000340), &(0x7f00000001c0)={0x9}, 0x0, 0x0, 0x0) 04:37:31 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000000)=[{0x0}, {&(0x7f0000000600)=""/233, 0xe9}], 0x2}, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x6611, 0x0) 04:37:31 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) r3 = socket$kcm(0x29, 0x7, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xa, 0x2, 0x400, 0xc}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000140), &(0x7f00000000c0), 0x1081, r4}, 0x38) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000000480), 0x8) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000006c0)=@bpf_ext={0x1c, 0x6, &(0x7f0000000100)=@raw=[@initr0, @map={0x18, 0x3, 0x1, 0x0, r4}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}], 0x0, 0x1, 0xf8, &(0x7f0000000580)=""/248, 0x0, 0x18, [], 0x0, 0x0, r5, 0x8, &(0x7f0000000500)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000680)={0x0, 0x3, 0x32c96647, 0x9}, 0x10, 0x28c14, r2}, 0x78) sendmsg$kcm(r3, &(0x7f00000004c0)={&(0x7f00000003c0)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, 0x0, 0x0, &(0x7f0000000bc0)=[{0x58, 0x0, 0x3f, "3d036b2fe1c920e033fd51a7135bc633687035d4990a07405974e24f3e4f5bc747dd8cb833517dba325fb8357ec60f4b737260519cbec967f1e58025da9b5821975edd2eb5ce0e"}, {0x120, 0xff, 0x0, "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"}, {0x20, 0x116, 0x100, "e12e82da376bca8fa03c53062e627e"}, {0x10}, {0x88, 0x109, 0x0, "48dcf8c1cb65b735b2d5007004b54696aa2a8d0eb98210cf2936121163b1c0584580900f864f0ebc03ba1675bbb924fa22af1c7933e3ea0fe010ebefceaa2fd20e15b805012fd2d7a3e171a57996dc09dc5df4ce65f0c01e583247522e22d559c831115bca323aa68746a2dd9dc875023459b72ec5"}, {0x40, 0x88, 0x39, "e91254173524b71a6cf4982e471433e79bae7c4a781a2a354e5dcee630a99252345f0fe48a629be09093e130c018"}], 0x270}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000002c0)='block_bio_queue\x00'}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r1, 0x12, 0x1, 0x0, 0x0}, 0x20) r6 = openat$cgroup_ro(r0, &(0x7f0000000300)='cpuset.effective_mems\x00', 0x0, 0x0) openat$cgroup_freezer_state(r6, &(0x7f0000000380)='freezer.state\x00', 0x2, 0x0) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) socket$kcm(0x2b, 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a80)={0xffffffffffffffff, 0x0, 0x67, 0x62, &(0x7f0000000840)="f99a133c46d257d5200f326d0a5562cd17685e886bf2f9b3f9a2790348e08bc05a864a96cf5d232acf4d9c795667017ab2c3fa3c298204bcf30edef2ac8db7cbfdf4deae19c3fb8efa11f5d49f040b0731924ad772daa2861563518e94c736d15a5ac7a9872008", &(0x7f00000008c0)=""/98, 0x51a, 0x0, 0x1b, 0x0, &(0x7f0000000940)="5a4fa68ec2c72f99361b9b501348d1d5bce04f26173ed66a605e0c", &(0x7f0000000980)}, 0x48) 04:37:31 executing program 2: syz_mount_image$vxfs(&(0x7f00000127c0)='vxfs\x00', &(0x7f0000012800)='./file0\x00', 0x0, 0x0, &(0x7f0000012980), 0x0, &(0x7f0000012a00)={[{'}'}]}) [ 535.417614][ T9752] usb 6-1: language id specifier not provided by device, defaulting to English 04:37:31 executing program 4: openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/bus/input/devices\x00', 0x0, 0x0) pselect6(0x40, &(0x7f0000000340), &(0x7f00000001c0)={0x9}, 0x0, 0x0, 0x0) 04:37:31 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x11, 0x2, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) sendmsg(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000380)="97622c", 0x3}], 0x1}, 0x0) getpid() ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x6000000000000000}, 0x48) [ 535.585565][ T9752] usb 6-1: New USB device found, idVendor=0525, idProduct=a4a8, bcdDevice= 0.40 [ 535.594714][ T9752] usb 6-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 535.623025][T22319] vxfs: WRONG superblock magic 00000000 at 1 04:37:31 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) setresuid(0x0, 0xee01, 0xffffffffffffffff) ioctl$TIOCSLCKTRMIOS(r0, 0x4b6c, 0x0) [ 535.665410][ T9752] usb 6-1: can't set config #1, error -71 [ 535.676630][T22319] vxfs: WRONG superblock magic 00000000 at 8 [ 535.684171][ T9752] usb 6-1: USB disconnect, device number 94 04:37:31 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) setresuid(0x0, 0xee01, 0xffffffffffffffff) ioctl$TIOCSLCKTRMIOS(r0, 0x5437, 0x0) 04:37:31 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000000)=[{0x0}, {&(0x7f0000000600)=""/233, 0xe9}], 0x2}, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x6611, 0x0) [ 535.728569][T22319] vxfs: can't find superblock. 04:37:31 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x11, 0x2, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) sendmsg(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000380)="97622c", 0x3}], 0x1}, 0x0) getpid() ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x6000000000000000}, 0x48) 04:37:31 executing program 5: r0 = socket(0x2, 0x3, 0x47) r1 = dup(r0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8942, &(0x7f0000000000)={'batadv_slave_1\x00'}) 04:37:31 executing program 4: r0 = socket(0x2, 0x3, 0x47) setsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, 0x0) 04:37:31 executing program 2: syz_mount_image$vxfs(&(0x7f00000127c0)='vxfs\x00', &(0x7f0000012800)='./file0\x00', 0x0, 0x0, &(0x7f0000012980), 0x0, 0x0) 04:37:31 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x11, 0x2, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) sendmsg(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000fefffe7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010001000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000c9be17044171e1d3d7b196d079c4d4758fa35d17c668a4b6c5f6688e15308a1f8355410c0cec9a66819ce256b8530e31ec24925095a163b9d4e76be266e31a80382240baa44e080addde36e5fdc6c42a7b3f912f6906a6e2313091dd61258a1fda45991fbdce32bebcb3ac17c5146793e6a4785ee8b60092659b941bbd694d1f8898b3e6477afbda84355dba16801c89c08c07ce144961bfbb975b726a0b59b8c79321bc8d0093979391090e0ac8666d2500dd60794bf7cb8ef212f0452eb6415435ab4e6ee740327968dbb729b75a4244ee0f031e5a093bff037d9f7f76aaa845d819fa9f8d1cb2b0d2ec20bbb74d7b35421046847281aae5b1cc0fd183f68ff1bf9af98bacf1b91cf55debb0c8c027901f949834aec6764bce8586a9470f267b12e5ad2274f22103f30e5c1a119dce8693e94b92ae72abe72127d8d23884ea84c82c9d2f5ce635d2b997b21bb82f720095064fcd956de51de721d7f9bd85fec7afc6e6a79f9101e03b356cf1bb813e646dcd43d9a71ef270e3644067cdea1848e7e55a5164a1fb7a9010912fbf136a9721fa4c84f5494a267ea72f87412708bcd54815c4a1d38a999525f3335e5c8f2c2d1f5d7872cd9fa6fd4b86f2706048deb9588df7ed"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000380)="97622c", 0x3}], 0x1}, 0x0) getpid() ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x6000000000000000}, 0x48) 04:37:32 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) r3 = socket$kcm(0x29, 0x7, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xa, 0x2, 0x400, 0xc}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000140), &(0x7f00000000c0), 0x1081, r4}, 0x38) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000000480), 0x8) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000006c0)=@bpf_ext={0x1c, 0x6, &(0x7f0000000100)=@raw=[@initr0, @map={0x18, 0x3, 0x1, 0x0, r4}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}], 0x0, 0x1, 0xf8, &(0x7f0000000580)=""/248, 0x0, 0x18, [], 0x0, 0x0, r5, 0x8, &(0x7f0000000500)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000680)={0x0, 0x3, 0x32c96647, 0x9}, 0x10, 0x28c14, r2}, 0x78) sendmsg$kcm(r3, &(0x7f00000004c0)={&(0x7f00000003c0)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, 0x0, 0x0, &(0x7f0000000bc0)=[{0x58, 0x0, 0x3f, "3d036b2fe1c920e033fd51a7135bc633687035d4990a07405974e24f3e4f5bc747dd8cb833517dba325fb8357ec60f4b737260519cbec967f1e58025da9b5821975edd2eb5ce0e"}, {0x120, 0xff, 0x0, "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"}, {0x20, 0x116, 0x100, "e12e82da376bca8fa03c53062e627e"}, {0x10}, {0x88, 0x109, 0x0, "48dcf8c1cb65b735b2d5007004b54696aa2a8d0eb98210cf2936121163b1c0584580900f864f0ebc03ba1675bbb924fa22af1c7933e3ea0fe010ebefceaa2fd20e15b805012fd2d7a3e171a57996dc09dc5df4ce65f0c01e583247522e22d559c831115bca323aa68746a2dd9dc875023459b72ec5"}, {0x40, 0x88, 0x39, "e91254173524b71a6cf4982e471433e79bae7c4a781a2a354e5dcee630a99252345f0fe48a629be09093e130c018"}], 0x270}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000002c0)='block_bio_queue\x00'}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r1, 0x12, 0x1, 0x0, 0x0}, 0x20) r6 = openat$cgroup_ro(r0, &(0x7f0000000300)='cpuset.effective_mems\x00', 0x0, 0x0) openat$cgroup_freezer_state(r6, &(0x7f0000000380)='freezer.state\x00', 0x2, 0x0) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) socket$kcm(0x2b, 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a80)={0xffffffffffffffff, 0x0, 0x67, 0x62, &(0x7f0000000840)="f99a133c46d257d5200f326d0a5562cd17685e886bf2f9b3f9a2790348e08bc05a864a96cf5d232acf4d9c795667017ab2c3fa3c298204bcf30edef2ac8db7cbfdf4deae19c3fb8efa11f5d49f040b0731924ad772daa2861563518e94c736d15a5ac7a9872008", &(0x7f00000008c0)=""/98, 0x51a, 0x0, 0x1b, 0x0, &(0x7f0000000940)="5a4fa68ec2c72f99361b9b501348d1d5bce04f26173ed66a605e0c", &(0x7f0000000980)}, 0x48) 04:37:32 executing program 5: socketpair(0xc5673fb8911505c0, 0x0, 0x0, &(0x7f00000001c0)) 04:37:32 executing program 4: openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x121442, 0x0) 04:37:32 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x11, 0x2, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) sendmsg(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000380)="97622c", 0x3}], 0x1}, 0x0) getpid() ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x100, 0x6000000000000000}, 0x48) 04:37:32 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000000)=[{0x0}, {&(0x7f0000000600)=""/233, 0xe9}], 0x2}, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x6611, 0x0) 04:37:32 executing program 2: syz_mount_image$vxfs(&(0x7f00000127c0)='vxfs\x00', &(0x7f0000012800)='./file0\x00', 0x0, 0x0, &(0x7f0000012980), 0x0, 0x0) 04:37:32 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) mmap$xdp(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2000006, 0x10, r0, 0x0) 04:37:32 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$netlink(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000080)={0x10, 0x40, 0x1}, 0x10}], 0x1}, 0x0) 04:37:32 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x11, 0x2, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) sendmsg(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000fefffe7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010001000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000c9be17044171e1d3d7b196d079c4d4758fa35d17c668a4b6c5f6688e15308a1f8355410c0cec9a66819ce256b8530e31ec24925095a163b9d4e76be266e31a80382240baa44e080addde36e5fdc6c42a7b3f912f6906a6e2313091dd61258a1fda45991fbdce32bebcb3ac17c5146793e6a4785ee8b60092659b941bbd694d1f8898b3e6477afbda84355dba16801c89c08c07ce144961bfbb975b726a0b59b8c79321bc8d0093979391090e0ac8666d2500dd60794bf7cb8ef212f0452eb6415435ab4e6ee740327968dbb729b75a4244ee0f031e5a093bff037d9f7f76aaa845d819fa9f8d1cb2b0d2ec20bbb74d7b35421046847281aae5b1cc0fd183f68ff1bf9af98bacf1b91cf55debb0c8c027901f949834aec6764bce8586a9470f267b12e5ad2274f22103f30e5c1a119dce8693e94b92ae72abe72127d8d23884ea84c82c9d2f5ce635d2b997b21bb82f720095064fcd956de51de721d7f9bd85fec7afc6e6a79f9101e03b356cf1bb813e646dcd43d9a71ef270e3644067cdea1848e7e55a5164a1fb7a9010912fbf136a9721fa4c84f5494a267ea72f87412708bcd54815c4a1d38a999525f3335e5c8f2c2d1f5d7872cd9fa6fd4b86f2706048deb9588df7ed"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000380)="97622c", 0x3}], 0x1}, 0x0) getpid() ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x100, 0x6000000000000000}, 0x48) 04:37:32 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000000)=[{0x0}, {&(0x7f0000000600)=""/233, 0xe9}], 0x2}, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x6611, 0x0) 04:37:32 executing program 2: syz_mount_image$vxfs(&(0x7f00000127c0)='vxfs\x00', &(0x7f0000012800)='./file0\x00', 0x0, 0x0, &(0x7f0000012980), 0x0, 0x0) 04:37:32 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGKBTYPE(r0, 0x5600, &(0x7f0000000200)) 04:37:32 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) r3 = socket$kcm(0x29, 0x7, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xa, 0x2, 0x400, 0xc}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000140), &(0x7f00000000c0), 0x1081, r4}, 0x38) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000000480), 0x8) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000006c0)=@bpf_ext={0x1c, 0x6, &(0x7f0000000100)=@raw=[@initr0, @map={0x18, 0x3, 0x1, 0x0, r4}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}], 0x0, 0x1, 0xf8, &(0x7f0000000580)=""/248, 0x0, 0x18, [], 0x0, 0x0, r5, 0x8, &(0x7f0000000500)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000680)={0x0, 0x3, 0x32c96647, 0x9}, 0x10, 0x28c14, r2}, 0x78) sendmsg$kcm(r3, &(0x7f00000004c0)={&(0x7f00000003c0)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, 0x0, 0x0, &(0x7f0000000bc0)=[{0x58, 0x0, 0x3f, "3d036b2fe1c920e033fd51a7135bc633687035d4990a07405974e24f3e4f5bc747dd8cb833517dba325fb8357ec60f4b737260519cbec967f1e58025da9b5821975edd2eb5ce0e"}, {0x120, 0xff, 0x0, "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"}, {0x10, 0x0, 0xa11}, {0x88, 0x109, 0x0, "48dcf8c1cb65b735b2d5007004b54696aa2a8d0eb98210cf2936121163b1c0584580900f864f0ebc03ba1675bbb924fa22af1c7933e3ea0fe010ebefceaa2fd20e15b805012fd2d7a3e171a57996dc09dc5df4ce65f0c01e583247522e22d559c831115bca323aa68746a2dd9dc875023459b72ec5"}, {0x40, 0x88, 0x39, "e91254173524b71a6cf4982e471433e79bae7c4a781a2a354e5dcee630a99252345f0fe48a629be09093e130c018"}], 0x250}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000002c0)='block_bio_queue\x00'}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r1, 0x12, 0x1, 0x0, 0x0}, 0x20) r6 = openat$cgroup_ro(r0, &(0x7f0000000300)='cpuset.effective_mems\x00', 0x0, 0x0) openat$cgroup_freezer_state(r6, &(0x7f0000000380)='freezer.state\x00', 0x2, 0x0) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) socket$kcm(0x2b, 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a80)={0xffffffffffffffff, 0x0, 0x67, 0x62, &(0x7f0000000840)="f99a133c46d257d5200f326d0a5562cd17685e886bf2f9b3f9a2790348e08bc05a864a96cf5d232acf4d9c795667017ab2c3fa3c298204bcf30edef2ac8db7cbfdf4deae19c3fb8efa11f5d49f040b0731924ad772daa2861563518e94c736d15a5ac7a9872008", &(0x7f00000008c0)=""/98, 0x51a, 0x0, 0x1b, 0x0, &(0x7f0000000940)="5a4fa68ec2c72f99361b9b501348d1d5bce04f26173ed66a605e0c", &(0x7f0000000980)}, 0x48) 04:37:32 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) setresuid(0x0, 0xee01, 0xffffffffffffffff) ioctl$TIOCSLCKTRMIOS(r0, 0x4b69, 0x0) 04:37:32 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x11, 0x2, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) sendmsg(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000380)="97622c", 0x3}], 0x1}, 0x0) getpid() ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x100, 0x6000000000000000}, 0x48) 04:37:32 executing program 5: r0 = socket$pppl2tp(0x18, 0x1, 0x1) connect(r0, 0x0, 0x0) 04:37:32 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000000)=[{0x0}, {&(0x7f0000000600)=""/233, 0xe9}], 0x2}, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x6611, 0x0) 04:37:32 executing program 2: syz_mount_image$vxfs(&(0x7f00000127c0)='vxfs\x00', &(0x7f0000012800)='./file0\x00', 0x0, 0x0, &(0x7f0000012980), 0x0, &(0x7f0000012a00)) 04:37:33 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) connect$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0x0, @none}, 0xe) 04:37:33 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) setresuid(0x0, 0xee01, 0xffffffffffffffff) ioctl$TIOCSLCKTRMIOS(r0, 0x4b69, 0x0) 04:37:33 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x11, 0x2, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) sendmsg(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000380)="97622c", 0x3}], 0x1}, 0x0) getpid() ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0xd, 0x0, &(0x7f00000000c0)="b9ff0300290d698cb89e40f008", 0x0, 0x100, 0x6000000000000000}, 0x48) [ 537.334258][T22404] vxfs: WRONG superblock magic 00000000 at 1 [ 537.395932][T22404] vxfs: WRONG superblock magic 00000000 at 8 04:37:33 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000000)=[{0x0}, {&(0x7f0000000600)=""/233, 0xe9}], 0x2}, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x6611, 0x0) [ 537.439818][T22404] vxfs: can't find superblock. 04:37:33 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) setresuid(0x0, 0xee01, 0xffffffffffffffff) ioctl$TIOCSLCKTRMIOS(r0, 0x4b69, 0x0) 04:37:33 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x11, 0x2, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) sendmsg(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000380)="97622c", 0x3}], 0x1}, 0x0) getpid() ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0xd, 0x0, &(0x7f00000000c0)="b9ff0300290d698cb89e40f008", 0x0, 0x100, 0x6000000000000000}, 0x48) 04:37:33 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) r3 = socket$kcm(0x29, 0x7, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xa, 0x2, 0x400, 0xc}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000140), &(0x7f00000000c0), 0x1081, r4}, 0x38) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000000480), 0x8) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000006c0)=@bpf_ext={0x1c, 0x6, &(0x7f0000000100)=@raw=[@initr0, @map={0x18, 0x3, 0x1, 0x0, r4}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}], 0x0, 0x1, 0xf8, &(0x7f0000000580)=""/248, 0x0, 0x18, [], 0x0, 0x0, r5, 0x8, &(0x7f0000000500)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000680)={0x0, 0x3, 0x32c96647, 0x9}, 0x10, 0x28c14, r2}, 0x78) sendmsg$kcm(r3, &(0x7f00000004c0)={&(0x7f00000003c0)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, 0x0, 0x0, &(0x7f0000000bc0)=[{0x58, 0x0, 0x3f, "3d036b2fe1c920e033fd51a7135bc633687035d4990a07405974e24f3e4f5bc747dd8cb833517dba325fb8357ec60f4b737260519cbec967f1e58025da9b5821975edd2eb5ce0e"}, {0x120, 0xff, 0x0, "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"}, {0x10, 0x0, 0xa11}, {0x88, 0x109, 0x0, "48dcf8c1cb65b735b2d5007004b54696aa2a8d0eb98210cf2936121163b1c0584580900f864f0ebc03ba1675bbb924fa22af1c7933e3ea0fe010ebefceaa2fd20e15b805012fd2d7a3e171a57996dc09dc5df4ce65f0c01e583247522e22d559c831115bca323aa68746a2dd9dc875023459b72ec5"}, {0x40, 0x88, 0x39, "e91254173524b71a6cf4982e471433e79bae7c4a781a2a354e5dcee630a99252345f0fe48a629be09093e130c018"}], 0x250}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000002c0)='block_bio_queue\x00'}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r1, 0x12, 0x1, 0x0, 0x0}, 0x20) r6 = openat$cgroup_ro(r0, &(0x7f0000000300)='cpuset.effective_mems\x00', 0x0, 0x0) openat$cgroup_freezer_state(r6, &(0x7f0000000380)='freezer.state\x00', 0x2, 0x0) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) socket$kcm(0x2b, 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a80)={0xffffffffffffffff, 0x0, 0x67, 0x62, &(0x7f0000000840)="f99a133c46d257d5200f326d0a5562cd17685e886bf2f9b3f9a2790348e08bc05a864a96cf5d232acf4d9c795667017ab2c3fa3c298204bcf30edef2ac8db7cbfdf4deae19c3fb8efa11f5d49f040b0731924ad772daa2861563518e94c736d15a5ac7a9872008", &(0x7f00000008c0)=""/98, 0x51a, 0x0, 0x1b, 0x0, &(0x7f0000000940)="5a4fa68ec2c72f99361b9b501348d1d5bce04f26173ed66a605e0c", &(0x7f0000000980)}, 0x48) 04:37:33 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) setresuid(0x0, 0xee01, 0xffffffffffffffff) ioctl$TIOCSLCKTRMIOS(r0, 0x4b69, 0x0) 04:37:33 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x11, 0x2, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) sendmsg(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000380)="97622c", 0x3}], 0x1}, 0x0) getpid() ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0xd, 0x0, &(0x7f00000000c0)="b9ff0300290d698cb89e40f008", 0x0, 0x100, 0x6000000000000000}, 0x48) 04:37:33 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x22, 0x0, &(0x7f0000000240)) 04:37:33 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000000)=[{0x0}, {&(0x7f0000000600)=""/233, 0xe9}], 0x2}, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x6611, 0x0) 04:37:33 executing program 4: r0 = socket(0x11, 0x3, 0x0) setsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x107, 0x9, 0x0, 0x10) 04:37:33 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) connect$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0x0, @none}, 0xe) 04:37:33 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x11, 0x2, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) sendmsg(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000fefffe7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010001000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000c9be17044171e1d3d7b196d079c4d4758fa35d17c668a4b6c5f6688e15308a1f8355410c0cec9a66819ce256b8530e31ec24925095a163b9d4e76be266e31a80382240baa44e080addde36e5fdc6c42a7b3f912f6906a6e2313091dd61258a1fda45991fbdce32bebcb3ac17c5146793e6a4785ee8b60092659b941bbd694d1f8898b3e6477afbda84355dba16801c89c08c07ce144961bfbb975b726a0b59b8c79321bc8d0093979391090e0ac8666d2500dd60794bf7cb8ef212f0452eb6415435ab4e6ee740327968dbb729b75a4244ee0f031e5a093bff037d9f7f76aaa845d819fa9f8d1cb2b0d2ec20bbb74d7b35421046847281aae5b1cc0fd183f68ff1bf9af98bacf1b91cf55debb0c8c027901f949834aec6764bce8586a9470f267b12e5ad2274f22103f30e5c1a119dce8693e94b92ae72abe72127d8d23884ea84c82c9d2f5ce635d2b997b21bb82f720095064fcd956de51de721d7f9bd85fec7afc6e6a79f9101e03b356cf1bb813e646dcd43d9a71ef270e3644067cdea1848e7e55a5164a1fb7a9010912fbf136a9721fa4c84f5494a267ea72f87412708bcd54815c4a1d38a999525f3335e5c8f2c2d1f5d7872cd9fa6fd4b86f2706048deb9588df7ed"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000380)="97622c", 0x3}], 0x1}, 0x0) getpid() ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x13, 0x0, &(0x7f00000000c0)="b9ff0300290d698cb89e40f008001fffffff00", 0x0, 0x100, 0x6000000000000000}, 0x48) 04:37:34 executing program 2: getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, 0x0, &(0x7f0000000240)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000000)) 04:37:34 executing program 4: r0 = socket(0x2, 0x3, 0x47) r1 = dup(r0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8914, &(0x7f0000000000)={'batadv_slave_1\x00'}) 04:37:34 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x11, 0x2, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) sendmsg(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000fefffe7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010001000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000c9be17044171e1d3d7b196d079c4d4758fa35d17c668a4b6c5f6688e15308a1f8355410c0cec9a66819ce256b8530e31ec24925095a163b9d4e76be266e31a80382240baa44e080addde36e5fdc6c42a7b3f912f6906a6e2313091dd61258a1fda45991fbdce32bebcb3ac17c5146793e6a4785ee8b60092659b941bbd694d1f8898b3e6477afbda84355dba16801c89c08c07ce144961bfbb975b726a0b59b8c79321bc8d0093979391090e0ac8666d2500dd60794bf7cb8ef212f0452eb6415435ab4e6ee740327968dbb729b75a4244ee0f031e5a093bff037d9f7f76aaa845d819fa9f8d1cb2b0d2ec20bbb74d7b35421046847281aae5b1cc0fd183f68ff1bf9af98bacf1b91cf55debb0c8c027901f949834aec6764bce8586a9470f267b12e5ad2274f22103f30e5c1a119dce8693e94b92ae72abe72127d8d23884ea84c82c9d2f5ce635d2b997b21bb82f720095064fcd956de51de721d7f9bd85fec7afc6e6a79f9101e03b356cf1bb813e646dcd43d9a71ef270e3644067cdea1848e7e55a5164a1fb7a9010912fbf136a9721fa4c84f5494a267ea72f87412708bcd54815c4a1d38a999525f3335e5c8f2c2d1f5d7872cd9fa6fd4b86f2706048deb9588df7ed"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000380)="97622c", 0x3}], 0x1}, 0x0) getpid() ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x13, 0x0, &(0x7f00000000c0)="b9ff0300290d698cb89e40f008001fffffff00", 0x0, 0x100, 0x6000000000000000}, 0x48) 04:37:34 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000000)=[{0x0}, {&(0x7f0000000600)=""/233, 0xe9}], 0x2}, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x6611, 0x0) [ 538.467320][T22444] batman_adv: batadv0: Interface deactivated: batadv_slave_1 04:37:34 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) r3 = socket$kcm(0x29, 0x7, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xa, 0x2, 0x400, 0xc}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000140), &(0x7f00000000c0), 0x1081, r4}, 0x38) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000000480), 0x8) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000006c0)=@bpf_ext={0x1c, 0x6, &(0x7f0000000100)=@raw=[@initr0, @map={0x18, 0x3, 0x1, 0x0, r4}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}], 0x0, 0x1, 0xf8, &(0x7f0000000580)=""/248, 0x0, 0x18, [], 0x0, 0x0, r5, 0x8, &(0x7f0000000500)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000680)={0x0, 0x3, 0x32c96647, 0x9}, 0x10, 0x28c14, r2}, 0x78) sendmsg$kcm(r3, &(0x7f00000004c0)={&(0x7f00000003c0)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, 0x0, 0x0, &(0x7f0000000bc0)=[{0x58, 0x0, 0x3f, "3d036b2fe1c920e033fd51a7135bc633687035d4990a07405974e24f3e4f5bc747dd8cb833517dba325fb8357ec60f4b737260519cbec967f1e58025da9b5821975edd2eb5ce0e"}, {0x120, 0xff, 0x0, "66a36a9455eecacdd8c163586fbbda03204764abc3a8c9654d37d7c1a2f0137331fa2fc3c6b9c55a1cac3388716c8a76fc203090f4b9a8d9e4e4383140f03e4a858b012a4be6e9627a6c3c2cad945b7222473303ee4ad9cdf1f140621bf10baaf72506be7d90008df69e4c604be55e65d97d52d2badc2bc54195891c461c0f3500918123efc1e58ba54cee893f87f33cfef3bcb68cac978aa5771ed9240b9cf9e44c0f9dc631daaa13163c7cfa501090e5f3800ba5f26eaade9b17afd51fb7a9dee8f4b64db02d16f940369bcc3e3f6aaed6a980b9bef7f37844519af3e31b6887d4daad7bc530e9a2c04fc6f0e4717820569dbc831ef37c4bf3b8733f353ed53179f0ce0a8b9ac8c05b1b1a3f0e12"}, {0x10, 0x0, 0xa11}, {0x88, 0x109, 0x0, "48dcf8c1cb65b735b2d5007004b54696aa2a8d0eb98210cf2936121163b1c0584580900f864f0ebc03ba1675bbb924fa22af1c7933e3ea0fe010ebefceaa2fd20e15b805012fd2d7a3e171a57996dc09dc5df4ce65f0c01e583247522e22d559c831115bca323aa68746a2dd9dc875023459b72ec5"}, {0x40, 0x88, 0x39, "e91254173524b71a6cf4982e471433e79bae7c4a781a2a354e5dcee630a99252345f0fe48a629be09093e130c018"}], 0x250}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000002c0)='block_bio_queue\x00'}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r1, 0x12, 0x1, 0x0, 0x0}, 0x20) r6 = openat$cgroup_ro(r0, &(0x7f0000000300)='cpuset.effective_mems\x00', 0x0, 0x0) openat$cgroup_freezer_state(r6, &(0x7f0000000380)='freezer.state\x00', 0x2, 0x0) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) socket$kcm(0x2b, 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a80)={0xffffffffffffffff, 0x0, 0x67, 0x62, &(0x7f0000000840)="f99a133c46d257d5200f326d0a5562cd17685e886bf2f9b3f9a2790348e08bc05a864a96cf5d232acf4d9c795667017ab2c3fa3c298204bcf30edef2ac8db7cbfdf4deae19c3fb8efa11f5d49f040b0731924ad772daa2861563518e94c736d15a5ac7a9872008", &(0x7f00000008c0)=""/98, 0x51a, 0x0, 0x1b, 0x0, &(0x7f0000000940)="5a4fa68ec2c72f99361b9b501348d1d5bce04f26173ed66a605e0c", &(0x7f0000000980)}, 0x48) 04:37:34 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x11, 0x2, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) sendmsg(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000fefffe7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010001000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000c9be17044171e1d3d7b196d079c4d4758fa35d17c668a4b6c5f6688e15308a1f8355410c0cec9a66819ce256b8530e31ec24925095a163b9d4e76be266e31a80382240baa44e080addde36e5fdc6c42a7b3f912f6906a6e2313091dd61258a1fda45991fbdce32bebcb3ac17c5146793e6a4785ee8b60092659b941bbd694d1f8898b3e6477afbda84355dba16801c89c08c07ce144961bfbb975b726a0b59b8c79321bc8d0093979391090e0ac8666d2500dd60794bf7cb8ef212f0452eb6415435ab4e6ee740327968dbb729b75a4244ee0f031e5a093bff037d9f7f76aaa845d819fa9f8d1cb2b0d2ec20bbb74d7b35421046847281aae5b1cc0fd183f68ff1bf9af98bacf1b91cf55debb0c8c027901f949834aec6764bce8586a9470f267b12e5ad2274f22103f30e5c1a119dce8693e94b92ae72abe72127d8d23884ea84c82c9d2f5ce635d2b997b21bb82f720095064fcd956de51de721d7f9bd85fec7afc6e6a79f9101e03b356cf1bb813e646dcd43d9a71ef270e3644067cdea1848e7e55a5164a1fb7a9010912fbf136a9721fa4c84f5494a267ea72f87412708bcd54815c4a1d38a999525f3335e5c8f2c2d1f5d7872cd9fa6fd4b86f2706048deb9588df7ed"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000380)="97622c", 0x3}], 0x1}, 0x0) getpid() ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x13, 0x0, &(0x7f00000000c0)="b9ff0300290d698cb89e40f008001fffffff00", 0x0, 0x100, 0x6000000000000000}, 0x48) 04:37:34 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGKBTYPE(r0, 0x4bfa, &(0x7f0000000200)) 04:37:34 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000000)=[{0x0}, {&(0x7f0000000600)=""/233, 0xe9}], 0x2}, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x6611, 0x0) 04:37:34 executing program 4: r0 = socket(0x2, 0x3, 0x47) r1 = dup(r0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8914, &(0x7f0000000000)={'batadv_slave_1\x00'}) 04:37:34 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) connect$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0x0, @none}, 0xe) 04:37:34 executing program 4: r0 = socket(0x2, 0x3, 0x47) r1 = dup(r0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8914, &(0x7f0000000000)={'batadv_slave_1\x00'}) 04:37:34 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x11, 0x2, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) sendmsg(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000380)="97622c", 0x3}], 0x1}, 0x0) getpid() ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x16, 0x0, &(0x7f00000000c0)="b9ff0300290d698cb89e40f008001fffffff00004000", 0x0, 0x100, 0x6000000000000000}, 0x48) 04:37:35 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000000)=[{0x0}, {&(0x7f0000000600)=""/233, 0xe9}], 0x2}, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x6611, 0x0) 04:37:35 executing program 2: mmap$IORING_OFF_SQ_RING(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x30, 0xffffffffffffffff, 0x0) 04:37:35 executing program 4: r0 = socket(0x2, 0x3, 0x47) r1 = dup(r0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8914, &(0x7f0000000000)={'batadv_slave_1\x00'}) 04:37:35 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x11, 0x2, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) sendmsg(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000fefffe7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010001000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000c9be17044171e1d3d7b196d079c4d4758fa35d17c668a4b6c5f6688e15308a1f8355410c0cec9a66819ce256b8530e31ec24925095a163b9d4e76be266e31a80382240baa44e080addde36e5fdc6c42a7b3f912f6906a6e2313091dd61258a1fda45991fbdce32bebcb3ac17c5146793e6a4785ee8b60092659b941bbd694d1f8898b3e6477afbda84355dba16801c89c08c07ce144961bfbb975b726a0b59b8c79321bc8d0093979391090e0ac8666d2500dd60794bf7cb8ef212f0452eb6415435ab4e6ee740327968dbb729b75a4244ee0f031e5a093bff037d9f7f76aaa845d819fa9f8d1cb2b0d2ec20bbb74d7b35421046847281aae5b1cc0fd183f68ff1bf9af98bacf1b91cf55debb0c8c027901f949834aec6764bce8586a9470f267b12e5ad2274f22103f30e5c1a119dce8693e94b92ae72abe72127d8d23884ea84c82c9d2f5ce635d2b997b21bb82f720095064fcd956de51de721d7f9bd85fec7afc6e6a79f9101e03b356cf1bb813e646dcd43d9a71ef270e3644067cdea1848e7e55a5164a1fb7a9010912fbf136a9721fa4c84f5494a267ea72f87412708bcd54815c4a1d38a999525f3335e5c8f2c2d1f5d7872cd9fa6fd4b86f2706048deb9588df7ed"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000380)="97622c", 0x3}], 0x1}, 0x0) getpid() ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x16, 0x0, &(0x7f00000000c0)="b9ff0300290d698cb89e40f008001fffffff00004000", 0x0, 0x100, 0x6000000000000000}, 0x48) [ 539.504908][ T9752] Bluetooth: hci5: command 0x0405 tx timeout 04:37:35 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) r3 = socket$kcm(0x29, 0x7, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xa, 0x2, 0x400, 0xc}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000140), &(0x7f00000000c0), 0x1081, r4}, 0x38) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000000480), 0x8) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000006c0)=@bpf_ext={0x1c, 0x6, &(0x7f0000000100)=@raw=[@initr0, @map={0x18, 0x3, 0x1, 0x0, r4}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}], 0x0, 0x1, 0xf8, &(0x7f0000000580)=""/248, 0x0, 0x18, [], 0x0, 0x0, r5, 0x8, &(0x7f0000000500)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000680)={0x0, 0x3, 0x32c96647, 0x9}, 0x10, 0x28c14, r2}, 0x78) sendmsg$kcm(r3, &(0x7f00000004c0)={&(0x7f00000003c0)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, 0x0, 0x0, &(0x7f0000000bc0)=[{0x58, 0x0, 0x3f, "3d036b2fe1c920e033fd51a7135bc633687035d4990a07405974e24f3e4f5bc747dd8cb833517dba325fb8357ec60f4b737260519cbec967f1e58025da9b5821975edd2eb5ce0e"}, {0x120, 0xff, 0x0, "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"}, {0x20, 0x0, 0x100, "e12e82da376bca8fa03c53062e627e"}, {0x10, 0x0, 0xa11}, {0x88, 0x109, 0x0, "48dcf8c1cb65b735b2d5007004b54696aa2a8d0eb98210cf2936121163b1c0584580900f864f0ebc03ba1675bbb924fa22af1c7933e3ea0fe010ebefceaa2fd20e15b805012fd2d7a3e171a57996dc09dc5df4ce65f0c01e583247522e22d559c831115bca323aa68746a2dd9dc875023459b72ec5"}, {0x40, 0x88, 0x39, "e91254173524b71a6cf4982e471433e79bae7c4a781a2a354e5dcee630a99252345f0fe48a629be09093e130c018"}], 0x270}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000002c0)='block_bio_queue\x00'}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r1, 0x12, 0x1, 0x0, 0x0}, 0x20) r6 = openat$cgroup_ro(r0, &(0x7f0000000300)='cpuset.effective_mems\x00', 0x0, 0x0) openat$cgroup_freezer_state(r6, &(0x7f0000000380)='freezer.state\x00', 0x2, 0x0) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) socket$kcm(0x2b, 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a80)={0xffffffffffffffff, 0x0, 0x67, 0x62, &(0x7f0000000840)="f99a133c46d257d5200f326d0a5562cd17685e886bf2f9b3f9a2790348e08bc05a864a96cf5d232acf4d9c795667017ab2c3fa3c298204bcf30edef2ac8db7cbfdf4deae19c3fb8efa11f5d49f040b0731924ad772daa2861563518e94c736d15a5ac7a9872008", &(0x7f00000008c0)=""/98, 0x51a, 0x0, 0x1b, 0x0, &(0x7f0000000940)="5a4fa68ec2c72f99361b9b501348d1d5bce04f26173ed66a605e0c", &(0x7f0000000980)}, 0x48) 04:37:35 executing program 4: socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000200)={&(0x7f0000fff000/0x1000)=nil, 0x1000}, &(0x7f0000000240)=0x10) 04:37:35 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x11, 0x2, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) sendmsg(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000fefffe7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010001000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000c9be17044171e1d3d7b196d079c4d4758fa35d17c668a4b6c5f6688e15308a1f8355410c0cec9a66819ce256b8530e31ec24925095a163b9d4e76be266e31a80382240baa44e080addde36e5fdc6c42a7b3f912f6906a6e2313091dd61258a1fda45991fbdce32bebcb3ac17c5146793e6a4785ee8b60092659b941bbd694d1f8898b3e6477afbda84355dba16801c89c08c07ce144961bfbb975b726a0b59b8c79321bc8d0093979391090e0ac8666d2500dd60794bf7cb8ef212f0452eb6415435ab4e6ee740327968dbb729b75a4244ee0f031e5a093bff037d9f7f76aaa845d819fa9f8d1cb2b0d2ec20bbb74d7b35421046847281aae5b1cc0fd183f68ff1bf9af98bacf1b91cf55debb0c8c027901f949834aec6764bce8586a9470f267b12e5ad2274f22103f30e5c1a119dce8693e94b92ae72abe72127d8d23884ea84c82c9d2f5ce635d2b997b21bb82f720095064fcd956de51de721d7f9bd85fec7afc6e6a79f9101e03b356cf1bb813e646dcd43d9a71ef270e3644067cdea1848e7e55a5164a1fb7a9010912fbf136a9721fa4c84f5494a267ea72f87412708bcd54815c4a1d38a999525f3335e5c8f2c2d1f5d7872cd9fa6fd4b86f2706048deb9588df7ed"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000380)="97622c", 0x3}], 0x1}, 0x0) getpid() ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x16, 0x0, &(0x7f00000000c0)="b9ff0300290d698cb89e40f008001fffffff00004000", 0x0, 0x100, 0x6000000000000000}, 0x48) 04:37:35 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={&(0x7f0000000080), 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=@RTM_NEWMDB={0x58, 0x54, 0x1, 0x0, 0x0, {}, [@MDBA_SET_ENTRY={0x20, 0x1, {0x0, 0x0, 0x0, 0x0, {@in6_addr=@mcast1}}}, @MDBA_SET_ENTRY={0x20, 0x1, {0x0, 0x0, 0x0, 0x0, {@ip4=@remote}}}]}, 0x58}}, 0x0) 04:37:35 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000000)=[{0x0}, {&(0x7f0000000600)=""/233, 0xe9}], 0x2}, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x6611, 0x0) 04:37:35 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) connect$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0x0, @none}, 0xe) 04:37:35 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x11, 0x2, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) sendmsg(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000380)="97622c", 0x3}], 0x1}, 0x0) getpid() ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x18, 0x0, &(0x7f00000000c0)="b9ff0300290d698cb89e40f008001fffffff000040006329", 0x0, 0x100, 0x6000000000000000}, 0x48) 04:37:35 executing program 2: r0 = socket(0x11, 0x3, 0x0) setsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x107, 0xa, 0x0, 0x0) 04:37:35 executing program 4: syz_usb_connect$printer(0x0, 0x2d, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x20, 0x525, 0xa4a8, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x1b, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x4}}]}}]}}, 0x0) 04:37:35 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000000)=[{0x0}, {&(0x7f0000000600)=""/233, 0xe9}], 0x2}, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x6611, 0x0) 04:37:36 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x11, 0x2, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) sendmsg(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000380)="97622c", 0x3}], 0x1}, 0x0) getpid() ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x18, 0x0, &(0x7f00000000c0)="b9ff0300290d698cb89e40f008001fffffff000040006329", 0x0, 0x100, 0x6000000000000000}, 0x48) 04:37:36 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x11, 0x2, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) sendmsg(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000380)="97622c", 0x3}], 0x1}, 0x0) getpid() ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x18, 0x0, &(0x7f00000000c0)="b9ff0300290d698cb89e40f008001fffffff000040006329", 0x0, 0x100, 0x6000000000000000}, 0x48) [ 540.574954][ T19] usb 5-1: new high-speed USB device number 17 using dummy_hcd [ 540.824753][ T19] usb 5-1: Using ep0 maxpacket: 32 04:37:36 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) r3 = socket$kcm(0x29, 0x7, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xa, 0x2, 0x400, 0xc}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000140), &(0x7f00000000c0), 0x1081, r4}, 0x38) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000000480), 0x8) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000006c0)=@bpf_ext={0x1c, 0x6, &(0x7f0000000100)=@raw=[@initr0, @map={0x18, 0x3, 0x1, 0x0, r4}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}], 0x0, 0x1, 0xf8, &(0x7f0000000580)=""/248, 0x0, 0x18, [], 0x0, 0x0, r5, 0x8, &(0x7f0000000500)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000680)={0x0, 0x3, 0x32c96647, 0x9}, 0x10, 0x28c14, r2}, 0x78) sendmsg$kcm(r3, &(0x7f00000004c0)={&(0x7f00000003c0)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, 0x0, 0x0, &(0x7f0000000bc0)=[{0x58, 0x0, 0x3f, "3d036b2fe1c920e033fd51a7135bc633687035d4990a07405974e24f3e4f5bc747dd8cb833517dba325fb8357ec60f4b737260519cbec967f1e58025da9b5821975edd2eb5ce0e"}, {0x120, 0xff, 0x0, "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"}, {0x20, 0x0, 0x100, "e12e82da376bca8fa03c53062e627e"}, {0x10, 0x0, 0xa11}, {0x88, 0x109, 0x0, "48dcf8c1cb65b735b2d5007004b54696aa2a8d0eb98210cf2936121163b1c0584580900f864f0ebc03ba1675bbb924fa22af1c7933e3ea0fe010ebefceaa2fd20e15b805012fd2d7a3e171a57996dc09dc5df4ce65f0c01e583247522e22d559c831115bca323aa68746a2dd9dc875023459b72ec5"}, {0x40, 0x88, 0x39, "e91254173524b71a6cf4982e471433e79bae7c4a781a2a354e5dcee630a99252345f0fe48a629be09093e130c018"}], 0x270}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000002c0)='block_bio_queue\x00'}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r1, 0x12, 0x1, 0x0, 0x0}, 0x20) r6 = openat$cgroup_ro(r0, &(0x7f0000000300)='cpuset.effective_mems\x00', 0x0, 0x0) openat$cgroup_freezer_state(r6, &(0x7f0000000380)='freezer.state\x00', 0x2, 0x0) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) socket$kcm(0x2b, 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a80)={0xffffffffffffffff, 0x0, 0x67, 0x62, &(0x7f0000000840)="f99a133c46d257d5200f326d0a5562cd17685e886bf2f9b3f9a2790348e08bc05a864a96cf5d232acf4d9c795667017ab2c3fa3c298204bcf30edef2ac8db7cbfdf4deae19c3fb8efa11f5d49f040b0731924ad772daa2861563518e94c736d15a5ac7a9872008", &(0x7f00000008c0)=""/98, 0x51a, 0x0, 0x1b, 0x0, &(0x7f0000000940)="5a4fa68ec2c72f99361b9b501348d1d5bce04f26173ed66a605e0c", &(0x7f0000000980)}, 0x48) 04:37:36 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x11, 0x2, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) sendmsg(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000380)="97622c", 0x3}], 0x1}, 0x0) getpid() ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x19, 0x0, &(0x7f00000000c0)="b9ff0300290d698cb89e40f008001fffffff00004000632977", 0x0, 0x0, 0x6000000000000000}, 0x48) 04:37:36 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000000)=[@timestamp, @sack_perm, @mss, @window], 0x4) 04:37:36 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000000)=[{0x0}, {&(0x7f0000000600)=""/233, 0xe9}], 0x2}, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x6611, 0x0) [ 540.955504][ T19] usb 5-1: config 1 interface 0 altsetting 4 has 1 endpoint descriptor, different from the interface descriptor's value: 0 [ 540.969528][ T19] usb 5-1: config 1 interface 0 has no altsetting 0 04:37:36 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x11, 0x2, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) sendmsg(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000fefffe7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010001000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000c9be17044171e1d3d7b196d079c4d4758fa35d17c668a4b6c5f6688e15308a1f8355410c0cec9a66819ce256b8530e31ec24925095a163b9d4e76be266e31a80382240baa44e080addde36e5fdc6c42a7b3f912f6906a6e2313091dd61258a1fda45991fbdce32bebcb3ac17c5146793e6a4785ee8b60092659b941bbd694d1f8898b3e6477afbda84355dba16801c89c08c07ce144961bfbb975b726a0b59b8c79321bc8d0093979391090e0ac8666d2500dd60794bf7cb8ef212f0452eb6415435ab4e6ee740327968dbb729b75a4244ee0f031e5a093bff037d9f7f76aaa845d819fa9f8d1cb2b0d2ec20bbb74d7b35421046847281aae5b1cc0fd183f68ff1bf9af98bacf1b91cf55debb0c8c027901f949834aec6764bce8586a9470f267b12e5ad2274f22103f30e5c1a119dce8693e94b92ae72abe72127d8d23884ea84c82c9d2f5ce635d2b997b21bb82f720095064fcd956de51de721d7f9bd85fec7afc6e6a79f9101e03b356cf1bb813e646dcd43d9a71ef270e3644067cdea1848e7e55a5164a1fb7a9010912fbf136a9721fa4c84f5494a267ea72f87412708bcd54815c4a1d38a999525f3335e5c8f2c2d1f5d7872cd9fa6fd4b86f2706048deb9588df7ed"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000380)="97622c", 0x3}], 0x1}, 0x0) getpid() ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x19, 0x0, &(0x7f00000000c0)="b9ff0300290d698cb89e40f008001fffffff00004000632977", 0x0, 0x0, 0x6000000000000000}, 0x48) 04:37:36 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x11, 0x2, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) sendmsg(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000380)="97622c", 0x3}], 0x1}, 0x0) getpid() ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x19, 0x0, &(0x7f00000000c0)="b9ff0300290d698cb89e40f008001fffffff00004000632977", 0x0, 0x0, 0x6000000000000000}, 0x48) 04:37:36 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGKBTYPE(r0, 0x5410, &(0x7f0000000000)) 04:37:36 executing program 2: r0 = socket(0x11, 0x3, 0x0) setsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x107, 0x7, 0x0, 0x4) [ 541.155448][ T19] usb 5-1: New USB device found, idVendor=0525, idProduct=a4a8, bcdDevice= 0.40 [ 541.176556][ T19] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 541.188178][ T19] usb 5-1: Product: syz [ 541.204962][ T19] usb 5-1: Manufacturer: syz [ 541.218852][ T19] usb 5-1: SerialNumber: syz [ 541.473338][ T19] usb 5-1: USB disconnect, device number 17 [ 542.254619][ T19] usb 5-1: new high-speed USB device number 18 using dummy_hcd [ 542.494542][ T19] usb 5-1: Using ep0 maxpacket: 32 [ 542.615338][ T19] usb 5-1: config 1 interface 0 altsetting 4 has 1 endpoint descriptor, different from the interface descriptor's value: 0 [ 542.628477][ T19] usb 5-1: config 1 interface 0 has no altsetting 0 [ 542.845343][ T19] usb 5-1: New USB device found, idVendor=0525, idProduct=a4a8, bcdDevice= 0.40 [ 542.854623][ T19] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 542.862702][ T19] usb 5-1: Product: syz [ 542.868886][ T19] usb 5-1: Manufacturer: syz [ 542.873622][ T19] usb 5-1: SerialNumber: syz 04:37:38 executing program 4: syz_usb_connect$printer(0x0, 0x2d, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x20, 0x525, 0xa4a8, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x1b, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x4}}]}}]}}, 0x0) 04:37:38 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x11, 0x2, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) sendmsg(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000fefffe7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010001000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000c9be17044171e1d3d7b196d079c4d4758fa35d17c668a4b6c5f6688e15308a1f8355410c0cec9a66819ce256b8530e31ec24925095a163b9d4e76be266e31a80382240baa44e080addde36e5fdc6c42a7b3f912f6906a6e2313091dd61258a1fda45991fbdce32bebcb3ac17c5146793e6a4785ee8b60092659b941bbd694d1f8898b3e6477afbda84355dba16801c89c08c07ce144961bfbb975b726a0b59b8c79321bc8d0093979391090e0ac8666d2500dd60794bf7cb8ef212f0452eb6415435ab4e6ee740327968dbb729b75a4244ee0f031e5a093bff037d9f7f76aaa845d819fa9f8d1cb2b0d2ec20bbb74d7b35421046847281aae5b1cc0fd183f68ff1bf9af98bacf1b91cf55debb0c8c027901f949834aec6764bce8586a9470f267b12e5ad2274f22103f30e5c1a119dce8693e94b92ae72abe72127d8d23884ea84c82c9d2f5ce635d2b997b21bb82f720095064fcd956de51de721d7f9bd85fec7afc6e6a79f9101e03b356cf1bb813e646dcd43d9a71ef270e3644067cdea1848e7e55a5164a1fb7a9010912fbf136a9721fa4c84f5494a267ea72f87412708bcd54815c4a1d38a999525f3335e5c8f2c2d1f5d7872cd9fa6fd4b86f2706048deb9588df7ed"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000380)="97622c", 0x3}], 0x1}, 0x0) getpid() ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x19, 0x0, &(0x7f00000000c0)="b9ff0300290d698cb89e40f008001fffffff00004000632977", 0x0, 0x100, 0x6000000000000000, 0x0, 0x0, 0x0}, 0x48) 04:37:38 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000000)=[{0x0}, {&(0x7f0000000600)=""/233, 0xe9}], 0x2}, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x6611, 0x0) 04:37:38 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGKBTYPE(r0, 0x5410, &(0x7f0000000000)) 04:37:38 executing program 2: pselect6(0x40, &(0x7f0000000340), 0x0, &(0x7f0000000200)={0x1}, 0x0, 0x0) 04:37:38 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) r3 = socket$kcm(0x29, 0x7, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xa, 0x2, 0x400, 0xc}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000140), &(0x7f00000000c0), 0x1081, r4}, 0x38) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000000480), 0x8) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000006c0)=@bpf_ext={0x1c, 0x6, &(0x7f0000000100)=@raw=[@initr0, @map={0x18, 0x3, 0x1, 0x0, r4}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}], 0x0, 0x1, 0xf8, &(0x7f0000000580)=""/248, 0x0, 0x18, [], 0x0, 0x0, r5, 0x8, &(0x7f0000000500)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000680)={0x0, 0x3, 0x32c96647, 0x9}, 0x10, 0x28c14, r2}, 0x78) sendmsg$kcm(r3, &(0x7f00000004c0)={&(0x7f00000003c0)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, 0x0, 0x0, &(0x7f0000000bc0)=[{0x58, 0x0, 0x3f, "3d036b2fe1c920e033fd51a7135bc633687035d4990a07405974e24f3e4f5bc747dd8cb833517dba325fb8357ec60f4b737260519cbec967f1e58025da9b5821975edd2eb5ce0e"}, {0x120, 0xff, 0x0, "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"}, {0x20, 0x0, 0x100, "e12e82da376bca8fa03c53062e627e"}, {0x10, 0x0, 0xa11}, {0x88, 0x109, 0x0, "48dcf8c1cb65b735b2d5007004b54696aa2a8d0eb98210cf2936121163b1c0584580900f864f0ebc03ba1675bbb924fa22af1c7933e3ea0fe010ebefceaa2fd20e15b805012fd2d7a3e171a57996dc09dc5df4ce65f0c01e583247522e22d559c831115bca323aa68746a2dd9dc875023459b72ec5"}, {0x40, 0x88, 0x39, "e91254173524b71a6cf4982e471433e79bae7c4a781a2a354e5dcee630a99252345f0fe48a629be09093e130c018"}], 0x270}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000002c0)='block_bio_queue\x00'}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r1, 0x12, 0x1, 0x0, 0x0}, 0x20) r6 = openat$cgroup_ro(r0, &(0x7f0000000300)='cpuset.effective_mems\x00', 0x0, 0x0) openat$cgroup_freezer_state(r6, &(0x7f0000000380)='freezer.state\x00', 0x2, 0x0) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) socket$kcm(0x2b, 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a80)={0xffffffffffffffff, 0x0, 0x67, 0x62, &(0x7f0000000840)="f99a133c46d257d5200f326d0a5562cd17685e886bf2f9b3f9a2790348e08bc05a864a96cf5d232acf4d9c795667017ab2c3fa3c298204bcf30edef2ac8db7cbfdf4deae19c3fb8efa11f5d49f040b0731924ad772daa2861563518e94c736d15a5ac7a9872008", &(0x7f00000008c0)=""/98, 0x51a, 0x0, 0x1b, 0x0, &(0x7f0000000940)="5a4fa68ec2c72f99361b9b501348d1d5bce04f26173ed66a605e0c", &(0x7f0000000980)}, 0x48) [ 543.134994][ T19] usb 5-1: USB disconnect, device number 18 04:37:38 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGKBTYPE(r0, 0x5410, &(0x7f0000000000)) 04:37:38 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x11, 0x2, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) sendmsg(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000380)="97622c", 0x3}], 0x1}, 0x0) getpid() ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x19, 0x0, &(0x7f00000000c0)="b9ff0300290d698cb89e40f008001fffffff00004000632977", 0x0, 0x100, 0x6000000000000000, 0x0, 0x0, 0x0}, 0x48) 04:37:39 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGKBTYPE(r0, 0x5410, &(0x7f0000000000)) 04:37:39 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x6611, 0x0) 04:37:39 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x11, 0x2, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) sendmsg(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000380)="97622c", 0x3}], 0x1}, 0x0) getpid() ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x19, 0x0, &(0x7f00000000c0)="b9ff0300290d698cb89e40f008001fffffff00004000632977", 0x0, 0x100, 0x6000000000000000, 0x0, 0x0, 0x0}, 0x48) 04:37:39 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) setresuid(0x0, 0xee01, 0xffffffffffffffff) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PIO_FONTX(r1, 0x4b6c, &(0x7f0000000400)={0x0, 0x0, 0x0}) [ 543.664507][ T19] usb 5-1: new high-speed USB device number 19 using dummy_hcd [ 543.924403][ T19] usb 5-1: Using ep0 maxpacket: 32 [ 544.055241][ T19] usb 5-1: config 1 interface 0 altsetting 4 has 1 endpoint descriptor, different from the interface descriptor's value: 0 [ 544.068214][ T19] usb 5-1: config 1 interface 0 has no altsetting 0 [ 544.245188][ T19] usb 5-1: New USB device found, idVendor=0525, idProduct=a4a8, bcdDevice= 0.40 [ 544.254388][ T19] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 544.262483][ T19] usb 5-1: Product: syz [ 544.268622][ T19] usb 5-1: Manufacturer: syz [ 544.273325][ T19] usb 5-1: SerialNumber: syz [ 544.540233][ T19] usb 5-1: USB disconnect, device number 19 04:37:40 executing program 4: syz_usb_connect$printer(0x0, 0x2d, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x20, 0x525, 0xa4a8, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x1b, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x4}}]}}]}}, 0x0) 04:37:40 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000001380)='nl80211\x00', 0xffffffffffffffff) sendmsg$NL80211_CMD_TDLS_MGMT(r0, &(0x7f0000001540)={0x0, 0x0, &(0x7f0000001500)={&(0x7f00000013c0)={0x1c, r1, 0x1, 0x0, 0x0, {{0x7e}, {@val={0x8, 0x1801}, @void}}}, 0x1c}}, 0x0) 04:37:40 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x11, 0x2, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) sendmsg(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000380)="97622c", 0x3}], 0x1}, 0x0) getpid() ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x19, 0x0, &(0x7f00000000c0)="b9ff0300290d698cb89e40f008001fffffff00004000632977", 0x0, 0x100, 0x6000000000000000, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x48) 04:37:40 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x6611, 0x0) 04:37:40 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) r3 = socket$kcm(0x29, 0x7, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xa, 0x2, 0x400, 0xc}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000140), &(0x7f00000000c0), 0x1081, r4}, 0x38) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000000480), 0x8) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000006c0)=@bpf_ext={0x1c, 0x6, &(0x7f0000000100)=@raw=[@initr0, @map={0x18, 0x3, 0x1, 0x0, r4}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}], 0x0, 0x1, 0xf8, &(0x7f0000000580)=""/248, 0x0, 0x18, [], 0x0, 0x0, r5, 0x8, &(0x7f0000000500)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000680)={0x0, 0x3, 0x32c96647, 0x9}, 0x10, 0x28c14, r2}, 0x78) sendmsg$kcm(r3, &(0x7f00000004c0)={&(0x7f00000003c0)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, 0x0, 0x0, &(0x7f0000000bc0)=[{0x58, 0x0, 0x3f, "3d036b2fe1c920e033fd51a7135bc633687035d4990a07405974e24f3e4f5bc747dd8cb833517dba325fb8357ec60f4b737260519cbec967f1e58025da9b5821975edd2eb5ce0e"}, {0x120, 0xff, 0x0, "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"}, {0x20, 0x116, 0x0, "e12e82da376bca8fa03c53062e627e"}, {0x10, 0x0, 0xa11}, {0x88, 0x109, 0x0, "48dcf8c1cb65b735b2d5007004b54696aa2a8d0eb98210cf2936121163b1c0584580900f864f0ebc03ba1675bbb924fa22af1c7933e3ea0fe010ebefceaa2fd20e15b805012fd2d7a3e171a57996dc09dc5df4ce65f0c01e583247522e22d559c831115bca323aa68746a2dd9dc875023459b72ec5"}, {0x40, 0x88, 0x39, "e91254173524b71a6cf4982e471433e79bae7c4a781a2a354e5dcee630a99252345f0fe48a629be09093e130c018"}], 0x270}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000002c0)='block_bio_queue\x00'}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r1, 0x12, 0x1, 0x0, 0x0}, 0x20) r6 = openat$cgroup_ro(r0, &(0x7f0000000300)='cpuset.effective_mems\x00', 0x0, 0x0) openat$cgroup_freezer_state(r6, &(0x7f0000000380)='freezer.state\x00', 0x2, 0x0) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) socket$kcm(0x2b, 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a80)={0xffffffffffffffff, 0x0, 0x67, 0x62, &(0x7f0000000840)="f99a133c46d257d5200f326d0a5562cd17685e886bf2f9b3f9a2790348e08bc05a864a96cf5d232acf4d9c795667017ab2c3fa3c298204bcf30edef2ac8db7cbfdf4deae19c3fb8efa11f5d49f040b0731924ad772daa2861563518e94c736d15a5ac7a9872008", &(0x7f00000008c0)=""/98, 0x51a, 0x0, 0x1b, 0x0, &(0x7f0000000940)="5a4fa68ec2c72f99361b9b501348d1d5bce04f26173ed66a605e0c", &(0x7f0000000980)}, 0x48) 04:37:40 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000040), 0x4) 04:37:40 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x11, 0x2, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) sendmsg(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000380)="97622c", 0x3}], 0x1}, 0x0) getpid() ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x19, 0x0, &(0x7f00000000c0)="b9ff0300290d698cb89e40f008001fffffff00004000632977", 0x0, 0x100, 0x6000000000000000, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x48) 04:37:40 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x6611, 0x0) [ 545.142867][T22607] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 04:37:40 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = getpid() sendmsg$netlink(r0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[@cred={{0x1c, 0x1, 0x2, {r1, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xee00}}}], 0x30}, 0x0) [ 545.197983][T22614] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 04:37:40 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) setresuid(0x0, 0xee01, 0xffffffffffffffff) ioctl$TIOCSLCKTRMIOS(r0, 0x4b72, 0x0) 04:37:40 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x11, 0x2, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) sendmsg(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000fefffe7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010001000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000c9be17044171e1d3d7b196d079c4d4758fa35d17c668a4b6c5f6688e15308a1f8355410c0cec9a66819ce256b8530e31ec24925095a163b9d4e76be266e31a80382240baa44e080addde36e5fdc6c42a7b3f912f6906a6e2313091dd61258a1fda45991fbdce32bebcb3ac17c5146793e6a4785ee8b60092659b941bbd694d1f8898b3e6477afbda84355dba16801c89c08c07ce144961bfbb975b726a0b59b8c79321bc8d0093979391090e0ac8666d2500dd60794bf7cb8ef212f0452eb6415435ab4e6ee740327968dbb729b75a4244ee0f031e5a093bff037d9f7f76aaa845d819fa9f8d1cb2b0d2ec20bbb74d7b35421046847281aae5b1cc0fd183f68ff1bf9af98bacf1b91cf55debb0c8c027901f949834aec6764bce8586a9470f267b12e5ad2274f22103f30e5c1a119dce8693e94b92ae72abe72127d8d23884ea84c82c9d2f5ce635d2b997b21bb82f720095064fcd956de51de721d7f9bd85fec7afc6e6a79f9101e03b356cf1bb813e646dcd43d9a71ef270e3644067cdea1848e7e55a5164a1fb7a9010912fbf136a9721fa4c84f5494a267ea72f87412708bcd54815c4a1d38a999525f3335e5c8f2c2d1f5d7872cd9fa6fd4b86f2706048deb9588df7ed"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000380)="97622c", 0x3}], 0x1}, 0x0) getpid() ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x19, 0x0, &(0x7f00000000c0)="b9ff0300290d698cb89e40f008001fffffff00004000632977", 0x0, 0x100, 0x6000000000000000, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x48) 04:37:41 executing program 5: syz_genetlink_get_family_id$nl802154(&(0x7f0000000140)='nl802154\x00', 0xffffffffffffffff) [ 545.454487][ T19] usb 5-1: new high-speed USB device number 20 using dummy_hcd [ 545.724237][ T19] usb 5-1: Using ep0 maxpacket: 32 [ 545.865052][ T19] usb 5-1: config 1 interface 0 altsetting 4 has 1 endpoint descriptor, different from the interface descriptor's value: 0 [ 545.878736][ T19] usb 5-1: config 1 interface 0 has no altsetting 0 [ 546.044929][ T19] usb 5-1: New USB device found, idVendor=0525, idProduct=a4a8, bcdDevice= 0.40 [ 546.054087][ T19] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 546.063583][ T19] usb 5-1: Product: syz [ 546.068600][ T19] usb 5-1: Manufacturer: syz [ 546.073295][ T19] usb 5-1: SerialNumber: syz [ 546.342803][ T19] usb 5-1: USB disconnect, device number 20 04:37:42 executing program 4: syz_usb_connect$printer(0x0, 0x2d, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x20, 0x525, 0xa4a8, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x1b, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x4}}]}}]}}, 0x0) 04:37:42 executing program 5: r0 = syz_open_dev$rtc(&(0x7f0000000000)='/dev/rtc#\x00', 0x6, 0x2) pwrite64(r0, &(0x7f0000000040)="af", 0x1, 0x0) 04:37:42 executing program 3: open(&(0x7f0000000000)='.\x00', 0x42, 0x0) 04:37:42 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x6611, 0x0) 04:37:42 executing program 2: syz_usb_connect$cdc_ncm(0x0, 0x90, &(0x7f0000000000)={{0x12, 0x1, 0x200, 0x2, 0x0, 0x0, 0x40, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x7e, 0x2, 0x1, 0x7f, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x6, 0x24, 0x6, 0x0, 0x1, "f3"}, {0x5, 0x24, 0x0, 0x7}, {0xd, 0x24, 0xf, 0x1, 0x73a7, 0xd66, 0x0, 0x68}, {0x6, 0x24, 0x1a, 0x1f, 0x10}, [@mbim={0xc, 0x24, 0x1b, 0x3, 0x2, 0x0, 0x3a, 0x8}, @mdlm={0x15}]}, {{0x9, 0x5, 0x81, 0x3, 0x10, 0x8, 0x8a}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x10}}, {{0x9, 0x5, 0x3, 0x2, 0x8, 0xff, 0x8}}}}}}}]}}, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x4, [{0xa1, &(0x7f0000000140)=@string={0xa1, 0x3, "53e5cf0815beb34e08977bb0d91f29cd85965de41763c2fbb389388afbc9b86b1d3a18086a93758549b9a260700078d953ee352d69467ef788ecc1cee187990837ff9f4353a9d2131bcbcfbb8e49a263e2046d24ae120575da4460a9228d049aa80540128d45ad250fe3df3c15a9b8d5c1c84ea7602f6042a9c09518e68a4e8fd17a73dee53749ac139c55c87c6951419395734338a2715d0fe4368ddb7960"}}, {0x0, 0x0}, {0xcd, &(0x7f0000000240)=@string={0xcd, 0x3, "c2add35cee480d264179c653d2cfc606b1791df83017839e4c259e7252966ed8eef491261e9e3232158172f858f5d24d7fd091bf42ab2e1f356e412864112c9894fbf29b46c37ac44e8b2d9f090d933be04f852a1db19bffd199cc61c36001cf0699bf8f9d2ebf543b42f664ec21564af704a561435e0a9d18645c144202a2d2ae4c8f44f7dfa899e2874f86189896141c39e9c1d3a8eb4233ba24044ad608e2d472a520e017fc3c56c9bc6d0d0217e8236a605dc9f1fd77389e8a20f7271709549f7dd6ce4d178b609593"}}, {0x4, &(0x7f0000000340)=@lang_id={0x4, 0x3, 0x1409}}]}) 04:37:42 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) r3 = socket$kcm(0x29, 0x7, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xa, 0x2, 0x400, 0xc}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000140), &(0x7f00000000c0), 0x1081, r4}, 0x38) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000000480), 0x8) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000006c0)=@bpf_ext={0x1c, 0x6, &(0x7f0000000100)=@raw=[@initr0, @map={0x18, 0x3, 0x1, 0x0, r4}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}], 0x0, 0x1, 0xf8, &(0x7f0000000580)=""/248, 0x0, 0x18, [], 0x0, 0x0, r5, 0x8, &(0x7f0000000500)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000680)={0x0, 0x3, 0x32c96647, 0x9}, 0x10, 0x28c14, r2}, 0x78) sendmsg$kcm(r3, &(0x7f00000004c0)={&(0x7f00000003c0)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, 0x0, 0x0, &(0x7f0000000bc0)=[{0x58, 0x0, 0x3f, "3d036b2fe1c920e033fd51a7135bc633687035d4990a07405974e24f3e4f5bc747dd8cb833517dba325fb8357ec60f4b737260519cbec967f1e58025da9b5821975edd2eb5ce0e"}, {0x120, 0xff, 0x0, "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"}, {0x20, 0x116, 0x0, "e12e82da376bca8fa03c53062e627e"}, {0x10, 0x0, 0xa11}, {0x88, 0x109, 0x0, "48dcf8c1cb65b735b2d5007004b54696aa2a8d0eb98210cf2936121163b1c0584580900f864f0ebc03ba1675bbb924fa22af1c7933e3ea0fe010ebefceaa2fd20e15b805012fd2d7a3e171a57996dc09dc5df4ce65f0c01e583247522e22d559c831115bca323aa68746a2dd9dc875023459b72ec5"}, {0x40, 0x88, 0x39, "e91254173524b71a6cf4982e471433e79bae7c4a781a2a354e5dcee630a99252345f0fe48a629be09093e130c018"}], 0x270}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000002c0)='block_bio_queue\x00'}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r1, 0x12, 0x1, 0x0, 0x0}, 0x20) r6 = openat$cgroup_ro(r0, &(0x7f0000000300)='cpuset.effective_mems\x00', 0x0, 0x0) openat$cgroup_freezer_state(r6, &(0x7f0000000380)='freezer.state\x00', 0x2, 0x0) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) socket$kcm(0x2b, 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a80)={0xffffffffffffffff, 0x0, 0x67, 0x62, &(0x7f0000000840)="f99a133c46d257d5200f326d0a5562cd17685e886bf2f9b3f9a2790348e08bc05a864a96cf5d232acf4d9c795667017ab2c3fa3c298204bcf30edef2ac8db7cbfdf4deae19c3fb8efa11f5d49f040b0731924ad772daa2861563518e94c736d15a5ac7a9872008", &(0x7f00000008c0)=""/98, 0x51a, 0x0, 0x1b, 0x0, &(0x7f0000000940)="5a4fa68ec2c72f99361b9b501348d1d5bce04f26173ed66a605e0c", &(0x7f0000000980)}, 0x48) 04:37:42 executing program 3: uname(&(0x7f0000000800)=""/61) 04:37:42 executing program 5: r0 = socket(0x11, 0x3, 0x0) setsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x107, 0xf, 0x0, 0x10) 04:37:42 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) setresuid(0x0, 0xee01, 0xffffffffffffffff) ioctl$TIOCSLCKTRMIOS(r0, 0x4b41, 0x0) 04:37:42 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[], 0x18}}, 0x0) 04:37:42 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x6611, 0x0) 04:37:42 executing program 3: syz_usb_connect$cdc_ncm(0x0, 0x7a, &(0x7f0000000000)={{0x12, 0x1, 0x200, 0x2, 0x0, 0x0, 0x40, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x68, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd, 0x24, 0xf, 0x1, 0x0, 0xd66}, {0x6, 0x24, 0x1a, 0x0, 0x10}, [@mbim={0xc}]}, {{0x9, 0x5, 0x81, 0x3, 0x0, 0x8, 0x8a}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x10}}, {{0x9, 0x5, 0x3, 0x2, 0x8, 0xff, 0x0, 0x40}}}}}}}]}}, &(0x7f0000000380)={0x0, 0x0, 0x5, &(0x7f0000000100)={0x5, 0xf, 0x5}, 0x3, [{0x4, &(0x7f0000000140)=@string={0x4, 0x3, "53e5"}}, {0x0, 0x0}, {0x98, &(0x7f0000000240)=@string={0x98, 0x3, "c2add35cee480d264179c653d2cfc606b1791df83017839e4c259e7252966ed8eef491261e9e3232158172f858f5d24d7fd091bf42ab2e1f356e412864112c9894fbf29b46c37ac44e8b2d9f090d933be04f852a1db19bffd199cc61c36001cf0699bf8f9d2ebf543b42f664ec21564af704a561435e0a9d18645c144202a2d2ae4c8f44f7dfa899e2874f86189896141c39e9c1d3a8"}}]}) [ 547.234294][ T19] usb 5-1: new high-speed USB device number 21 using dummy_hcd [ 547.244307][ T9583] usb 3-1: new high-speed USB device number 43 using dummy_hcd [ 547.484212][ T19] usb 5-1: Using ep0 maxpacket: 32 [ 547.614715][ T9583] usb 3-1: config 1 interface 1 altsetting 1 bulk endpoint 0x82 has invalid maxpacket 16 [ 547.634890][ T19] usb 5-1: config 1 interface 0 altsetting 4 has 1 endpoint descriptor, different from the interface descriptor's value: 0 [ 547.647951][ T19] usb 5-1: config 1 interface 0 has no altsetting 0 [ 547.653396][ T9583] usb 3-1: config 1 interface 1 altsetting 1 bulk endpoint 0x3 has invalid maxpacket 8 [ 547.824122][ T19] usb 5-1: New USB device found, idVendor=0525, idProduct=a4a8, bcdDevice= 0.40 [ 547.834008][ T19] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 547.842098][ T19] usb 5-1: Product: syz [ 547.848313][ T19] usb 5-1: Manufacturer: syz [ 547.853005][ T19] usb 5-1: SerialNumber: syz [ 548.094914][ T9583] usb 3-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 548.110671][ T9583] usb 3-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 548.125935][ T19] usb 5-1: USB disconnect, device number 21 [ 548.146676][ T9583] usb 3-1: Product: 귂峓䣮☍祁叆쿒ۆ禱ᜰ麃╌犞陒⚑鸞㈲脕䷒큿뾑ꭂἮ渵⡁ᅤ頬ﮔ鯲썆쑺譎鼭ഉ㮓俠⪅넝ロ駑懌惃켁餆辿⺝咿䈻擶⇬䩖ӷ憥幃鴊搘ᑜɂ튢䲮䒏馨蟢虏領ᒖ㤜쇩꣓䋫먳Ф홊狔₥០㳼쥖涼ȍ樣嵠矽鸸₊⟷ग齔홽䷎謗镠 [ 548.213268][ T9583] usb 3-1: SerialNumber: ᐉ [ 548.546048][ T9583] cdc_ncm 3-1:1.0: bind() failure [ 548.565287][ T9583] cdc_ncm 3-1:1.1: bind() failure 04:37:44 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x6611, 0x0) 04:37:44 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) setresuid(0x0, 0xee01, 0xffffffffffffffff) ioctl$TIOCSLCKTRMIOS(r0, 0x4b41, 0x0) 04:37:44 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCSLCKTRMIOS(r0, 0x5406, 0x0) 04:37:44 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) r3 = socket$kcm(0x29, 0x7, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xa, 0x2, 0x400, 0xc}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000140), &(0x7f00000000c0), 0x1081, r4}, 0x38) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000000480), 0x8) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000006c0)=@bpf_ext={0x1c, 0x6, &(0x7f0000000100)=@raw=[@initr0, @map={0x18, 0x3, 0x1, 0x0, r4}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}], 0x0, 0x1, 0xf8, &(0x7f0000000580)=""/248, 0x0, 0x18, [], 0x0, 0x0, r5, 0x8, &(0x7f0000000500)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000680)={0x0, 0x3, 0x32c96647, 0x9}, 0x10, 0x28c14, r2}, 0x78) sendmsg$kcm(r3, &(0x7f00000004c0)={&(0x7f00000003c0)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, 0x0, 0x0, &(0x7f0000000bc0)=[{0x58, 0x0, 0x3f, "3d036b2fe1c920e033fd51a7135bc633687035d4990a07405974e24f3e4f5bc747dd8cb833517dba325fb8357ec60f4b737260519cbec967f1e58025da9b5821975edd2eb5ce0e"}, {0x120, 0xff, 0x0, "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"}, {0x20, 0x116, 0x0, "e12e82da376bca8fa03c53062e627e"}, {0x10, 0x0, 0xa11}, {0x88, 0x109, 0x0, "48dcf8c1cb65b735b2d5007004b54696aa2a8d0eb98210cf2936121163b1c0584580900f864f0ebc03ba1675bbb924fa22af1c7933e3ea0fe010ebefceaa2fd20e15b805012fd2d7a3e171a57996dc09dc5df4ce65f0c01e583247522e22d559c831115bca323aa68746a2dd9dc875023459b72ec5"}, {0x40, 0x88, 0x39, "e91254173524b71a6cf4982e471433e79bae7c4a781a2a354e5dcee630a99252345f0fe48a629be09093e130c018"}], 0x270}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000002c0)='block_bio_queue\x00'}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r1, 0x12, 0x1, 0x0, 0x0}, 0x20) r6 = openat$cgroup_ro(r0, &(0x7f0000000300)='cpuset.effective_mems\x00', 0x0, 0x0) openat$cgroup_freezer_state(r6, &(0x7f0000000380)='freezer.state\x00', 0x2, 0x0) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) socket$kcm(0x2b, 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a80)={0xffffffffffffffff, 0x0, 0x67, 0x62, &(0x7f0000000840)="f99a133c46d257d5200f326d0a5562cd17685e886bf2f9b3f9a2790348e08bc05a864a96cf5d232acf4d9c795667017ab2c3fa3c298204bcf30edef2ac8db7cbfdf4deae19c3fb8efa11f5d49f040b0731924ad772daa2861563518e94c736d15a5ac7a9872008", &(0x7f00000008c0)=""/98, 0x51a, 0x0, 0x1b, 0x0, &(0x7f0000000940)="5a4fa68ec2c72f99361b9b501348d1d5bce04f26173ed66a605e0c", &(0x7f0000000980)}, 0x48) [ 548.589543][ T9583] usb 3-1: USB disconnect, device number 43 [ 549.244211][ T9583] usb 3-1: new high-speed USB device number 44 using dummy_hcd [ 549.604675][ T9583] usb 3-1: config 1 interface 1 altsetting 1 bulk endpoint 0x82 has invalid maxpacket 16 [ 549.619232][ T9583] usb 3-1: config 1 interface 1 altsetting 1 bulk endpoint 0x3 has invalid maxpacket 8 04:37:45 executing program 2: syz_usb_connect$cdc_ncm(0x0, 0x90, &(0x7f0000000000)={{0x12, 0x1, 0x200, 0x2, 0x0, 0x0, 0x40, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x7e, 0x2, 0x1, 0x7f, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x6, 0x24, 0x6, 0x0, 0x1, "f3"}, {0x5, 0x24, 0x0, 0x7}, {0xd, 0x24, 0xf, 0x1, 0x73a7, 0xd66, 0x0, 0x68}, {0x6, 0x24, 0x1a, 0x1f, 0x10}, [@mbim={0xc, 0x24, 0x1b, 0x3, 0x2, 0x0, 0x3a, 0x8}, @mdlm={0x15}]}, {{0x9, 0x5, 0x81, 0x3, 0x10, 0x8, 0x8a}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x10}}, {{0x9, 0x5, 0x3, 0x2, 0x8, 0xff, 0x8}}}}}}}]}}, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x4, [{0xa1, &(0x7f0000000140)=@string={0xa1, 0x3, "53e5cf0815beb34e08977bb0d91f29cd85965de41763c2fbb389388afbc9b86b1d3a18086a93758549b9a260700078d953ee352d69467ef788ecc1cee187990837ff9f4353a9d2131bcbcfbb8e49a263e2046d24ae120575da4460a9228d049aa80540128d45ad250fe3df3c15a9b8d5c1c84ea7602f6042a9c09518e68a4e8fd17a73dee53749ac139c55c87c6951419395734338a2715d0fe4368ddb7960"}}, {0x0, 0x0}, {0xcd, &(0x7f0000000240)=@string={0xcd, 0x3, "c2add35cee480d264179c653d2cfc606b1791df83017839e4c259e7252966ed8eef491261e9e3232158172f858f5d24d7fd091bf42ab2e1f356e412864112c9894fbf29b46c37ac44e8b2d9f090d933be04f852a1db19bffd199cc61c36001cf0699bf8f9d2ebf543b42f664ec21564af704a561435e0a9d18645c144202a2d2ae4c8f44f7dfa899e2874f86189896141c39e9c1d3a8eb4233ba24044ad608e2d472a520e017fc3c56c9bc6d0d0217e8236a605dc9f1fd77389e8a20f7271709549f7dd6ce4d178b609593"}}, {0x4, &(0x7f0000000340)=@lang_id={0x4, 0x3, 0x1409}}]}) 04:37:45 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) setresuid(0x0, 0xee01, 0xffffffffffffffff) ioctl$TIOCSLCKTRMIOS(r0, 0x4b41, 0x0) 04:37:45 executing program 3: r0 = socket(0x18, 0x0, 0x1) sendmsg$netlink(r0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=ANY=[], 0x58}, 0x0) 04:37:45 executing program 4: munlock(&(0x7f0000fff000/0x1000)=nil, 0x1000) 04:37:45 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x6611, 0x0) 04:37:45 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) r3 = socket$kcm(0x29, 0x7, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xa, 0x2, 0x400, 0xc}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000140), &(0x7f00000000c0), 0x1081, r4}, 0x38) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000000480), 0x8) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000006c0)=@bpf_ext={0x1c, 0x6, &(0x7f0000000100)=@raw=[@initr0, @map={0x18, 0x3, 0x1, 0x0, r4}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}], 0x0, 0x1, 0xf8, &(0x7f0000000580)=""/248, 0x0, 0x18, [], 0x0, 0x0, r5, 0x8, &(0x7f0000000500)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000680)={0x0, 0x3, 0x32c96647, 0x9}, 0x10, 0x28c14, r2}, 0x78) sendmsg$kcm(r3, &(0x7f00000004c0)={&(0x7f00000003c0)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, 0x0, 0x0, &(0x7f0000000bc0)=[{0x58, 0x0, 0x3f, "3d036b2fe1c920e033fd51a7135bc633687035d4990a07405974e24f3e4f5bc747dd8cb833517dba325fb8357ec60f4b737260519cbec967f1e58025da9b5821975edd2eb5ce0e"}, {0x120, 0xff, 0x0, "66a36a9455eecacdd8c163586fbbda03204764abc3a8c9654d37d7c1a2f0137331fa2fc3c6b9c55a1cac3388716c8a76fc203090f4b9a8d9e4e4383140f03e4a858b012a4be6e9627a6c3c2cad945b7222473303ee4ad9cdf1f140621bf10baaf72506be7d90008df69e4c604be55e65d97d52d2badc2bc54195891c461c0f3500918123efc1e58ba54cee893f87f33cfef3bcb68cac978aa5771ed9240b9cf9e44c0f9dc631daaa13163c7cfa501090e5f3800ba5f26eaade9b17afd51fb7a9dee8f4b64db02d16f940369bcc3e3f6aaed6a980b9bef7f37844519af3e31b6887d4daad7bc530e9a2c04fc6f0e4717820569dbc831ef37c4bf3b8733f353ed53179f0ce0a8b9ac8c05b1b1a3f0e12"}, {0x10, 0x116, 0x100}, {0x10, 0x0, 0xa11}, {0x88, 0x109, 0x0, "48dcf8c1cb65b735b2d5007004b54696aa2a8d0eb98210cf2936121163b1c0584580900f864f0ebc03ba1675bbb924fa22af1c7933e3ea0fe010ebefceaa2fd20e15b805012fd2d7a3e171a57996dc09dc5df4ce65f0c01e583247522e22d559c831115bca323aa68746a2dd9dc875023459b72ec5"}, {0x40, 0x88, 0x39, "e91254173524b71a6cf4982e471433e79bae7c4a781a2a354e5dcee630a99252345f0fe48a629be09093e130c018"}], 0x260}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000002c0)='block_bio_queue\x00'}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r1, 0x12, 0x1, 0x0, 0x0}, 0x20) r6 = openat$cgroup_ro(r0, &(0x7f0000000300)='cpuset.effective_mems\x00', 0x0, 0x0) openat$cgroup_freezer_state(r6, &(0x7f0000000380)='freezer.state\x00', 0x2, 0x0) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) socket$kcm(0x2b, 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a80)={0xffffffffffffffff, 0x0, 0x67, 0x62, &(0x7f0000000840)="f99a133c46d257d5200f326d0a5562cd17685e886bf2f9b3f9a2790348e08bc05a864a96cf5d232acf4d9c795667017ab2c3fa3c298204bcf30edef2ac8db7cbfdf4deae19c3fb8efa11f5d49f040b0731924ad772daa2861563518e94c736d15a5ac7a9872008", &(0x7f00000008c0)=""/98, 0x51a, 0x0, 0x1b, 0x0, &(0x7f0000000940)="5a4fa68ec2c72f99361b9b501348d1d5bce04f26173ed66a605e0c", &(0x7f0000000980)}, 0x48) 04:37:45 executing program 4: r0 = socket(0x2, 0x3, 0x47) r1 = dup(r0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8990, &(0x7f0000000000)={'batadv_slave_1\x00'}) 04:37:45 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x24, 0x0, &(0x7f0000000240)) [ 549.954014][ T9583] usb 3-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 549.963121][ T9583] usb 3-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 04:37:45 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) setresuid(0x0, 0xee01, 0xffffffffffffffff) ioctl$TIOCSLCKTRMIOS(r0, 0x4b41, 0x0) 04:37:45 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x6611, 0x0) [ 550.035692][ T9583] usb 3-1: Product: 귂峓䣮☍祁叆쿒ۆ禱ᜰ麃╌犞陒⚑鸞㈲脕䷒큿뾑ꭂἮ渵⡁ᅤ頬ﮔ鯲썆쑺譎鼭ഉ㮓俠⪅넝ロ駑懌惃켁餆辿⺝咿䈻擶⇬䩖ӷ憥幃鴊搘ᑜɂ튢䲮䒏馨蟢虏領ᒖ㤜쇩꣓䋫먳Ф홊狔₥០㳼쥖涼ȍ樣嵠矽鸸₊⟷ग齔홽䷎謗镠 04:37:45 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x18, 0x0, &(0x7f0000000240)) [ 550.264875][ T9583] usb 3-1: can't set config #1, error -71 [ 550.321287][ T9583] usb 3-1: USB disconnect, device number 44 04:37:46 executing program 3: r0 = socket(0x11, 0x3, 0x0) setsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x107, 0xc, 0x0, 0x4) [ 550.743928][ T9583] usb 3-1: new high-speed USB device number 45 using dummy_hcd [ 551.114994][ T9583] usb 3-1: config 1 interface 1 altsetting 1 bulk endpoint 0x82 has invalid maxpacket 16 [ 551.148271][ T9583] usb 3-1: config 1 interface 1 altsetting 1 bulk endpoint 0x3 has invalid maxpacket 8 [ 551.534367][ T9583] usb 3-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 551.543424][ T9583] usb 3-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 551.557625][ T9583] usb 3-1: Product: 귂峓䣮☍祁叆쿒ۆ禱ᜰ麃╌犞陒⚑鸞㈲脕䷒큿뾑ꭂἮ渵⡁ᅤ頬ﮔ鯲썆쑺譎鼭ഉ㮓俠⪅넝ロ駑懌惃켁餆辿⺝咿䈻擶⇬䩖ӷ憥幃鴊搘ᑜɂ튢䲮䒏馨蟢虏領ᒖ㤜쇩꣓䋫먳Ф홊狔₥០㳼쥖涼ȍ樣嵠矽鸸₊⟷ग齔홽䷎謗镠 [ 551.594181][ T9583] usb 3-1: SerialNumber: ᐉ [ 551.947662][ T9583] cdc_ncm 3-1:1.0: bind() failure [ 551.961840][ T9583] cdc_ncm 3-1:1.1: bind() failure [ 551.980162][ T9583] usb 3-1: USB disconnect, device number 45 04:37:48 executing program 2: syz_usb_connect$cdc_ncm(0x0, 0x90, &(0x7f0000000000)={{0x12, 0x1, 0x200, 0x2, 0x0, 0x0, 0x40, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x7e, 0x2, 0x1, 0x7f, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x6, 0x24, 0x6, 0x0, 0x1, "f3"}, {0x5, 0x24, 0x0, 0x7}, {0xd, 0x24, 0xf, 0x1, 0x73a7, 0xd66, 0x0, 0x68}, {0x6, 0x24, 0x1a, 0x1f, 0x10}, [@mbim={0xc, 0x24, 0x1b, 0x3, 0x2, 0x0, 0x3a, 0x8}, @mdlm={0x15}]}, {{0x9, 0x5, 0x81, 0x3, 0x10, 0x8, 0x8a}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x10}}, {{0x9, 0x5, 0x3, 0x2, 0x8, 0xff, 0x8}}}}}}}]}}, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x4, [{0xa1, &(0x7f0000000140)=@string={0xa1, 0x3, "53e5cf0815beb34e08977bb0d91f29cd85965de41763c2fbb389388afbc9b86b1d3a18086a93758549b9a260700078d953ee352d69467ef788ecc1cee187990837ff9f4353a9d2131bcbcfbb8e49a263e2046d24ae120575da4460a9228d049aa80540128d45ad250fe3df3c15a9b8d5c1c84ea7602f6042a9c09518e68a4e8fd17a73dee53749ac139c55c87c6951419395734338a2715d0fe4368ddb7960"}}, {0x0, 0x0}, {0xcd, &(0x7f0000000240)=@string={0xcd, 0x3, "c2add35cee480d264179c653d2cfc606b1791df83017839e4c259e7252966ed8eef491261e9e3232158172f858f5d24d7fd091bf42ab2e1f356e412864112c9894fbf29b46c37ac44e8b2d9f090d933be04f852a1db19bffd199cc61c36001cf0699bf8f9d2ebf543b42f664ec21564af704a561435e0a9d18645c144202a2d2ae4c8f44f7dfa899e2874f86189896141c39e9c1d3a8eb4233ba24044ad608e2d472a520e017fc3c56c9bc6d0d0217e8236a605dc9f1fd77389e8a20f7271709549f7dd6ce4d178b609593"}}, {0x4, &(0x7f0000000340)=@lang_id={0x4, 0x3, 0x1409}}]}) 04:37:48 executing program 5: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bind$bt_l2cap(r0, 0x0, 0x0) 04:37:48 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f0000000180), 0x4) 04:37:48 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) setresuid(0x0, 0xee01, 0xffffffffffffffff) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000400)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0}) 04:37:48 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x6611, 0x0) 04:37:48 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) r3 = socket$kcm(0x29, 0x7, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xa, 0x2, 0x400, 0xc}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000140), &(0x7f00000000c0), 0x1081, r4}, 0x38) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000000480), 0x8) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000006c0)=@bpf_ext={0x1c, 0x6, &(0x7f0000000100)=@raw=[@initr0, @map={0x18, 0x3, 0x1, 0x0, r4}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}], 0x0, 0x1, 0xf8, &(0x7f0000000580)=""/248, 0x0, 0x18, [], 0x0, 0x0, r5, 0x8, &(0x7f0000000500)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000680)={0x0, 0x3, 0x32c96647, 0x9}, 0x10, 0x28c14, r2}, 0x78) sendmsg$kcm(r3, &(0x7f00000004c0)={&(0x7f00000003c0)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, 0x0, 0x0, &(0x7f0000000bc0)=[{0x58, 0x0, 0x3f, "3d036b2fe1c920e033fd51a7135bc633687035d4990a07405974e24f3e4f5bc747dd8cb833517dba325fb8357ec60f4b737260519cbec967f1e58025da9b5821975edd2eb5ce0e"}, {0x120, 0xff, 0x0, "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"}, {0x10, 0x116, 0x100}, {0x10, 0x0, 0xa11}, {0x88, 0x109, 0x0, "48dcf8c1cb65b735b2d5007004b54696aa2a8d0eb98210cf2936121163b1c0584580900f864f0ebc03ba1675bbb924fa22af1c7933e3ea0fe010ebefceaa2fd20e15b805012fd2d7a3e171a57996dc09dc5df4ce65f0c01e583247522e22d559c831115bca323aa68746a2dd9dc875023459b72ec5"}, {0x40, 0x88, 0x39, "e91254173524b71a6cf4982e471433e79bae7c4a781a2a354e5dcee630a99252345f0fe48a629be09093e130c018"}], 0x260}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000002c0)='block_bio_queue\x00'}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r1, 0x12, 0x1, 0x0, 0x0}, 0x20) r6 = openat$cgroup_ro(r0, &(0x7f0000000300)='cpuset.effective_mems\x00', 0x0, 0x0) openat$cgroup_freezer_state(r6, &(0x7f0000000380)='freezer.state\x00', 0x2, 0x0) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) socket$kcm(0x2b, 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a80)={0xffffffffffffffff, 0x0, 0x67, 0x62, &(0x7f0000000840)="f99a133c46d257d5200f326d0a5562cd17685e886bf2f9b3f9a2790348e08bc05a864a96cf5d232acf4d9c795667017ab2c3fa3c298204bcf30edef2ac8db7cbfdf4deae19c3fb8efa11f5d49f040b0731924ad772daa2861563518e94c736d15a5ac7a9872008", &(0x7f00000008c0)=""/98, 0x51a, 0x0, 0x1b, 0x0, &(0x7f0000000940)="5a4fa68ec2c72f99361b9b501348d1d5bce04f26173ed66a605e0c", &(0x7f0000000980)}, 0x48) 04:37:48 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) setresuid(0x0, 0xee01, 0xffffffffffffffff) ioctl$TIOCSLCKTRMIOS(r0, 0x4b64, 0x0) 04:37:48 executing program 5: r0 = socket(0x2, 0x3, 0x47) r1 = dup(r0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x89b0, &(0x7f0000000000)={'batadv_slave_1\x00'}) 04:37:48 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGKBTYPE(r0, 0x4b46, &(0x7f0000000200)) 04:37:48 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockname(r0, &(0x7f0000000040)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, &(0x7f00000000c0)=0x80) 04:37:48 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x6611, 0x0) 04:37:48 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0xb, 0x10, r0, 0x8000000) [ 552.873901][ T9583] usb 3-1: new high-speed USB device number 46 using dummy_hcd [ 553.234156][ T9583] usb 3-1: config 1 interface 1 altsetting 1 bulk endpoint 0x82 has invalid maxpacket 16 [ 553.268550][ T9583] usb 3-1: config 1 interface 1 altsetting 1 bulk endpoint 0x3 has invalid maxpacket 8 [ 553.674561][ T9583] usb 3-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 553.688210][ T9583] usb 3-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 553.696449][ T9583] usb 3-1: Product: 귂峓䣮☍祁叆쿒ۆ禱ᜰ麃╌犞陒⚑鸞㈲脕䷒큿뾑ꭂἮ渵⡁ᅤ頬ﮔ鯲썆쑺譎鼭ഉ㮓俠⪅넝ロ駑懌惃켁餆辿⺝咿䈻擶⇬䩖ӷ憥幃鴊搘ᑜɂ튢䲮䒏馨蟢虏領ᒖ㤜쇩꣓䋫먳Ф홊狔₥០㳼쥖涼ȍ樣嵠矽鸸₊⟷ग齔홽䷎謗镠 [ 553.731065][ T9583] usb 3-1: SerialNumber: ᐉ [ 554.073744][ T9583] cdc_ncm 3-1:1.0: bind() failure [ 554.091224][ T9583] cdc_ncm 3-1:1.1: bind() failure [ 554.114445][ T9583] usb 3-1: USB disconnect, device number 46 04:37:50 executing program 2: syz_usb_connect$cdc_ncm(0x0, 0x90, &(0x7f0000000000)={{0x12, 0x1, 0x200, 0x2, 0x0, 0x0, 0x40, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x7e, 0x2, 0x1, 0x7f, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x6, 0x24, 0x6, 0x0, 0x1, "f3"}, {0x5, 0x24, 0x0, 0x7}, {0xd, 0x24, 0xf, 0x1, 0x73a7, 0xd66, 0x0, 0x68}, {0x6, 0x24, 0x1a, 0x1f, 0x10}, [@mbim={0xc, 0x24, 0x1b, 0x3, 0x2, 0x0, 0x3a, 0x8}, @mdlm={0x15}]}, {{0x9, 0x5, 0x81, 0x3, 0x10, 0x8, 0x8a}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x10}}, {{0x9, 0x5, 0x3, 0x2, 0x8, 0xff, 0x8}}}}}}}]}}, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x4, [{0xa1, &(0x7f0000000140)=@string={0xa1, 0x3, "53e5cf0815beb34e08977bb0d91f29cd85965de41763c2fbb389388afbc9b86b1d3a18086a93758549b9a260700078d953ee352d69467ef788ecc1cee187990837ff9f4353a9d2131bcbcfbb8e49a263e2046d24ae120575da4460a9228d049aa80540128d45ad250fe3df3c15a9b8d5c1c84ea7602f6042a9c09518e68a4e8fd17a73dee53749ac139c55c87c6951419395734338a2715d0fe4368ddb7960"}}, {0x0, 0x0}, {0xcd, &(0x7f0000000240)=@string={0xcd, 0x3, "c2add35cee480d264179c653d2cfc606b1791df83017839e4c259e7252966ed8eef491261e9e3232158172f858f5d24d7fd091bf42ab2e1f356e412864112c9894fbf29b46c37ac44e8b2d9f090d933be04f852a1db19bffd199cc61c36001cf0699bf8f9d2ebf543b42f664ec21564af704a561435e0a9d18645c144202a2d2ae4c8f44f7dfa899e2874f86189896141c39e9c1d3a8eb4233ba24044ad608e2d472a520e017fc3c56c9bc6d0d0217e8236a605dc9f1fd77389e8a20f7271709549f7dd6ce4d178b609593"}}, {0x4, &(0x7f0000000340)=@lang_id={0x4, 0x3, 0x1409}}]}) 04:37:50 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) setresuid(0x0, 0xee01, 0xffffffffffffffff) ioctl$TIOCSLCKTRMIOS(r0, 0x5412, 0x0) 04:37:50 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) setresuid(0x0, 0xee01, 0xffffffffffffffff) ioctl$KDGKBTYPE(r0, 0x5608, &(0x7f0000000000)) 04:37:50 executing program 3: r0 = socket(0x2, 0x3, 0x47) r1 = dup(r0) r2 = fcntl$dupfd(r1, 0x0, r0) bind$bt_l2cap(r2, 0x0, 0x0) 04:37:50 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x6611, 0x0) 04:37:50 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) r3 = socket$kcm(0x29, 0x7, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xa, 0x2, 0x400, 0xc}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000140), &(0x7f00000000c0), 0x1081, r4}, 0x38) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000000480), 0x8) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000006c0)=@bpf_ext={0x1c, 0x6, &(0x7f0000000100)=@raw=[@initr0, @map={0x18, 0x3, 0x1, 0x0, r4}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}], 0x0, 0x1, 0xf8, &(0x7f0000000580)=""/248, 0x0, 0x18, [], 0x0, 0x0, r5, 0x8, &(0x7f0000000500)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000680)={0x0, 0x3, 0x32c96647, 0x9}, 0x10, 0x28c14, r2}, 0x78) sendmsg$kcm(r3, &(0x7f00000004c0)={&(0x7f00000003c0)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, 0x0, 0x0, &(0x7f0000000bc0)=[{0x58, 0x0, 0x3f, "3d036b2fe1c920e033fd51a7135bc633687035d4990a07405974e24f3e4f5bc747dd8cb833517dba325fb8357ec60f4b737260519cbec967f1e58025da9b5821975edd2eb5ce0e"}, {0x120, 0xff, 0x0, "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"}, {0x10, 0x116, 0x100}, {0x10, 0x0, 0xa11}, {0x88, 0x109, 0x0, "48dcf8c1cb65b735b2d5007004b54696aa2a8d0eb98210cf2936121163b1c0584580900f864f0ebc03ba1675bbb924fa22af1c7933e3ea0fe010ebefceaa2fd20e15b805012fd2d7a3e171a57996dc09dc5df4ce65f0c01e583247522e22d559c831115bca323aa68746a2dd9dc875023459b72ec5"}, {0x40, 0x88, 0x39, "e91254173524b71a6cf4982e471433e79bae7c4a781a2a354e5dcee630a99252345f0fe48a629be09093e130c018"}], 0x260}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000002c0)='block_bio_queue\x00'}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r1, 0x12, 0x1, 0x0, 0x0}, 0x20) r6 = openat$cgroup_ro(r0, &(0x7f0000000300)='cpuset.effective_mems\x00', 0x0, 0x0) openat$cgroup_freezer_state(r6, &(0x7f0000000380)='freezer.state\x00', 0x2, 0x0) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) socket$kcm(0x2b, 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a80)={0xffffffffffffffff, 0x0, 0x67, 0x62, &(0x7f0000000840)="f99a133c46d257d5200f326d0a5562cd17685e886bf2f9b3f9a2790348e08bc05a864a96cf5d232acf4d9c795667017ab2c3fa3c298204bcf30edef2ac8db7cbfdf4deae19c3fb8efa11f5d49f040b0731924ad772daa2861563518e94c736d15a5ac7a9872008", &(0x7f00000008c0)=""/98, 0x51a, 0x0, 0x1b, 0x0, &(0x7f0000000940)="5a4fa68ec2c72f99361b9b501348d1d5bce04f26173ed66a605e0c", &(0x7f0000000980)}, 0x48) 04:37:50 executing program 3: socketpair(0x0, 0x80003, 0x0, &(0x7f0000000000)) 04:37:50 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) setresuid(0x0, 0xee01, 0xffffffffffffffff) ioctl$TIOCSLCKTRMIOS(r0, 0x5412, 0x0) 04:37:50 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) setresuid(0x0, 0xee01, 0xffffffffffffffff) ioctl$KDGKBTYPE(r0, 0x5608, &(0x7f0000000000)) 04:37:50 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) setresuid(0x0, 0xee01, 0xffffffffffffffff) ioctl$TIOCSLCKTRMIOS(r0, 0x5412, 0x0) 04:37:50 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) setresuid(0x0, 0xee01, 0xffffffffffffffff) ioctl$KDGKBTYPE(r0, 0x5608, &(0x7f0000000000)) 04:37:50 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x6611, 0x0) [ 555.013580][ T9583] usb 3-1: new high-speed USB device number 47 using dummy_hcd [ 555.374041][ T9583] usb 3-1: config 1 interface 1 altsetting 1 bulk endpoint 0x82 has invalid maxpacket 16 [ 555.414735][ T9583] usb 3-1: config 1 interface 1 altsetting 1 bulk endpoint 0x3 has invalid maxpacket 8 [ 555.824595][ T9583] usb 3-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 555.838469][ T9583] usb 3-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 555.848740][ T9583] usb 3-1: Product: 귂峓䣮☍祁叆쿒ۆ禱ᜰ麃╌犞陒⚑鸞㈲脕䷒큿뾑ꭂἮ渵⡁ᅤ頬ﮔ鯲썆쑺譎鼭ഉ㮓俠⪅넝ロ駑懌惃켁餆辿⺝咿䈻擶⇬䩖ӷ憥幃鴊搘ᑜɂ튢䲮䒏馨蟢虏領ᒖ㤜쇩꣓䋫먳Ф홊狔₥០㳼쥖涼ȍ樣嵠矽鸸₊⟷ग齔홽䷎謗镠 [ 555.884862][ T9583] usb 3-1: SerialNumber: ᐉ [ 556.233474][ T9583] cdc_ncm 3-1:1.0: bind() failure [ 556.251732][ T9583] cdc_ncm 3-1:1.1: bind() failure [ 556.272012][ T9583] usb 3-1: USB disconnect, device number 47 04:37:52 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGKBTYPE(r0, 0x4b31, &(0x7f0000000200)) 04:37:52 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) setresuid(0x0, 0xee01, 0xffffffffffffffff) ioctl$TIOCSLCKTRMIOS(r0, 0x5412, 0x0) 04:37:52 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) setresuid(0x0, 0xee01, 0xffffffffffffffff) ioctl$KDGKBTYPE(r0, 0x5608, &(0x7f0000000000)) 04:37:52 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x6611, 0x0) 04:37:52 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) r3 = socket$kcm(0x29, 0x7, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xa, 0x2, 0x400, 0xc}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000140), &(0x7f00000000c0), 0x1081, r4}, 0x38) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000000480), 0x8) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000006c0)=@bpf_ext={0x1c, 0x6, &(0x7f0000000100)=@raw=[@initr0, @map={0x18, 0x3, 0x1, 0x0, r4}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}], 0x0, 0x1, 0xf8, &(0x7f0000000580)=""/248, 0x0, 0x18, [], 0x0, 0x0, r5, 0x8, &(0x7f0000000500)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000680)={0x0, 0x3, 0x32c96647, 0x9}, 0x10, 0x28c14, r2}, 0x78) sendmsg$kcm(r3, &(0x7f00000004c0)={&(0x7f00000003c0)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, 0x0, 0x0, &(0x7f0000000bc0)=[{0x58, 0x0, 0x3f, "3d036b2fe1c920e033fd51a7135bc633687035d4990a07405974e24f3e4f5bc747dd8cb833517dba325fb8357ec60f4b737260519cbec967f1e58025da9b5821975edd2eb5ce0e"}, {0x120, 0xff, 0x0, "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"}, {0x18, 0x116, 0x100, "e12e82da376bca8f"}, {0x10, 0x0, 0xa11}, {0x88, 0x109, 0x0, "48dcf8c1cb65b735b2d5007004b54696aa2a8d0eb98210cf2936121163b1c0584580900f864f0ebc03ba1675bbb924fa22af1c7933e3ea0fe010ebefceaa2fd20e15b805012fd2d7a3e171a57996dc09dc5df4ce65f0c01e583247522e22d559c831115bca323aa68746a2dd9dc875023459b72ec5"}, {0x40, 0x88, 0x39, "e91254173524b71a6cf4982e471433e79bae7c4a781a2a354e5dcee630a99252345f0fe48a629be09093e130c018"}], 0x268}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000002c0)='block_bio_queue\x00'}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r1, 0x12, 0x1, 0x0, 0x0}, 0x20) r6 = openat$cgroup_ro(r0, &(0x7f0000000300)='cpuset.effective_mems\x00', 0x0, 0x0) openat$cgroup_freezer_state(r6, &(0x7f0000000380)='freezer.state\x00', 0x2, 0x0) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) socket$kcm(0x2b, 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a80)={0xffffffffffffffff, 0x0, 0x67, 0x62, &(0x7f0000000840)="f99a133c46d257d5200f326d0a5562cd17685e886bf2f9b3f9a2790348e08bc05a864a96cf5d232acf4d9c795667017ab2c3fa3c298204bcf30edef2ac8db7cbfdf4deae19c3fb8efa11f5d49f040b0731924ad772daa2861563518e94c736d15a5ac7a9872008", &(0x7f00000008c0)=""/98, 0x51a, 0x0, 0x1b, 0x0, &(0x7f0000000940)="5a4fa68ec2c72f99361b9b501348d1d5bce04f26173ed66a605e0c", &(0x7f0000000980)}, 0x48) 04:37:52 executing program 3: r0 = socket(0x11, 0x3, 0x0) setsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x107, 0x17, 0x0, 0x4) 04:37:52 executing program 2: r0 = socket(0x11, 0x3, 0x0) setsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, 0x0) 04:37:52 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) setresuid(0x0, 0xee01, 0xffffffffffffffff) ioctl$TIOCSLCKTRMIOS(r0, 0x4b3b, 0x0) 04:37:52 executing program 5: socketpair(0x2, 0x1, 0x0, &(0x7f00000001c0)) 04:37:52 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) setresuid(0x0, 0xee01, 0xffffffffffffffff) ioctl$TIOCSLCKTRMIOS(r0, 0x5608, 0x0) 04:37:52 executing program 5: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='attr/sockcreate\x00') syz_usb_connect$printer(0x3, 0x2d, &(0x7f00000000c0)={{0x12, 0x1, 0x110, 0x0, 0x0, 0x0, 0x20, 0x525, 0xa4a8, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x1b, 0x1, 0x1, 0xff, 0xb0, 0x80, [{{0x9, 0x4, 0x0, 0x4, 0x1, 0x7, 0x1, 0x1, 0x81, "", {{{0x9, 0x5, 0x1, 0x2, 0x20, 0xe2, 0x5c}}}}}]}}]}}, &(0x7f0000000340)={0xa, &(0x7f0000000100)={0xa, 0x6, 0x200, 0x9, 0x1, 0x3, 0x10, 0x40}, 0x24, &(0x7f0000000140)={0x5, 0xf, 0x24, 0x4, [@ss_cap={0xa, 0x10, 0x3, 0x0, 0x7, 0x80, 0xd, 0x4}, @ptm_cap={0x3}, @ext_cap={0x7, 0x10, 0x2, 0x0, 0x0, 0xd, 0x8}, @wireless={0xb, 0x10, 0x1, 0xc, 0x6a, 0x80, 0xff, 0x33, 0xff}]}, 0x3, [{0x38, &(0x7f0000000180)=ANY=[@ANYBLOB="3803f0238f43f3f6f6a9029d9ce837d7d97df6e2b263c1679131b0a911c3c00902bc428cc017cb431e118018afd2bf297b01a472c3c07db2"]}, {0x99, &(0x7f00000001c0)=@string={0x99, 0x3, "0267f7a2c950e8bf7433f06e44511477cca879701c5ebf013682021f209955acb7819633597cfa9fa828260c9b9d6f5d422d98a591f35f852720e80a95b9638a6f527815af7e149d2e843220223bff94a2e1e6339672861917c7e39a7b73b90e0eee7571f2ff455badd5e2e5ce69158d45358b0b28fe117dddb7e2358655b58d8142895b65e0af57b3820ec76a8a896db49f9e124b3789"}}, {0x8a, &(0x7f0000000280)=@string={0x8a, 0x3, "57fab7c9985ef30f22f78e6d0987643ace9a29c097859f653bb269ac6c68237945b2259e0568d05e7a7ccc2041fcbf58cd2d9045479839474d5e256bfd2604384e614edcd2b0162924ba4ea9d78c112a9f4f9313d2e5b76f12066e5da43923777048bc3627d074882a3a382b8a8027dbc1cfda58d1510e5b4188fcf6181959df7e3feee2dcad2a5c"}}]}) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f00000004c0)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000480)={&(0x7f00000003c0)={0xb8, 0x0, 0x1, 0x70bd25, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_DEST={0x2c, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x4}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x401}, @IPVS_DEST_ATTR_TUN_TYPE={0x5, 0xd, 0x1}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x292}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x80}]}, @IPVS_CMD_ATTR_DEST={0x3c, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x3f}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@initdev={0xfe, 0x88, [], 0x0, 0x0}}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@broadcast}]}, @IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e22}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast2}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5}]}]}, 0xb8}, 0x1, 0x0, 0x0, 0x4000}, 0x80) clone(0x20000100, &(0x7f0000000500)="5395b495e77cd35ddc2c710fa2674f7e48367fdd4c4c65183fea0f1003e11cdbd719b487a75236a352bfa19bc3d48b94b63c0029e2784a064d29e16f154a53ea86eed203f8195be4ae366cd22259a0e234ad5ee49cc1eabfdcf599c748169e657e7e9c8bf365bd7267529b1712", &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="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") setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000700)={@remote}, 0x14) getsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000040), &(0x7f0000000080)=0x4) 04:37:52 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) setresuid(0x0, 0xee01, 0xffffffffffffffff) ioctl$TIOCSLCKTRMIOS(r0, 0x5607, 0x0) 04:37:52 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x6611, 0x0) 04:37:52 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) setresuid(0x0, 0xee01, 0xffffffffffffffff) ioctl$TIOCSLCKTRMIOS(r0, 0x4b33, 0x0) 04:37:52 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) setresuid(0x0, 0xee01, 0xffffffffffffffff) ioctl$KDSKBSENT(r0, 0x4b49, &(0x7f0000000000)={0x0, "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"}) 04:37:52 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) setresuid(0x0, 0xee01, 0xffffffffffffffff) ioctl$TIOCSLCKTRMIOS(r0, 0x5607, 0x0) [ 557.343594][ T3822] usb 6-1: new high-speed USB device number 95 using dummy_hcd [ 557.593976][ T3822] usb 6-1: Using ep0 maxpacket: 32 04:37:53 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) r3 = socket$kcm(0x29, 0x7, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xa, 0x2, 0x400, 0xc}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000140), &(0x7f00000000c0), 0x1081, r4}, 0x38) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000000480), 0x8) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000006c0)=@bpf_ext={0x1c, 0x6, &(0x7f0000000100)=@raw=[@initr0, @map={0x18, 0x3, 0x1, 0x0, r4}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}], 0x0, 0x1, 0xf8, &(0x7f0000000580)=""/248, 0x0, 0x18, [], 0x0, 0x0, r5, 0x8, &(0x7f0000000500)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000680)={0x0, 0x3, 0x32c96647, 0x9}, 0x10, 0x28c14, r2}, 0x78) sendmsg$kcm(r3, &(0x7f00000004c0)={&(0x7f00000003c0)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, 0x0, 0x0, &(0x7f0000000bc0)=[{0x58, 0x0, 0x3f, "3d036b2fe1c920e033fd51a7135bc633687035d4990a07405974e24f3e4f5bc747dd8cb833517dba325fb8357ec60f4b737260519cbec967f1e58025da9b5821975edd2eb5ce0e"}, {0x120, 0xff, 0x0, "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"}, {0x18, 0x116, 0x100, "e12e82da376bca8f"}, {0x10, 0x0, 0xa11}, {0x88, 0x109, 0x0, "48dcf8c1cb65b735b2d5007004b54696aa2a8d0eb98210cf2936121163b1c0584580900f864f0ebc03ba1675bbb924fa22af1c7933e3ea0fe010ebefceaa2fd20e15b805012fd2d7a3e171a57996dc09dc5df4ce65f0c01e583247522e22d559c831115bca323aa68746a2dd9dc875023459b72ec5"}, {0x40, 0x88, 0x39, "e91254173524b71a6cf4982e471433e79bae7c4a781a2a354e5dcee630a99252345f0fe48a629be09093e130c018"}], 0x268}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000002c0)='block_bio_queue\x00'}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r1, 0x12, 0x1, 0x0, 0x0}, 0x20) r6 = openat$cgroup_ro(r0, &(0x7f0000000300)='cpuset.effective_mems\x00', 0x0, 0x0) openat$cgroup_freezer_state(r6, &(0x7f0000000380)='freezer.state\x00', 0x2, 0x0) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) socket$kcm(0x2b, 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a80)={0xffffffffffffffff, 0x0, 0x67, 0x62, &(0x7f0000000840)="f99a133c46d257d5200f326d0a5562cd17685e886bf2f9b3f9a2790348e08bc05a864a96cf5d232acf4d9c795667017ab2c3fa3c298204bcf30edef2ac8db7cbfdf4deae19c3fb8efa11f5d49f040b0731924ad772daa2861563518e94c736d15a5ac7a9872008", &(0x7f00000008c0)=""/98, 0x51a, 0x0, 0x1b, 0x0, &(0x7f0000000940)="5a4fa68ec2c72f99361b9b501348d1d5bce04f26173ed66a605e0c", &(0x7f0000000980)}, 0x48) 04:37:53 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, 0x0) 04:37:53 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) setresuid(0x0, 0xee01, 0xffffffffffffffff) ioctl$TIOCSLCKTRMIOS(r0, 0x5607, 0x0) 04:37:53 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x6611, 0x0) 04:37:53 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) setresuid(0x0, 0xee01, 0xffffffffffffffff) ioctl$KDSKBSENT(r0, 0x4b49, &(0x7f0000000000)={0x0, "227ad54cfd27cd941906869a1ca66a1dd519305e46d2ae0792ca246387e13dbbfc8718e86e0d2c67a14df725fcc869acd4e11e77a11f6b0981c3a28153563e3f17668ceb76eb37d33371ec5ec4186777f8f48e03be4accf5b70e652ba022d0c0cf8b918155efaf04e8463919bb5f9839a8239cfc6c51444994ba1fab3d7596df43e8f86351537f20569d4fd25e78e62a8857899661be3c589f6fca26a9a3fa8fdf0cce5a78c25b3af3dc4ce45c13c10328260fbc3b711fdb0fd5cc215b358de268bbef2a1dc7f2951fa34c663ce990ea9bdca44d6c6de7bc2f9e1a8efd3f5934bfb2a9ac651711e13b74aac904600864d5701b3df1954a522003df7f2ca613a022d44c206fb1a402ea73d65fb02e9e9825cf742030b6f39ee8a63747d14e7af546065907599edc054d2e02c998ae11272ba9f49d704e4dd7c5c0317df841f9f1f5114018fa1ffcbb89b02bac6b27a8398ea772e24ac31cdc13eb69d545f95d4ac257b8f6eb4d59a0f009f13c702ddca0b1071c6bf83e823891b2cbee1743b1d0efef7839e1ea7123a9acbb8c1895143b76a50ab82250c209db42c801185df5e1db60bf7b77484719cf1cdce9942b17660ad093844852827f56a62a5e241e354ff1abb965f543acb6685c22e732ba55f9f48793962cc55a3fd8c82b9ea14c563f663856eba522c6d6b1f7285988eb04d7e24eba048ffd66efd8ee24fcde5ffa23"}) 04:37:53 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) setresuid(0x0, 0xee01, 0xffffffffffffffff) ioctl$TIOCSLCKTRMIOS(r0, 0x5607, 0x0) [ 557.733942][ T3822] usb 6-1: config 1 interface 0 altsetting 4 bulk endpoint 0x1 has invalid maxpacket 32 [ 557.754656][ T3822] usb 6-1: config 1 interface 0 has no altsetting 0 [ 557.953290][ T3822] usb 6-1: New USB device found, idVendor=0525, idProduct=a4a8, bcdDevice= 0.40 [ 557.964078][ T3822] usb 6-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 557.972197][ T3822] usb 6-1: Product: 練즷庘࿳涎蜉㩤髎쀩薗斟눻걩桬礣뉅鸥栅廐籺⃌ﱁ墿ⷍ䖐顇䜹幍欥⛽㠄慎냒⤖먤ꥎ賗⨑侟᎓澷ؒ嵮㦤眣䡰㚼퀧衴㨪⬸肊쿁壚凑嬎衁ᤘ㽾규尪 [ 557.995302][ T3822] usb 6-1: Manufacturer: 朂ꋷ僉뿨㍴滰兄眔꣌灹帜ƿ舶ἂ餠걕膷㎖籙鿺⢨ద鶛嵯ⵂꖘ蕟‧૨릕詣副ᕸ纯鴔萮′㬢铿㏦犖ᦆ윗髣獻ູ煵￲孅햭槎贕㕅஋︨紑럝㗢喆趵䊁安垯芳윎詪涉龴ኞ㝋 [ 558.020839][ T3822] usb 6-1: SerialNumber: syz [ 558.044831][T22913] raw-gadget gadget: fail, usb_ep_enable returned -22 04:37:53 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) bind$bt_l2cap(r0, 0x0, 0x0) 04:37:53 executing program 3: syz_usb_connect$printer(0x0, 0x2d, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x20, 0x525, 0xa4a8, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x1b, 0x1}}]}}, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x2, [{0x38, 0x0}, {0x46, &(0x7f0000000280)=@string={0x46, 0x3, "57fab7c9985ef30f22f78e6d0987643ace9a29c097859f653bb269ac6c68237945b2259e0568d05e7a7ccc2041fcbf58cd2d9045479839474d5e256bfd2604384e614edc"}}]}) 04:37:53 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) setresuid(0x0, 0xee01, 0xffffffffffffffff) ioctl$TIOCSLCKTRMIOS(r0, 0x4b30, 0x0) 04:37:53 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x6611, 0x0) 04:37:53 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) setresuid(0x0, 0xee01, 0xffffffffffffffff) ioctl$KDSKBSENT(r0, 0x4b49, &(0x7f0000000000)={0x0, "227ad54cfd27cd941906869a1ca66a1dd519305e46d2ae0792ca246387e13dbbfc8718e86e0d2c67a14df725fcc869acd4e11e77a11f6b0981c3a28153563e3f17668ceb76eb37d33371ec5ec4186777f8f48e03be4accf5b70e652ba022d0c0cf8b918155efaf04e8463919bb5f9839a8239cfc6c51444994ba1fab3d7596df43e8f86351537f20569d4fd25e78e62a8857899661be3c589f6fca26a9a3fa8fdf0cce5a78c25b3af3dc4ce45c13c10328260fbc3b711fdb0fd5cc215b358de268bbef2a1dc7f2951fa34c663ce990ea9bdca44d6c6de7bc2f9e1a8efd3f5934bfb2a9ac651711e13b74aac904600864d5701b3df1954a522003df7f2ca613a022d44c206fb1a402ea73d65fb02e9e9825cf742030b6f39ee8a63747d14e7af546065907599edc054d2e02c998ae11272ba9f49d704e4dd7c5c0317df841f9f1f5114018fa1ffcbb89b02bac6b27a8398ea772e24ac31cdc13eb69d545f95d4ac257b8f6eb4d59a0f009f13c702ddca0b1071c6bf83e823891b2cbee1743b1d0efef7839e1ea7123a9acbb8c1895143b76a50ab82250c209db42c801185df5e1db60bf7b77484719cf1cdce9942b17660ad093844852827f56a62a5e241e354ff1abb965f543acb6685c22e732ba55f9f48793962cc55a3fd8c82b9ea14c563f663856eba522c6d6b1f7285988eb04d7e24eba048ffd66efd8ee24fcde5ffa23"}) 04:37:54 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) setresuid(0x0, 0xee01, 0xffffffffffffffff) ioctl$TIOCSLCKTRMIOS(r0, 0x4b30, 0x0) [ 558.440430][ T3822] usblp 6-1:1.0: usblp0: USB Unidirectional printer dev 95 if 0 alt 4 proto 1 vid 0x0525 pid 0xA4A8 [ 558.482094][ T3822] usb 6-1: USB disconnect, device number 95 [ 558.510943][ T3822] usblp0: removed 04:37:54 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) r3 = socket$kcm(0x29, 0x7, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xa, 0x2, 0x400, 0xc}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000140), &(0x7f00000000c0), 0x1081, r4}, 0x38) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000000480), 0x8) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000006c0)=@bpf_ext={0x1c, 0x6, &(0x7f0000000100)=@raw=[@initr0, @map={0x18, 0x3, 0x1, 0x0, r4}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}], 0x0, 0x1, 0xf8, &(0x7f0000000580)=""/248, 0x0, 0x18, [], 0x0, 0x0, r5, 0x8, &(0x7f0000000500)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000680)={0x0, 0x3, 0x32c96647, 0x9}, 0x10, 0x28c14, r2}, 0x78) sendmsg$kcm(r3, &(0x7f00000004c0)={&(0x7f00000003c0)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, 0x0, 0x0, &(0x7f0000000bc0)=[{0x58, 0x0, 0x3f, "3d036b2fe1c920e033fd51a7135bc633687035d4990a07405974e24f3e4f5bc747dd8cb833517dba325fb8357ec60f4b737260519cbec967f1e58025da9b5821975edd2eb5ce0e"}, {0x120, 0xff, 0x0, "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"}, {0x18, 0x116, 0x100, "e12e82da376bca8f"}, {0x10, 0x0, 0xa11}, {0x88, 0x109, 0x0, "48dcf8c1cb65b735b2d5007004b54696aa2a8d0eb98210cf2936121163b1c0584580900f864f0ebc03ba1675bbb924fa22af1c7933e3ea0fe010ebefceaa2fd20e15b805012fd2d7a3e171a57996dc09dc5df4ce65f0c01e583247522e22d559c831115bca323aa68746a2dd9dc875023459b72ec5"}, {0x40, 0x88, 0x39, "e91254173524b71a6cf4982e471433e79bae7c4a781a2a354e5dcee630a99252345f0fe48a629be09093e130c018"}], 0x268}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000002c0)='block_bio_queue\x00'}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r1, 0x12, 0x1, 0x0, 0x0}, 0x20) r6 = openat$cgroup_ro(r0, &(0x7f0000000300)='cpuset.effective_mems\x00', 0x0, 0x0) openat$cgroup_freezer_state(r6, &(0x7f0000000380)='freezer.state\x00', 0x2, 0x0) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) socket$kcm(0x2b, 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a80)={0xffffffffffffffff, 0x0, 0x67, 0x62, &(0x7f0000000840)="f99a133c46d257d5200f326d0a5562cd17685e886bf2f9b3f9a2790348e08bc05a864a96cf5d232acf4d9c795667017ab2c3fa3c298204bcf30edef2ac8db7cbfdf4deae19c3fb8efa11f5d49f040b0731924ad772daa2861563518e94c736d15a5ac7a9872008", &(0x7f00000008c0)=""/98, 0x51a, 0x0, 0x1b, 0x0, &(0x7f0000000940)="5a4fa68ec2c72f99361b9b501348d1d5bce04f26173ed66a605e0c", &(0x7f0000000980)}, 0x48) 04:37:54 executing program 5: syz_usb_connect$printer(0x0, 0x2d, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x20, 0x525, 0xa4a8, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x1b, 0x1}}]}}, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x2, [{0x38, 0x0}, {0x72, &(0x7f0000000280)=@string={0x72, 0x3, "57fab7c9985ef30f22f78e6d0987643ace9a29c097859f653bb269ac6c68237945b2259e0568d05e7a7ccc2041fcbf58cd2d9045479839474d5e256bfd2604384e614edcd2b0162924ba4ea9d78c112a9f4f9313d2e5b76f12066e5da43923777048bc3627d074882a3a382b8a8027db"}}]}) 04:37:54 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) setresuid(0x0, 0xee01, 0xffffffffffffffff) ioctl$TIOCSLCKTRMIOS(r0, 0x4b30, 0x0) 04:37:54 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) setresuid(0x0, 0xee01, 0xffffffffffffffff) ioctl$KDSKBSENT(r0, 0x4b49, &(0x7f0000000000)={0x0, "227ad54cfd27cd941906869a1ca66a1dd519305e46d2ae0792ca246387e13dbbfc8718e86e0d2c67a14df725fcc869acd4e11e77a11f6b0981c3a28153563e3f17668ceb76eb37d33371ec5ec4186777f8f48e03be4accf5b70e652ba022d0c0cf8b918155efaf04e8463919bb5f9839a8239cfc6c51444994ba1fab3d7596df43e8f86351537f20569d4fd25e78e62a8857899661be3c589f6fca26a9a3fa8fdf0cce5a78c25b3af3dc4ce45c13c10328260fbc3b711fdb0fd5cc215b358de268bbef2a1dc7f2951fa34c663ce990ea9bdca44d6c6de7bc2f9e1a8efd3f5934bfb2a9ac651711e13b74aac904600864d5701b3df1954a522003df7f2ca613a022d44c206fb1a402ea73d65fb02e9e9825cf742030b6f39ee8a63747d14e7af546065907599edc054d2e02c998ae11272ba9f49d704e4dd7c5c0317df841f9f1f5114018fa1ffcbb89b02bac6b27a8398ea772e24ac31cdc13eb69d545f95d4ac257b8f6eb4d59a0f009f13c702ddca0b1071c6bf83e823891b2cbee1743b1d0efef7839e1ea7123a9acbb8c1895143b76a50ab82250c209db42c801185df5e1db60bf7b77484719cf1cdce9942b17660ad093844852827f56a62a5e241e354ff1abb965f543acb6685c22e732ba55f9f48793962cc55a3fd8c82b9ea14c563f663856eba522c6d6b1f7285988eb04d7e24eba048ffd66efd8ee24fcde5ffa23"}) 04:37:54 executing program 1: getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, 0x0, &(0x7f0000000240)) mincore(&(0x7f0000ffe000/0x2000)=nil, 0x2000, &(0x7f0000000040)=""/79) 04:37:54 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) setresuid(0x0, 0xee01, 0xffffffffffffffff) ioctl$TIOCSLCKTRMIOS(r0, 0x4b30, 0x0) 04:37:54 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) setresuid(0x0, 0xee01, 0xffffffffffffffff) ioctl$TIOCSLCKTRMIOS(r0, 0x4b4b, 0x0) 04:37:54 executing program 3: syz_usb_connect$printer(0x0, 0x2d, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x20, 0x525, 0xa4a8, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x1b, 0x1}}]}}, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x1, [{0x38, 0x0}]}) 04:37:54 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) setresuid(0x0, 0xee01, 0xffffffffffffffff) ioctl$TIOCSLCKTRMIOS(r0, 0x4b4b, 0x0) 04:37:54 executing program 1: r0 = socket(0x18, 0x0, 0x1) setsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x107, 0x5, 0x0, 0x10) 04:37:54 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000001380)='nl80211\x00', 0xffffffffffffffff) sendmsg$NL80211_CMD_TDLS_MGMT(r0, &(0x7f0000001540)={0x0, 0x0, &(0x7f0000001500)={&(0x7f00000013c0)={0x34, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_IE={0x15, 0x2a, [@erp, @mesh_id={0x72, 0x6}, @ext_channel_switch={0x3c, 0x4}]}]}, 0x34}}, 0x0) 04:37:54 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) setresuid(0x0, 0xee01, 0xffffffffffffffff) ioctl$TIOCSLCKTRMIOS(r0, 0x4b4b, 0x0) [ 559.095172][ T3822] usb 6-1: new high-speed USB device number 96 using dummy_hcd [ 559.353087][ T3822] usb 6-1: Using ep0 maxpacket: 32 [ 559.473930][ T3822] usb 6-1: config 1 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 0 04:37:55 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) r3 = socket$kcm(0x29, 0x7, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xa, 0x2, 0x400, 0xc}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000140), &(0x7f00000000c0), 0x1081, r4}, 0x38) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000000480), 0x8) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000006c0)=@bpf_ext={0x1c, 0x6, &(0x7f0000000100)=@raw=[@initr0, @map={0x18, 0x3, 0x1, 0x0, r4}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}], 0x0, 0x1, 0xf8, &(0x7f0000000580)=""/248, 0x0, 0x18, [], 0x0, 0x0, r5, 0x8, &(0x7f0000000500)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000680)={0x0, 0x3, 0x32c96647, 0x9}, 0x10, 0x28c14, r2}, 0x78) sendmsg$kcm(r3, &(0x7f00000004c0)={&(0x7f00000003c0)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, 0x0, 0x0, &(0x7f0000000bc0)=[{0x58, 0x0, 0x3f, "3d036b2fe1c920e033fd51a7135bc633687035d4990a07405974e24f3e4f5bc747dd8cb833517dba325fb8357ec60f4b737260519cbec967f1e58025da9b5821975edd2eb5ce0e"}, {0x120, 0xff, 0x0, "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"}, {0x20, 0x116, 0x100, "e12e82da376bca8fa03c5306"}, {0x10, 0x0, 0xa11}, {0x88, 0x109, 0x0, "48dcf8c1cb65b735b2d5007004b54696aa2a8d0eb98210cf2936121163b1c0584580900f864f0ebc03ba1675bbb924fa22af1c7933e3ea0fe010ebefceaa2fd20e15b805012fd2d7a3e171a57996dc09dc5df4ce65f0c01e583247522e22d559c831115bca323aa68746a2dd9dc875023459b72ec5"}, {0x40, 0x88, 0x39, "e91254173524b71a6cf4982e471433e79bae7c4a781a2a354e5dcee630a99252345f0fe48a629be09093e130c018"}], 0x270}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000002c0)='block_bio_queue\x00'}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r1, 0x12, 0x1, 0x0, 0x0}, 0x20) r6 = openat$cgroup_ro(r0, &(0x7f0000000300)='cpuset.effective_mems\x00', 0x0, 0x0) openat$cgroup_freezer_state(r6, &(0x7f0000000380)='freezer.state\x00', 0x2, 0x0) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) socket$kcm(0x2b, 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a80)={0xffffffffffffffff, 0x0, 0x67, 0x62, &(0x7f0000000840)="f99a133c46d257d5200f326d0a5562cd17685e886bf2f9b3f9a2790348e08bc05a864a96cf5d232acf4d9c795667017ab2c3fa3c298204bcf30edef2ac8db7cbfdf4deae19c3fb8efa11f5d49f040b0731924ad772daa2861563518e94c736d15a5ac7a9872008", &(0x7f00000008c0)=""/98, 0x51a, 0x0, 0x1b, 0x0, &(0x7f0000000940)="5a4fa68ec2c72f99361b9b501348d1d5bce04f26173ed66a605e0c", &(0x7f0000000980)}, 0x48) [ 559.723155][ T3822] usb 6-1: language id specifier not provided by device, defaulting to English [ 559.853885][ T3822] usb 6-1: New USB device found, idVendor=0525, idProduct=a4a8, bcdDevice= 0.40 [ 559.863467][ T3822] usb 6-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 559.871858][ T3822] usb 6-1: Product: syz [ 559.878156][ T3822] usb 6-1: Manufacturer: 練즷庘࿳涎蜉㩤髎쀩薗斟눻걩桬礣뉅鸥栅廐籺⃌ﱁ墿ⷍ䖐顇䜹幍欥⛽㠄慎냒⤖먤ꥎ賗⨑侟᎓澷ؒ嵮㦤眣䡰㚼퀧衴㨪⬸肊 [ 559.897998][ T3822] usb 6-1: SerialNumber: syz [ 560.149033][ T19] usb 6-1: USB disconnect, device number 96 [ 560.922966][ T19] usb 6-1: new high-speed USB device number 97 using dummy_hcd [ 561.183327][ T19] usb 6-1: Using ep0 maxpacket: 32 [ 561.355841][ T19] usb 6-1: config 1 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 0 04:37:57 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCSLCKTRMIOS(r0, 0x5434, 0x0) 04:37:57 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) setresuid(0x0, 0xee01, 0xffffffffffffffff) ioctl$TIOCSLCKTRMIOS(r0, 0x4b4b, 0x0) 04:37:57 executing program 1: syz_usb_connect$cdc_ncm(0x0, 0x6e, &(0x7f0000000000)={{0x12, 0x1, 0x200, 0x2, 0x0, 0x0, 0x40, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5c, 0x2, 0x1, 0x0, 0x0, 0x1, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5, 0x24, 0x0, 0x7}, {0xd}, {0x6, 0x24, 0x1a, 0x0, 0x10}}, {{0x9, 0x5, 0x81, 0x3, 0x10, 0x8}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x0, 0x0, 0x9}}, {{0x9, 0x5, 0x3, 0x2, 0x8, 0x0, 0x8, 0x40}}}}}}}]}}, 0x0) 04:37:57 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_SHORT_ADDR(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={0x0}}, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_SHORT_ADDR(r1, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={0x0}}, 0x0) 04:37:57 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_LIST(r0, &(0x7f0000000880)={0x0, 0x0, 0x0}, 0x0) 04:37:57 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) r3 = socket$kcm(0x29, 0x7, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xa, 0x2, 0x400, 0xc}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000140), &(0x7f00000000c0), 0x1081, r4}, 0x38) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000000480), 0x8) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000006c0)=@bpf_ext={0x1c, 0x6, &(0x7f0000000100)=@raw=[@initr0, @map={0x18, 0x3, 0x1, 0x0, r4}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}], 0x0, 0x1, 0xf8, &(0x7f0000000580)=""/248, 0x0, 0x18, [], 0x0, 0x0, r5, 0x8, &(0x7f0000000500)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000680)={0x0, 0x3, 0x32c96647, 0x9}, 0x10, 0x28c14, r2}, 0x78) sendmsg$kcm(r3, &(0x7f00000004c0)={&(0x7f00000003c0)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, 0x0, 0x0, &(0x7f0000000bc0)=[{0x58, 0x0, 0x3f, "3d036b2fe1c920e033fd51a7135bc633687035d4990a07405974e24f3e4f5bc747dd8cb833517dba325fb8357ec60f4b737260519cbec967f1e58025da9b5821975edd2eb5ce0e"}, {0x120, 0xff, 0x0, "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"}, {0x20, 0x116, 0x100, "e12e82da376bca8fa03c5306"}, {0x10, 0x0, 0xa11}, {0x88, 0x109, 0x0, "48dcf8c1cb65b735b2d5007004b54696aa2a8d0eb98210cf2936121163b1c0584580900f864f0ebc03ba1675bbb924fa22af1c7933e3ea0fe010ebefceaa2fd20e15b805012fd2d7a3e171a57996dc09dc5df4ce65f0c01e583247522e22d559c831115bca323aa68746a2dd9dc875023459b72ec5"}, {0x40, 0x88, 0x39, "e91254173524b71a6cf4982e471433e79bae7c4a781a2a354e5dcee630a99252345f0fe48a629be09093e130c018"}], 0x270}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000002c0)='block_bio_queue\x00'}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r1, 0x12, 0x1, 0x0, 0x0}, 0x20) r6 = openat$cgroup_ro(r0, &(0x7f0000000300)='cpuset.effective_mems\x00', 0x0, 0x0) openat$cgroup_freezer_state(r6, &(0x7f0000000380)='freezer.state\x00', 0x2, 0x0) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) socket$kcm(0x2b, 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a80)={0xffffffffffffffff, 0x0, 0x67, 0x62, &(0x7f0000000840)="f99a133c46d257d5200f326d0a5562cd17685e886bf2f9b3f9a2790348e08bc05a864a96cf5d232acf4d9c795667017ab2c3fa3c298204bcf30edef2ac8db7cbfdf4deae19c3fb8efa11f5d49f040b0731924ad772daa2861563518e94c736d15a5ac7a9872008", &(0x7f00000008c0)=""/98, 0x51a, 0x0, 0x1b, 0x0, &(0x7f0000000940)="5a4fa68ec2c72f99361b9b501348d1d5bce04f26173ed66a605e0c", &(0x7f0000000980)}, 0x48) [ 561.702789][ T19] usb 6-1: string descriptor 0 read error: -71 [ 561.720774][ T19] usb 6-1: New USB device found, idVendor=0525, idProduct=a4a8, bcdDevice= 0.40 [ 561.746969][ T19] usb 6-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 04:37:57 executing program 4: timer_create(0xfffffffe, 0x0, &(0x7f0000000040)) 04:37:57 executing program 3: r0 = socket(0x10, 0x3, 0x0) setsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x10e, 0x5, 0x0, 0x0) [ 561.803271][ T19] usb 6-1: can't set config #1, error -71 [ 561.830080][ T19] usb 6-1: USB disconnect, device number 97 04:37:57 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) 04:37:57 executing program 2: r0 = socket(0x11, 0x3, 0x0) setsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x107, 0x13, 0x0, 0x0) 04:37:57 executing program 4: r0 = socket(0x11, 0x3, 0x0) setsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x107, 0x8, 0x0, 0x10) 04:37:57 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) setresuid(0x0, 0xee01, 0xffffffffffffffff) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f0000000000)) 04:37:57 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCSLCKTRMIOS(r0, 0x402c542d, 0x0) 04:37:57 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_LIST(r0, &(0x7f0000000880)={0x0, 0x0, &(0x7f0000000840)={0x0}}, 0x2ed0e57775da60e0) 04:37:57 executing program 1: setresuid(0x0, 0xee01, 0xffffffffffffffff) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = getpid() getpid() sendmsg$netlink(r0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[@cred={{0x1c, 0x1, 0x2, {r1, 0xee01}}}], 0x20}, 0x0) 04:37:57 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) setresuid(0x0, 0xee01, 0xffffffffffffffff) ioctl$TIOCSLCKTRMIOS(r0, 0x4b34, 0x0) 04:37:57 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$netlink(r0, &(0x7f0000001d80)={0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000003c0)={0x10}, 0x10}, {&(0x7f0000000d80)={0x10, 0x0, 0x1}, 0x10}], 0x2}, 0x0) [ 562.464296][ T3269] ieee802154 phy0 wpan0: encryption failed: -22 [ 562.472164][ T3269] ieee802154 phy1 wpan1: encryption failed: -22 04:37:58 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) r3 = socket$kcm(0x29, 0x7, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xa, 0x2, 0x400, 0xc}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000140), &(0x7f00000000c0), 0x1081, r4}, 0x38) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000000480), 0x8) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000006c0)=@bpf_ext={0x1c, 0x6, &(0x7f0000000100)=@raw=[@initr0, @map={0x18, 0x3, 0x1, 0x0, r4}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}], 0x0, 0x1, 0xf8, &(0x7f0000000580)=""/248, 0x0, 0x18, [], 0x0, 0x0, r5, 0x8, &(0x7f0000000500)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000680)={0x0, 0x3, 0x32c96647, 0x9}, 0x10, 0x28c14, r2}, 0x78) sendmsg$kcm(r3, &(0x7f00000004c0)={&(0x7f00000003c0)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, 0x0, 0x0, &(0x7f0000000bc0)=[{0x58, 0x0, 0x3f, "3d036b2fe1c920e033fd51a7135bc633687035d4990a07405974e24f3e4f5bc747dd8cb833517dba325fb8357ec60f4b737260519cbec967f1e58025da9b5821975edd2eb5ce0e"}, {0x120, 0xff, 0x0, "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"}, {0x20, 0x116, 0x100, "e12e82da376bca8fa03c5306"}, {0x10, 0x0, 0xa11}, {0x88, 0x109, 0x0, "48dcf8c1cb65b735b2d5007004b54696aa2a8d0eb98210cf2936121163b1c0584580900f864f0ebc03ba1675bbb924fa22af1c7933e3ea0fe010ebefceaa2fd20e15b805012fd2d7a3e171a57996dc09dc5df4ce65f0c01e583247522e22d559c831115bca323aa68746a2dd9dc875023459b72ec5"}, {0x40, 0x88, 0x39, "e91254173524b71a6cf4982e471433e79bae7c4a781a2a354e5dcee630a99252345f0fe48a629be09093e130c018"}], 0x270}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000002c0)='block_bio_queue\x00'}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r1, 0x12, 0x1, 0x0, 0x0}, 0x20) r6 = openat$cgroup_ro(r0, &(0x7f0000000300)='cpuset.effective_mems\x00', 0x0, 0x0) openat$cgroup_freezer_state(r6, &(0x7f0000000380)='freezer.state\x00', 0x2, 0x0) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) socket$kcm(0x2b, 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a80)={0xffffffffffffffff, 0x0, 0x67, 0x62, &(0x7f0000000840)="f99a133c46d257d5200f326d0a5562cd17685e886bf2f9b3f9a2790348e08bc05a864a96cf5d232acf4d9c795667017ab2c3fa3c298204bcf30edef2ac8db7cbfdf4deae19c3fb8efa11f5d49f040b0731924ad772daa2861563518e94c736d15a5ac7a9872008", &(0x7f00000008c0)=""/98, 0x51a, 0x0, 0x1b, 0x0, &(0x7f0000000940)="5a4fa68ec2c72f99361b9b501348d1d5bce04f26173ed66a605e0c", &(0x7f0000000980)}, 0x48) 04:37:58 executing program 3: syz_usb_connect$cdc_ncm(0x0, 0x6e, &(0x7f0000000000)={{0x12, 0x1, 0x200, 0x2, 0x0, 0x0, 0x40, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5c, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}}, {{0x9, 0x5, 0x81, 0x3, 0x10, 0x8}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x10}}}}}}}]}}, &(0x7f0000000380)={0xa, &(0x7f00000000c0)={0xa, 0x6, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0x1, [{0x0, 0x0}]}) 04:37:58 executing program 2: mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) 04:37:58 executing program 5: select(0x58, &(0x7f0000000000), &(0x7f0000000040)={0x0, 0x3}, 0x0, 0x0) 04:37:58 executing program 4: socket$unix(0x1, 0x1, 0x0) select(0x40, &(0x7f0000000200)={0x9}, 0x0, &(0x7f00000002c0)={0x7f}, 0x0) 04:37:58 executing program 1: setresuid(0x0, 0xee01, 0xffffffffffffffff) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = getpid() getpid() sendmsg$netlink(r0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[@cred={{0x1c, 0x1, 0x2, {r1, 0xee01}}}], 0x20}, 0x0) 04:37:58 executing program 5: mmap(&(0x7f0000ff9000/0x3000)=nil, 0x3000, 0x0, 0x1812, 0xffffffffffffffff, 0x0) 04:37:58 executing program 4: r0 = socket$unix(0x1, 0x2, 0x0) setsockopt$sock_timeval(r0, 0xffff, 0x1005, &(0x7f0000000100)={0x0, 0x9}, 0x10) getsockopt$sock_timeval(r0, 0xffff, 0x1005, 0x0, 0x0) 04:37:58 executing program 5: r0 = socket$unix(0x1, 0x1, 0x0) select(0x40, &(0x7f0000000200), 0x0, &(0x7f00000002c0)={0x7f}, 0x0) r1 = dup2(r0, r0) shutdown(r1, 0x0) 04:37:58 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) setresuid(0x0, 0xee01, 0xffffffffffffffff) ioctl$TIOCSLCKTRMIOS(r0, 0x4b61, 0x0) 04:37:58 executing program 4: munmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000) madvise(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) mprotect(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0) 04:37:58 executing program 1: setresuid(0x0, 0xee01, 0xffffffffffffffff) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = getpid() getpid() sendmsg$netlink(r0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[@cred={{0x1c, 0x1, 0x2, {r1, 0xee01}}}], 0x20}, 0x0) 04:37:59 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) r3 = socket$kcm(0x29, 0x7, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xa, 0x2, 0x400, 0xc}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000140), &(0x7f00000000c0), 0x1081, r4}, 0x38) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000000480), 0x8) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000006c0)=@bpf_ext={0x1c, 0x6, &(0x7f0000000100)=@raw=[@initr0, @map={0x18, 0x3, 0x1, 0x0, r4}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}], 0x0, 0x1, 0xf8, &(0x7f0000000580)=""/248, 0x0, 0x18, [], 0x0, 0x0, r5, 0x8, &(0x7f0000000500)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000680)={0x0, 0x3, 0x32c96647, 0x9}, 0x10, 0x28c14, r2}, 0x78) sendmsg$kcm(r3, &(0x7f00000004c0)={&(0x7f00000003c0)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, 0x0, 0x0, &(0x7f0000000bc0)=[{0x58, 0x0, 0x3f, "3d036b2fe1c920e033fd51a7135bc633687035d4990a07405974e24f3e4f5bc747dd8cb833517dba325fb8357ec60f4b737260519cbec967f1e58025da9b5821975edd2eb5ce0e"}, {0x120, 0xff, 0x0, "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"}, {0x20, 0x116, 0x100, "e12e82da376bca8fa03c53062e62"}, {0x10, 0x0, 0xa11}, {0x88, 0x109, 0x0, "48dcf8c1cb65b735b2d5007004b54696aa2a8d0eb98210cf2936121163b1c0584580900f864f0ebc03ba1675bbb924fa22af1c7933e3ea0fe010ebefceaa2fd20e15b805012fd2d7a3e171a57996dc09dc5df4ce65f0c01e583247522e22d559c831115bca323aa68746a2dd9dc875023459b72ec5"}, {0x40, 0x88, 0x39, "e91254173524b71a6cf4982e471433e79bae7c4a781a2a354e5dcee630a99252345f0fe48a629be09093e130c018"}], 0x270}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000002c0)='block_bio_queue\x00'}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r1, 0x12, 0x1, 0x0, 0x0}, 0x20) r6 = openat$cgroup_ro(r0, &(0x7f0000000300)='cpuset.effective_mems\x00', 0x0, 0x0) openat$cgroup_freezer_state(r6, &(0x7f0000000380)='freezer.state\x00', 0x2, 0x0) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) socket$kcm(0x2b, 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a80)={0xffffffffffffffff, 0x0, 0x67, 0x62, &(0x7f0000000840)="f99a133c46d257d5200f326d0a5562cd17685e886bf2f9b3f9a2790348e08bc05a864a96cf5d232acf4d9c795667017ab2c3fa3c298204bcf30edef2ac8db7cbfdf4deae19c3fb8efa11f5d49f040b0731924ad772daa2861563518e94c736d15a5ac7a9872008", &(0x7f00000008c0)=""/98, 0x51a, 0x0, 0x1b, 0x0, &(0x7f0000000940)="5a4fa68ec2c72f99361b9b501348d1d5bce04f26173ed66a605e0c", &(0x7f0000000980)}, 0x48) 04:37:59 executing program 5: clock_settime(0xffffffffffffffff, &(0x7f0000000000)) clock_gettime(0x2, &(0x7f00000000c0)) 04:37:59 executing program 4: select(0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0) clock_getres(0x4, &(0x7f0000000080)) 04:37:59 executing program 1: setresuid(0x0, 0xee01, 0xffffffffffffffff) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = getpid() getpid() sendmsg$netlink(r0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[@cred={{0x1c, 0x1, 0x2, {r1, 0xee01}}}], 0x20}, 0x0) 04:37:59 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) setresuid(0x0, 0xee01, 0xffffffffffffffff) ioctl$TIOCSLCKTRMIOS(r0, 0x4b61, 0x0) 04:37:59 executing program 3: select(0x40, &(0x7f0000000000), &(0x7f0000000040)={0x7}, &(0x7f0000000080)={0xd6}, 0x0) 04:37:59 executing program 5: select(0xfffffffffffffe46, &(0x7f0000000080), &(0x7f0000000000), 0x0, 0x0) 04:37:59 executing program 3: openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) mprotect(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x0) 04:37:59 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) select(0x40, &(0x7f0000000200)={0x9}, 0x0, &(0x7f00000002c0)={0x7f}, 0x0) 04:37:59 executing program 3: openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) mprotect(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x0) 04:37:59 executing program 1: socket$unix(0x1, 0x1, 0x0) select(0x40, &(0x7f0000000080), &(0x7f00000000c0)={0x684b306d}, 0x0, 0x0) 04:37:59 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) setresuid(0x0, 0xee01, 0xffffffffffffffff) ioctl$TIOCSLCKTRMIOS(r0, 0x4b61, 0x0) 04:37:59 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) r3 = socket$kcm(0x29, 0x7, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xa, 0x2, 0x400, 0xc}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000140), &(0x7f00000000c0), 0x1081, r4}, 0x38) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000000480), 0x8) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000006c0)=@bpf_ext={0x1c, 0x6, &(0x7f0000000100)=@raw=[@initr0, @map={0x18, 0x3, 0x1, 0x0, r4}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}], 0x0, 0x1, 0xf8, &(0x7f0000000580)=""/248, 0x0, 0x18, [], 0x0, 0x0, r5, 0x8, &(0x7f0000000500)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000680)={0x0, 0x3, 0x32c96647, 0x9}, 0x10, 0x28c14, r2}, 0x78) sendmsg$kcm(r3, &(0x7f00000004c0)={&(0x7f00000003c0)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, 0x0, 0x0, &(0x7f0000000bc0)=[{0x58, 0x0, 0x3f, "3d036b2fe1c920e033fd51a7135bc633687035d4990a07405974e24f3e4f5bc747dd8cb833517dba325fb8357ec60f4b737260519cbec967f1e58025da9b5821975edd2eb5ce0e"}, {0x120, 0xff, 0x0, "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"}, {0x20, 0x116, 0x100, "e12e82da376bca8fa03c53062e62"}, {0x10, 0x0, 0xa11}, {0x88, 0x109, 0x0, "48dcf8c1cb65b735b2d5007004b54696aa2a8d0eb98210cf2936121163b1c0584580900f864f0ebc03ba1675bbb924fa22af1c7933e3ea0fe010ebefceaa2fd20e15b805012fd2d7a3e171a57996dc09dc5df4ce65f0c01e583247522e22d559c831115bca323aa68746a2dd9dc875023459b72ec5"}, {0x40, 0x88, 0x39, "e91254173524b71a6cf4982e471433e79bae7c4a781a2a354e5dcee630a99252345f0fe48a629be09093e130c018"}], 0x270}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000002c0)='block_bio_queue\x00'}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r1, 0x12, 0x1, 0x0, 0x0}, 0x20) r6 = openat$cgroup_ro(r0, &(0x7f0000000300)='cpuset.effective_mems\x00', 0x0, 0x0) openat$cgroup_freezer_state(r6, &(0x7f0000000380)='freezer.state\x00', 0x2, 0x0) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) socket$kcm(0x2b, 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a80)={0xffffffffffffffff, 0x0, 0x67, 0x62, &(0x7f0000000840)="f99a133c46d257d5200f326d0a5562cd17685e886bf2f9b3f9a2790348e08bc05a864a96cf5d232acf4d9c795667017ab2c3fa3c298204bcf30edef2ac8db7cbfdf4deae19c3fb8efa11f5d49f040b0731924ad772daa2861563518e94c736d15a5ac7a9872008", &(0x7f00000008c0)=""/98, 0x51a, 0x0, 0x1b, 0x0, &(0x7f0000000940)="5a4fa68ec2c72f99361b9b501348d1d5bce04f26173ed66a605e0c", &(0x7f0000000980)}, 0x48) 04:37:59 executing program 5: mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x7, 0x10, 0xffffffffffffffff, 0x0) 04:38:00 executing program 4: munmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000) madvise(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0) mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) mprotect(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1) 04:38:00 executing program 3: openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) mprotect(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x0) 04:38:00 executing program 1: munmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000) madvise(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0) mprotect(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) munmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000) 04:38:00 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) setresuid(0x0, 0xee01, 0xffffffffffffffff) ioctl$TIOCSLCKTRMIOS(r0, 0x4b61, 0x0) 04:38:00 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200, 0x0) select(0x40, &(0x7f0000000200)={0x9}, 0x0, &(0x7f00000002c0)={0x7f}, 0x0) 04:38:00 executing program 5: r0 = socket$inet(0x2, 0xc001, 0x0) getsockopt$sock_int(r0, 0xffff, 0x0, 0x0, 0x0) 04:38:00 executing program 3: openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) mprotect(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x0) 04:38:00 executing program 4: munmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000) munlock(&(0x7f0000ffa000/0x3000)=nil, 0x3000) 04:38:00 executing program 5: munmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000) madvise(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x6) 04:38:00 executing program 1: select(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) 04:38:00 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) r3 = socket$kcm(0x29, 0x7, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xa, 0x2, 0x400, 0xc}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000140), &(0x7f00000000c0), 0x1081, r4}, 0x38) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000000480), 0x8) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000006c0)=@bpf_ext={0x1c, 0x6, &(0x7f0000000100)=@raw=[@initr0, @map={0x18, 0x3, 0x1, 0x0, r4}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}], 0x0, 0x1, 0xf8, &(0x7f0000000580)=""/248, 0x0, 0x18, [], 0x0, 0x0, r5, 0x8, &(0x7f0000000500)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000680)={0x0, 0x3, 0x32c96647, 0x9}, 0x10, 0x28c14, r2}, 0x78) sendmsg$kcm(r3, &(0x7f00000004c0)={&(0x7f00000003c0)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, 0x0, 0x0, &(0x7f0000000bc0)=[{0x58, 0x0, 0x3f, "3d036b2fe1c920e033fd51a7135bc633687035d4990a07405974e24f3e4f5bc747dd8cb833517dba325fb8357ec60f4b737260519cbec967f1e58025da9b5821975edd2eb5ce0e"}, {0x120, 0xff, 0x0, "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"}, {0x20, 0x116, 0x100, "e12e82da376bca8fa03c53062e62"}, {0x10, 0x0, 0xa11}, {0x88, 0x109, 0x0, "48dcf8c1cb65b735b2d5007004b54696aa2a8d0eb98210cf2936121163b1c0584580900f864f0ebc03ba1675bbb924fa22af1c7933e3ea0fe010ebefceaa2fd20e15b805012fd2d7a3e171a57996dc09dc5df4ce65f0c01e583247522e22d559c831115bca323aa68746a2dd9dc875023459b72ec5"}, {0x40, 0x88, 0x39, "e91254173524b71a6cf4982e471433e79bae7c4a781a2a354e5dcee630a99252345f0fe48a629be09093e130c018"}], 0x270}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000002c0)='block_bio_queue\x00'}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r1, 0x12, 0x1, 0x0, 0x0}, 0x20) r6 = openat$cgroup_ro(r0, &(0x7f0000000300)='cpuset.effective_mems\x00', 0x0, 0x0) openat$cgroup_freezer_state(r6, &(0x7f0000000380)='freezer.state\x00', 0x2, 0x0) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) socket$kcm(0x2b, 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a80)={0xffffffffffffffff, 0x0, 0x67, 0x62, &(0x7f0000000840)="f99a133c46d257d5200f326d0a5562cd17685e886bf2f9b3f9a2790348e08bc05a864a96cf5d232acf4d9c795667017ab2c3fa3c298204bcf30edef2ac8db7cbfdf4deae19c3fb8efa11f5d49f040b0731924ad772daa2861563518e94c736d15a5ac7a9872008", &(0x7f00000008c0)=""/98, 0x51a, 0x0, 0x1b, 0x0, &(0x7f0000000940)="5a4fa68ec2c72f99361b9b501348d1d5bce04f26173ed66a605e0c", &(0x7f0000000980)}, 0x48) 04:38:00 executing program 2: munmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000) madvise(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0) 04:38:00 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x11, r0, 0x0) 04:38:00 executing program 4: socket$unix(0x1, 0x2, 0x0) select(0x40, &(0x7f0000000000), &(0x7f0000000040)={0xfffffffffffffffe}, 0x0, 0x0) 04:38:00 executing program 5: mprotect(&(0x7f0000400000/0xc00000)=nil, 0xc00000, 0x0) 04:38:00 executing program 1: r0 = socket$inet(0x2, 0xc001, 0x0) getsockopt$sock_int(r0, 0xffff, 0x1, 0x0, 0x0) 04:38:00 executing program 5: munmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000) madvise(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0) mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0) 04:38:00 executing program 4: r0 = syz_open_pts(0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000000)="06", 0x1) syz_open_pts(0xffffffffffffffff, 0x0) 04:38:01 executing program 3: madvise(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x3) 04:38:01 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000080), 0x4) 04:38:01 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$WG_CMD_GET_DEVICE(r0, &(0x7f0000001200)={0x0, 0x0, &(0x7f00000011c0)={&(0x7f00000000c0)={0xee4, 0x0, 0x0, 0x0, 0x0, {}, [@WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_PEERS={0xec8, 0x8, 0x0, 0x1, [{0x75c, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_ALLOWEDIPS={0x200, 0x9, 0x0, 0x1, [{0x118, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @private0}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @local}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @private=0xa010101}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x3f}}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5, 0x3, 0x2}}]}, {0x34, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5, 0x3, 0x1}}]}, {0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @private2={0xfc, 0x2, [], 0x1}}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @local}, {0x5, 0x3, 0x1}}]}]}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg='\xdb\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff'}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x44}}}, @WGPEER_A_ALLOWEDIPS={0x4fc, 0x9, 0x0, 0x1, [{0x88, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5, 0x3, 0x2}}]}, {0xc4, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010102}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @private1}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @ipv4={[], [], @initdev={0xac, 0x1e, 0x1, 0x0}}}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5, 0x3, 0x3}}]}, {0xdc, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @dev={0xfe, 0x80, [], 0x18}}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @broadcast}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5}}]}, {0x124, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @private1}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x30}}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @local}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @rand_addr=' \x01\x00'}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010100}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5, 0x3, 0x2}}]}, {0xd0, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5, 0x3, 0x40}}, @ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x2f}}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @broadcast}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010102}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @local}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5}}]}, {0xdc, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @dev={0xfe, 0x80, [], 0x29}}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5, 0x3, 0x1}}]}]}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e24, @broadcast}}]}, {0x4c, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e21, 0xc5e2, @dev={0xfe, 0x80, [], 0x29}, 0x8}}, @WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e20, 0x2, @local, 0x753}}]}, {0x84, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e24, @multicast1}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "ec885d2c89d6be053976d613843dda3405936caed005fe725b32c76b2f0e27c8"}, @WGPEER_A_FLAGS={0x8, 0x3, 0x3}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x7f, 0x0, @private0, 0x4733b0f3}}, @WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6, 0x5, 0x9}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6, 0x5, 0x9}, @WGPEER_A_PROTOCOL_VERSION={0x8}]}, {0xc, 0x0, 0x0, 0x1, [@WGPEER_A_FLAGS={0x8, 0x3, 0x5}]}, {0x68c, 0x0, 0x0, 0x1, [@WGPEER_A_PUBLIC_KEY={0x24, 0x1, @a_g='\x97\\\x9d\x81\xc9\x83\xc8 \x9e\xe7\x81%K\x89\x9f\x8e\xd9%\xae\x9f\t#\xc20x0}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000040)=@raw=[@alu], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 04:38:01 executing program 4: fsopen(&(0x7f0000000300)='erofs\x00', 0x0) 04:38:01 executing program 5: bpf$BPF_RAW_TRACEPOINT_OPEN(0x21, &(0x7f0000000c40)={0x0}, 0x10) 04:38:01 executing program 1: bpf$LINK_GET_FD_BY_ID(0x9, &(0x7f0000000000)=0xffffffffffffffff, 0x4) 04:38:01 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000080), 0x4) 04:38:01 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00', 0xffffffffffffffff) sendmsg$IPVS_CMD_GET_DEST(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r1, 0x1, 0x0, 0x0, {0xd}}, 0x14}}, 0x0) 04:38:01 executing program 4: r0 = syz_open_dev$video4linux(&(0x7f0000000280)='/dev/v4l-subdev#\x00', 0x0, 0x0) ioctl$VIDIOC_G_CTRL(r0, 0xc0285628, &(0x7f0000000300)) 04:38:01 executing program 3: socket$can_raw(0x2c, 0x3, 0x1) 04:38:01 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000080), 0x4) 04:38:01 executing program 1: bpf$BPF_LINK_CREATE(0x1c, &(0x7f00000003c0), 0x10) 04:38:01 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000440)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) read(r0, &(0x7f0000000280)=""/218, 0xda) 04:38:02 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) r3 = socket$kcm(0x29, 0x7, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xa, 0x2, 0x400, 0xc}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000140), &(0x7f00000000c0), 0x1081, r4}, 0x38) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000000480), 0x8) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000006c0)=@bpf_ext={0x1c, 0x6, &(0x7f0000000100)=@raw=[@initr0, @map={0x18, 0x3, 0x1, 0x0, r4}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}], 0x0, 0x1, 0xf8, &(0x7f0000000580)=""/248, 0x0, 0x18, [], 0x0, 0x0, r5, 0x8, &(0x7f0000000500)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000680)={0x0, 0x3, 0x32c96647, 0x9}, 0x10, 0x28c14, r2}, 0x78) sendmsg$kcm(r3, &(0x7f00000004c0)={&(0x7f00000003c0)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, 0x0, 0x0, &(0x7f0000000bc0)=[{0x58, 0x0, 0x3f, "3d036b2fe1c920e033fd51a7135bc633687035d4990a07405974e24f3e4f5bc747dd8cb833517dba325fb8357ec60f4b737260519cbec967f1e58025da9b5821975edd2eb5ce0e"}, {0x20, 0x116, 0x100, "e12e82da376bca8fa03c53062e627e"}, {0x10, 0x0, 0xa11}, {0x88, 0x109, 0x0, "48dcf8c1cb65b735b2d5007004b54696aa2a8d0eb98210cf2936121163b1c0584580900f864f0ebc03ba1675bbb924fa22af1c7933e3ea0fe010ebefceaa2fd20e15b805012fd2d7a3e171a57996dc09dc5df4ce65f0c01e583247522e22d559c831115bca323aa68746a2dd9dc875023459b72ec5"}, {0x40, 0x88, 0x39, "e91254173524b71a6cf4982e471433e79bae7c4a781a2a354e5dcee630a99252345f0fe48a629be09093e130c018"}], 0x150}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000002c0)='block_bio_queue\x00'}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r1, 0x12, 0x1, 0x0, 0x0}, 0x20) r6 = openat$cgroup_ro(r0, &(0x7f0000000300)='cpuset.effective_mems\x00', 0x0, 0x0) openat$cgroup_freezer_state(r6, &(0x7f0000000380)='freezer.state\x00', 0x2, 0x0) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) socket$kcm(0x2b, 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a80)={0xffffffffffffffff, 0x0, 0x67, 0x62, &(0x7f0000000840)="f99a133c46d257d5200f326d0a5562cd17685e886bf2f9b3f9a2790348e08bc05a864a96cf5d232acf4d9c795667017ab2c3fa3c298204bcf30edef2ac8db7cbfdf4deae19c3fb8efa11f5d49f040b0731924ad772daa2861563518e94c736d15a5ac7a9872008", &(0x7f00000008c0)=""/98, 0x51a, 0x0, 0x1b, 0x0, &(0x7f0000000940)="5a4fa68ec2c72f99361b9b501348d1d5bce04f26173ed66a605e0c", &(0x7f0000000980)}, 0x48) 04:38:02 executing program 4: r0 = syz_open_dev$video4linux(&(0x7f0000000280)='/dev/v4l-subdev#\x00', 0x0, 0x0) ioctl$VIDIOC_G_CTRL(r0, 0xc0285628, &(0x7f0000000300)) 04:38:02 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f00000003c0)='IPVS\x00', 0xffffffffffffffff) sendmsg$IPVS_CMD_GET_SERVICE(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000400)={0x14, r1, 0x305}, 0x14}}, 0x0) 04:38:02 executing program 5: add_key$fscrypt_provisioning(&(0x7f00000000c0)='fscrypt-provisioning\x00', &(0x7f0000000140)={'syz', 0x0}, &(0x7f0000000180)={0x0, 0x0, @a='\x01\x02\x03\x04\x05\x06\a\b\t\n\v\f\r\x0e\x0f\x10\x11\x12\x13\x14\x15\x16\x17\x18\x19\x1a\x1b\x1c\x1d\x1e\x1f !\"#$%&\'()*+,-./0123456789:;<=>?@'}, 0x48, 0xfffffffffffffff8) 04:38:02 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000080), 0x4) 04:38:02 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f00000006c0)='NLBL_UNLBL\x00', r1) sendmsg$NLBL_UNLABEL_C_ACCEPT(r0, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000000700)={0x14, r2, 0x1}, 0x14}}, 0x0) 04:38:02 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_ABS_SETUP(r0, 0x406855c9, &(0x7f0000000040)) 04:38:02 executing program 4: r0 = syz_open_dev$video4linux(&(0x7f0000000280)='/dev/v4l-subdev#\x00', 0x0, 0x0) ioctl$VIDIOC_G_CTRL(r0, 0xc0285628, &(0x7f0000000300)) 04:38:02 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f00000003c0)='IPVS\x00', 0xffffffffffffffff) sendmsg$IPVS_CMD_GET_SERVICE(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000400)={0x14, r1, 0x305}, 0x14}}, 0x0) 04:38:02 executing program 2: syz_open_procfs$namespace(0x0, &(0x7f0000002100)='ns/pid_for_children\x00') 04:38:02 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8947, &(0x7f0000000000)={'batadv0\x00'}) 04:38:02 executing program 5: r0 = fsopen(&(0x7f0000000000)='bfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) 04:38:03 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) r3 = socket$kcm(0x29, 0x7, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xa, 0x2, 0x400, 0xc}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000140), &(0x7f00000000c0), 0x1081, r4}, 0x38) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000000480), 0x8) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000006c0)=@bpf_ext={0x1c, 0x6, &(0x7f0000000100)=@raw=[@initr0, @map={0x18, 0x3, 0x1, 0x0, r4}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}], 0x0, 0x1, 0xf8, &(0x7f0000000580)=""/248, 0x0, 0x18, [], 0x0, 0x0, r5, 0x8, &(0x7f0000000500)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000680)={0x0, 0x3, 0x32c96647, 0x9}, 0x10, 0x28c14, r2}, 0x78) sendmsg$kcm(r3, &(0x7f00000004c0)={&(0x7f00000003c0)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, 0x0, 0x0, &(0x7f0000000bc0)=[{0x58, 0x0, 0x3f, "3d036b2fe1c920e033fd51a7135bc633687035d4990a07405974e24f3e4f5bc747dd8cb833517dba325fb8357ec60f4b737260519cbec967f1e58025da9b5821975edd2eb5ce0e"}, {0x20, 0x116, 0x100, "e12e82da376bca8fa03c53062e627e"}, {0x10, 0x0, 0xa11}, {0x88, 0x109, 0x0, "48dcf8c1cb65b735b2d5007004b54696aa2a8d0eb98210cf2936121163b1c0584580900f864f0ebc03ba1675bbb924fa22af1c7933e3ea0fe010ebefceaa2fd20e15b805012fd2d7a3e171a57996dc09dc5df4ce65f0c01e583247522e22d559c831115bca323aa68746a2dd9dc875023459b72ec5"}, {0x40, 0x88, 0x39, "e91254173524b71a6cf4982e471433e79bae7c4a781a2a354e5dcee630a99252345f0fe48a629be09093e130c018"}], 0x150}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000002c0)='block_bio_queue\x00'}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r1, 0x12, 0x1, 0x0, 0x0}, 0x20) r6 = openat$cgroup_ro(r0, &(0x7f0000000300)='cpuset.effective_mems\x00', 0x0, 0x0) openat$cgroup_freezer_state(r6, &(0x7f0000000380)='freezer.state\x00', 0x2, 0x0) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) socket$kcm(0x2b, 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a80)={0xffffffffffffffff, 0x0, 0x67, 0x62, &(0x7f0000000840)="f99a133c46d257d5200f326d0a5562cd17685e886bf2f9b3f9a2790348e08bc05a864a96cf5d232acf4d9c795667017ab2c3fa3c298204bcf30edef2ac8db7cbfdf4deae19c3fb8efa11f5d49f040b0731924ad772daa2861563518e94c736d15a5ac7a9872008", &(0x7f00000008c0)=""/98, 0x51a, 0x0, 0x1b, 0x0, &(0x7f0000000940)="5a4fa68ec2c72f99361b9b501348d1d5bce04f26173ed66a605e0c", &(0x7f0000000980)}, 0x48) 04:38:03 executing program 4: r0 = syz_open_dev$video4linux(&(0x7f0000000280)='/dev/v4l-subdev#\x00', 0x0, 0x0) ioctl$VIDIOC_G_CTRL(r0, 0xc0285628, &(0x7f0000000300)) 04:38:03 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f00000003c0)='IPVS\x00', 0xffffffffffffffff) sendmsg$IPVS_CMD_GET_SERVICE(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000400)={0x14, r1, 0x305}, 0x14}}, 0x0) 04:38:03 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x12, 0x4000000, 0x0, 0x6}, 0x40) 04:38:03 executing program 2: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_RW(r0, 0x118, 0x0, &(0x7f0000000080), 0x4) 04:38:03 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) ioctl$PPPIOCATTACH(r0, 0x541b, 0x0) 04:38:03 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f00000003c0)='IPVS\x00', 0xffffffffffffffff) sendmsg$IPVS_CMD_GET_SERVICE(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000400)={0x14, r1, 0x305}, 0x14}}, 0x0) 04:38:03 executing program 5: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/snd/seq\x00', 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40bc5311, &(0x7f0000000200)) 04:38:03 executing program 4: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/snd/seq\x00', 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0xc0105303, &(0x7f0000000200)) 04:38:03 executing program 2: r0 = socket$kcm(0x29, 0x5, 0x0) recvmsg$kcm(r0, &(0x7f00000003c0)={&(0x7f0000000080)=@qipcrtr, 0x80, &(0x7f0000000300)=[{&(0x7f0000000340)=""/115, 0x6d}, {&(0x7f0000000180)=""/205, 0xcd}, {&(0x7f0000000400)=""/81, 0xfffffffffffffdcf}], 0x3, &(0x7f0000000100)=""/110, 0x6e}, 0x0) 04:38:03 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000044c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000004480)={0xffffffffffffffff}, 0x13f}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000004500)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r2, &(0x7f0000004580)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x0, @local}, r1}}, 0x38) 04:38:03 executing program 5: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/snd/seq\x00', 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40bc5311, &(0x7f0000000200)) 04:38:04 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) r3 = socket$kcm(0x29, 0x7, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xa, 0x2, 0x400, 0xc}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000140), &(0x7f00000000c0), 0x1081, r4}, 0x38) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000000480), 0x8) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000006c0)=@bpf_ext={0x1c, 0x6, &(0x7f0000000100)=@raw=[@initr0, @map={0x18, 0x3, 0x1, 0x0, r4}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}], 0x0, 0x1, 0xf8, &(0x7f0000000580)=""/248, 0x0, 0x18, [], 0x0, 0x0, r5, 0x8, &(0x7f0000000500)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000680)={0x0, 0x3, 0x32c96647, 0x9}, 0x10, 0x28c14, r2}, 0x78) sendmsg$kcm(r3, &(0x7f00000004c0)={&(0x7f00000003c0)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, 0x0, 0x0, &(0x7f0000000bc0)=[{0x58, 0x0, 0x3f, "3d036b2fe1c920e033fd51a7135bc633687035d4990a07405974e24f3e4f5bc747dd8cb833517dba325fb8357ec60f4b737260519cbec967f1e58025da9b5821975edd2eb5ce0e"}, {0x20, 0x0, 0x100, "e12e82da376bca8fa03c53062e627e"}, {0x10, 0x0, 0xa11}, {0x88, 0x109, 0x0, "48dcf8c1cb65b735b2d5007004b54696aa2a8d0eb98210cf2936121163b1c0584580900f864f0ebc03ba1675bbb924fa22af1c7933e3ea0fe010ebefceaa2fd20e15b805012fd2d7a3e171a57996dc09dc5df4ce65f0c01e583247522e22d559c831115bca323aa68746a2dd9dc875023459b72ec5"}, {0x40, 0x88, 0x39, "e91254173524b71a6cf4982e471433e79bae7c4a781a2a354e5dcee630a99252345f0fe48a629be09093e130c018"}], 0x150}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000002c0)='block_bio_queue\x00'}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r1, 0x12, 0x1, 0x0, 0x0}, 0x20) r6 = openat$cgroup_ro(r0, &(0x7f0000000300)='cpuset.effective_mems\x00', 0x0, 0x0) openat$cgroup_freezer_state(r6, &(0x7f0000000380)='freezer.state\x00', 0x2, 0x0) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) socket$kcm(0x2b, 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a80)={0xffffffffffffffff, 0x0, 0x67, 0x62, &(0x7f0000000840)="f99a133c46d257d5200f326d0a5562cd17685e886bf2f9b3f9a2790348e08bc05a864a96cf5d232acf4d9c795667017ab2c3fa3c298204bcf30edef2ac8db7cbfdf4deae19c3fb8efa11f5d49f040b0731924ad772daa2861563518e94c736d15a5ac7a9872008", &(0x7f00000008c0)=""/98, 0x51a, 0x0, 0x1b, 0x0, &(0x7f0000000940)="5a4fa68ec2c72f99361b9b501348d1d5bce04f26173ed66a605e0c", &(0x7f0000000980)}, 0x48) 04:38:04 executing program 3: r0 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(r0, 0xc4c85513, &(0x7f0000000300)={{0x2, 0x0, 0x0, 0x0, 'syz0\x00'}}) 04:38:04 executing program 4: socketpair(0x22, 0x0, 0x0, &(0x7f0000000600)) 04:38:04 executing program 5: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/snd/seq\x00', 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40bc5311, &(0x7f0000000200)) 04:38:04 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) 04:38:04 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000002900)={'ip6gre0\x00', &(0x7f0000002880)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @empty}}) 04:38:04 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_PKTINFO(r0, 0x11, 0x32, 0x0, 0x0) 04:38:04 executing program 4: mknodat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='user.incfs.id\x00', &(0x7f0000000100), 0x20, 0x0) 04:38:04 executing program 5: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/snd/seq\x00', 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40bc5311, &(0x7f0000000200)) 04:38:04 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000300), 0x8) 04:38:04 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f00000001c0)='nl802154\x00', 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_MAX_FRAME_RETRIES(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, r1, 0x1, 0x0, 0x0, {0xa}, [@NL802154_ATTR_IFINDEX={0x8}]}, 0x1c}}, 0x0) 04:38:04 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000040)={@empty=[0xff], @dev, @void, {@ipv6={0x86dd, @udp={0x0, 0x6, '5b\v', 0x8, 0x11, 0x0, @local, @empty={[0xff]}, {[], {0x0, 0x0, 0x8}}}}}}, 0x0) 04:38:05 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) r3 = socket$kcm(0x29, 0x7, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xa, 0x2, 0x400, 0xc}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000140), &(0x7f00000000c0), 0x1081, r4}, 0x38) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000000480), 0x8) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000006c0)=@bpf_ext={0x1c, 0x6, &(0x7f0000000100)=@raw=[@initr0, @map={0x18, 0x3, 0x1, 0x0, r4}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}], 0x0, 0x1, 0xf8, &(0x7f0000000580)=""/248, 0x0, 0x18, [], 0x0, 0x0, r5, 0x8, &(0x7f0000000500)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000680)={0x0, 0x3, 0x32c96647, 0x9}, 0x10, 0x28c14, r2}, 0x78) sendmsg$kcm(r3, &(0x7f00000004c0)={&(0x7f00000003c0)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, 0x0, 0x0, &(0x7f0000000bc0)=[{0x58, 0x0, 0x3f, "3d036b2fe1c920e033fd51a7135bc633687035d4990a07405974e24f3e4f5bc747dd8cb833517dba325fb8357ec60f4b737260519cbec967f1e58025da9b5821975edd2eb5ce0e"}, {0x20, 0x0, 0x100, "e12e82da376bca8fa03c53062e627e"}, {0x10, 0x0, 0xa11}, {0x88, 0x109, 0x0, "48dcf8c1cb65b735b2d5007004b54696aa2a8d0eb98210cf2936121163b1c0584580900f864f0ebc03ba1675bbb924fa22af1c7933e3ea0fe010ebefceaa2fd20e15b805012fd2d7a3e171a57996dc09dc5df4ce65f0c01e583247522e22d559c831115bca323aa68746a2dd9dc875023459b72ec5"}, {0x40, 0x88, 0x39, "e91254173524b71a6cf4982e471433e79bae7c4a781a2a354e5dcee630a99252345f0fe48a629be09093e130c018"}], 0x150}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000002c0)='block_bio_queue\x00'}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r1, 0x12, 0x1, 0x0, 0x0}, 0x20) r6 = openat$cgroup_ro(r0, &(0x7f0000000300)='cpuset.effective_mems\x00', 0x0, 0x0) openat$cgroup_freezer_state(r6, &(0x7f0000000380)='freezer.state\x00', 0x2, 0x0) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) socket$kcm(0x2b, 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a80)={0xffffffffffffffff, 0x0, 0x67, 0x62, &(0x7f0000000840)="f99a133c46d257d5200f326d0a5562cd17685e886bf2f9b3f9a2790348e08bc05a864a96cf5d232acf4d9c795667017ab2c3fa3c298204bcf30edef2ac8db7cbfdf4deae19c3fb8efa11f5d49f040b0731924ad772daa2861563518e94c736d15a5ac7a9872008", &(0x7f00000008c0)=""/98, 0x51a, 0x0, 0x1b, 0x0, &(0x7f0000000940)="5a4fa68ec2c72f99361b9b501348d1d5bce04f26173ed66a605e0c", &(0x7f0000000980)}, 0x48) 04:38:05 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000080)='fou\x00', 0xffffffffffffffff) sendmsg$FOU_CMD_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000340)={0x20, r1, 0x503, 0x0, 0x0, {}, [@FOU_ATTR_PORT={0x6}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}]}, 0x20}}, 0x0) 04:38:05 executing program 5: syz_open_procfs(0x0, &(0x7f0000000000)='numa_maps\x00') 04:38:05 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f00000001c0)='nl802154\x00', 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_MAX_FRAME_RETRIES(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, r1, 0x1, 0x0, 0x0, {0xa}, [@NL802154_ATTR_IFINDEX={0x8}]}, 0x1c}}, 0x0) 04:38:05 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00', 0xffffffffffffffff) sendmsg$IPVS_CMD_GET_SERVICE(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000380)={0x28, r1, 0x1, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x6, 0x1, 0x2}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}}, 0x0) 04:38:05 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000040)={@empty=[0xff], @dev, @void, {@ipv6={0x86dd, @udp={0x0, 0x6, '5b\v', 0x8, 0x11, 0x0, @local, @empty={[0xff]}, {[], {0x0, 0x0, 0x8}}}}}}, 0x0) 04:38:05 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f00000001c0)='nl802154\x00', 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_MAX_FRAME_RETRIES(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, r1, 0x1, 0x0, 0x0, {0xa}, [@NL802154_ATTR_IFINDEX={0x8}]}, 0x1c}}, 0x0) 04:38:05 executing program 4: r0 = socket(0x18, 0x0, 0x0) ioctl$sock_SIOCDELRT(r0, 0x890c, 0x0) 04:38:05 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000080)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={[{@nr_inodes={'nr_inodes', 0x3d, [0x70]}}]}) 04:38:05 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000040)={@empty=[0xff], @dev, @void, {@ipv6={0x86dd, @udp={0x0, 0x6, '5b\v', 0x8, 0x11, 0x0, @local, @empty={[0xff]}, {[], {0x0, 0x0, 0x8}}}}}}, 0x0) 04:38:05 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f00000001c0)='nl802154\x00', 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_MAX_FRAME_RETRIES(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, r1, 0x1, 0x0, 0x0, {0xa}, [@NL802154_ATTR_IFINDEX={0x8}]}, 0x1c}}, 0x0) 04:38:05 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1b}, 0x40) 04:38:05 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) r3 = socket$kcm(0x29, 0x7, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xa, 0x2, 0x400, 0xc}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000140), &(0x7f00000000c0), 0x1081, r4}, 0x38) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000000480), 0x8) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000006c0)=@bpf_ext={0x1c, 0x6, &(0x7f0000000100)=@raw=[@initr0, @map={0x18, 0x3, 0x1, 0x0, r4}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}], 0x0, 0x1, 0xf8, &(0x7f0000000580)=""/248, 0x0, 0x18, [], 0x0, 0x0, r5, 0x8, &(0x7f0000000500)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000680)={0x0, 0x3, 0x32c96647, 0x9}, 0x10, 0x28c14, r2}, 0x78) sendmsg$kcm(r3, &(0x7f00000004c0)={&(0x7f00000003c0)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, 0x0, 0x0, &(0x7f0000000bc0)=[{0x58, 0x0, 0x3f, "3d036b2fe1c920e033fd51a7135bc633687035d4990a07405974e24f3e4f5bc747dd8cb833517dba325fb8357ec60f4b737260519cbec967f1e58025da9b5821975edd2eb5ce0e"}, {0x20, 0x0, 0x100, "e12e82da376bca8fa03c53062e627e"}, {0x10, 0x0, 0xa11}, {0x88, 0x109, 0x0, "48dcf8c1cb65b735b2d5007004b54696aa2a8d0eb98210cf2936121163b1c0584580900f864f0ebc03ba1675bbb924fa22af1c7933e3ea0fe010ebefceaa2fd20e15b805012fd2d7a3e171a57996dc09dc5df4ce65f0c01e583247522e22d559c831115bca323aa68746a2dd9dc875023459b72ec5"}, {0x40, 0x88, 0x39, "e91254173524b71a6cf4982e471433e79bae7c4a781a2a354e5dcee630a99252345f0fe48a629be09093e130c018"}], 0x150}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000002c0)='block_bio_queue\x00'}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r1, 0x12, 0x1, 0x0, 0x0}, 0x20) r6 = openat$cgroup_ro(r0, &(0x7f0000000300)='cpuset.effective_mems\x00', 0x0, 0x0) openat$cgroup_freezer_state(r6, &(0x7f0000000380)='freezer.state\x00', 0x2, 0x0) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) socket$kcm(0x2b, 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a80)={0xffffffffffffffff, 0x0, 0x67, 0x62, &(0x7f0000000840)="f99a133c46d257d5200f326d0a5562cd17685e886bf2f9b3f9a2790348e08bc05a864a96cf5d232acf4d9c795667017ab2c3fa3c298204bcf30edef2ac8db7cbfdf4deae19c3fb8efa11f5d49f040b0731924ad772daa2861563518e94c736d15a5ac7a9872008", &(0x7f00000008c0)=""/98, 0x51a, 0x0, 0x1b, 0x0, &(0x7f0000000940)="5a4fa68ec2c72f99361b9b501348d1d5bce04f26173ed66a605e0c", &(0x7f0000000980)}, 0x48) 04:38:05 executing program 4: socket$caif_stream(0x25, 0x1, 0x0) 04:38:05 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000080)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={[{@nr_inodes={'nr_inodes', 0x3d, [0x70]}}]}) 04:38:05 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000600)={'team0\x00'}) 04:38:05 executing program 1: syz_mount_image$tmpfs(&(0x7f0000002140)='tmpfs\x00', &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000004ac0)={[{@size={'size', 0x3d, [0x25]}}]}) 04:38:05 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000040)={@empty=[0xff], @dev, @void, {@ipv6={0x86dd, @udp={0x0, 0x6, '5b\v', 0x8, 0x11, 0x0, @local, @empty={[0xff]}, {[], {0x0, 0x0, 0x8}}}}}}, 0x0) 04:38:06 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000080)='fou\x00', 0xffffffffffffffff) sendmsg$FOU_CMD_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000340)={0x1c, r1, 0x503, 0x0, 0x0, {}, [@FOU_ATTR_PORT={0x6, 0x1, 0x3}]}, 0x1c}}, 0x0) 04:38:06 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, 0x0, &(0x7f0000002200)) 04:38:06 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000080)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={[{@nr_inodes={'nr_inodes', 0x3d, [0x70]}}]}) 04:38:06 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x42, 0x0, 0x0) 04:38:06 executing program 1: socketpair(0x0, 0x0, 0x0, &(0x7f00000002c0)) 04:38:06 executing program 3: socket$caif_seqpacket(0x25, 0x5, 0x2) 04:38:06 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) r3 = socket$kcm(0x29, 0x7, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xa, 0x2, 0x400, 0xc}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000140), &(0x7f00000000c0), 0x1081, r4}, 0x38) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000000480), 0x8) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000006c0)=@bpf_ext={0x1c, 0x6, &(0x7f0000000100)=@raw=[@initr0, @map={0x18, 0x3, 0x1, 0x0, r4}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}], 0x0, 0x1, 0xf8, &(0x7f0000000580)=""/248, 0x0, 0x18, [], 0x0, 0x0, r5, 0x8, &(0x7f0000000500)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000680)={0x0, 0x3, 0x32c96647, 0x9}, 0x10, 0x28c14, r2}, 0x78) sendmsg$kcm(r3, &(0x7f00000004c0)={&(0x7f00000003c0)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, 0x0, 0x0, &(0x7f0000000bc0)=[{0x58, 0x0, 0x3f, "3d036b2fe1c920e033fd51a7135bc633687035d4990a07405974e24f3e4f5bc747dd8cb833517dba325fb8357ec60f4b737260519cbec967f1e58025da9b5821975edd2eb5ce0e"}, {0x20, 0x116, 0x0, "e12e82da376bca8fa03c53062e627e"}, {0x10, 0x0, 0xa11}, {0x88, 0x109, 0x0, "48dcf8c1cb65b735b2d5007004b54696aa2a8d0eb98210cf2936121163b1c0584580900f864f0ebc03ba1675bbb924fa22af1c7933e3ea0fe010ebefceaa2fd20e15b805012fd2d7a3e171a57996dc09dc5df4ce65f0c01e583247522e22d559c831115bca323aa68746a2dd9dc875023459b72ec5"}, {0x40, 0x88, 0x39, "e91254173524b71a6cf4982e471433e79bae7c4a781a2a354e5dcee630a99252345f0fe48a629be09093e130c018"}], 0x150}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000002c0)='block_bio_queue\x00'}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r1, 0x12, 0x1, 0x0, 0x0}, 0x20) r6 = openat$cgroup_ro(r0, &(0x7f0000000300)='cpuset.effective_mems\x00', 0x0, 0x0) openat$cgroup_freezer_state(r6, &(0x7f0000000380)='freezer.state\x00', 0x2, 0x0) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) socket$kcm(0x2b, 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a80)={0xffffffffffffffff, 0x0, 0x67, 0x62, &(0x7f0000000840)="f99a133c46d257d5200f326d0a5562cd17685e886bf2f9b3f9a2790348e08bc05a864a96cf5d232acf4d9c795667017ab2c3fa3c298204bcf30edef2ac8db7cbfdf4deae19c3fb8efa11f5d49f040b0731924ad772daa2861563518e94c736d15a5ac7a9872008", &(0x7f00000008c0)=""/98, 0x51a, 0x0, 0x1b, 0x0, &(0x7f0000000940)="5a4fa68ec2c72f99361b9b501348d1d5bce04f26173ed66a605e0c", &(0x7f0000000980)}, 0x48) 04:38:06 executing program 4: socket(0x18, 0x0, 0x4f1) 04:38:06 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000080)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={[{@nr_inodes={'nr_inodes', 0x3d, [0x70]}}]}) 04:38:06 executing program 3: bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f0000000000)={0x7fffffff}, 0x8) 04:38:06 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8924, &(0x7f0000000000)={'batadv0\x00'}) 04:38:06 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x17, 0x0, 0x0) 04:38:06 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00', 0xffffffffffffffff) sendmsg$IPVS_CMD_SET_INFO(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, r1, 0x1}, 0x14}}, 0x0) 04:38:06 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8918, &(0x7f0000000000)={'batadv0\x00'}) 04:38:07 executing program 3: syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[]) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x8e0, &(0x7f00000004c0)={[], [{@audit='audit'}]}) 04:38:07 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='oom_score\x00') read$FUSE(r0, &(0x7f0000000380)={0x2020}, 0x2020) 04:38:07 executing program 1: r0 = syz_open_dev$ndb(&(0x7f00000001c0)='/dev/nbd#\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(r0, 0x127d, 0x0) 04:38:07 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000002080)='timerslack_ns\x00') read$FUSE(r0, &(0x7f0000000000)={0x2020}, 0x2020) [ 571.518642][T23407] tmpfs: Unknown parameter 'audit' 04:38:07 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) r3 = socket$kcm(0x29, 0x7, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xa, 0x2, 0x400, 0xc}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000140), &(0x7f00000000c0), 0x1081, r4}, 0x38) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000000480), 0x8) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000006c0)=@bpf_ext={0x1c, 0x6, &(0x7f0000000100)=@raw=[@initr0, @map={0x18, 0x3, 0x1, 0x0, r4}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}], 0x0, 0x1, 0xf8, &(0x7f0000000580)=""/248, 0x0, 0x18, [], 0x0, 0x0, r5, 0x8, &(0x7f0000000500)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000680)={0x0, 0x3, 0x32c96647, 0x9}, 0x10, 0x28c14, r2}, 0x78) sendmsg$kcm(r3, &(0x7f00000004c0)={&(0x7f00000003c0)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, 0x0, 0x0, &(0x7f0000000bc0)=[{0x58, 0x0, 0x3f, "3d036b2fe1c920e033fd51a7135bc633687035d4990a07405974e24f3e4f5bc747dd8cb833517dba325fb8357ec60f4b737260519cbec967f1e58025da9b5821975edd2eb5ce0e"}, {0x20, 0x116, 0x0, "e12e82da376bca8fa03c53062e627e"}, {0x10, 0x0, 0xa11}, {0x88, 0x109, 0x0, "48dcf8c1cb65b735b2d5007004b54696aa2a8d0eb98210cf2936121163b1c0584580900f864f0ebc03ba1675bbb924fa22af1c7933e3ea0fe010ebefceaa2fd20e15b805012fd2d7a3e171a57996dc09dc5df4ce65f0c01e583247522e22d559c831115bca323aa68746a2dd9dc875023459b72ec5"}, {0x40, 0x88, 0x39, "e91254173524b71a6cf4982e471433e79bae7c4a781a2a354e5dcee630a99252345f0fe48a629be09093e130c018"}], 0x150}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000002c0)='block_bio_queue\x00'}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r1, 0x12, 0x1, 0x0, 0x0}, 0x20) r6 = openat$cgroup_ro(r0, &(0x7f0000000300)='cpuset.effective_mems\x00', 0x0, 0x0) openat$cgroup_freezer_state(r6, &(0x7f0000000380)='freezer.state\x00', 0x2, 0x0) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) socket$kcm(0x2b, 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a80)={0xffffffffffffffff, 0x0, 0x67, 0x62, &(0x7f0000000840)="f99a133c46d257d5200f326d0a5562cd17685e886bf2f9b3f9a2790348e08bc05a864a96cf5d232acf4d9c795667017ab2c3fa3c298204bcf30edef2ac8db7cbfdf4deae19c3fb8efa11f5d49f040b0731924ad772daa2861563518e94c736d15a5ac7a9872008", &(0x7f00000008c0)=""/98, 0x51a, 0x0, 0x1b, 0x0, &(0x7f0000000940)="5a4fa68ec2c72f99361b9b501348d1d5bce04f26173ed66a605e0c", &(0x7f0000000980)}, 0x48) 04:38:07 executing program 2: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000001500)='/dev/urandom\x00', 0x0, 0x0) ioctl$RNDADDENTROPY(r0, 0x40085203, &(0x7f0000001540)={0x0, 0x41, "650e4eec3aebb1da48629957db04bed239f1ecd3fa831a9fbae32e253e4640b16b6a27fd8ee07927e032c2cc4c4ca3f6fce0d697dc168eaddab4486726f4fe9f61"}) 04:38:07 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 04:38:07 executing program 3: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000200)='/dev/snd/timer\x00', 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r0, 0xc0505405, &(0x7f0000000240)={{0x3, 0x0, 0x0, 0x0, 0x10000}}) 04:38:07 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='oom_score\x00') read$FUSE(r0, &(0x7f0000000380)={0x2020}, 0x2020) 04:38:07 executing program 1: r0 = syz_open_dev$ndb(&(0x7f00000001c0)='/dev/nbd#\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(r0, 0x301, 0x0) 04:38:07 executing program 5: select(0x40, &(0x7f0000000100), 0x0, &(0x7f0000000180)={0x2}, 0x0) 04:38:07 executing program 3: msgsnd(0x0, &(0x7f0000000180)={0x3, "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"}, 0xfd1, 0x0) 04:38:07 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='oom_score\x00') read$FUSE(r0, &(0x7f0000000380)={0x2020}, 0x2020) 04:38:07 executing program 1: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@creator={'creator', 0x3d, "7645f448"}}]}) 04:38:07 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x29, 0x14, 0x0, 0x300) 04:38:07 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='oom_score\x00') read$FUSE(r0, &(0x7f0000000380)={0x2020}, 0x2020) 04:38:08 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) r3 = socket$kcm(0x29, 0x7, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xa, 0x2, 0x400, 0xc}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000140), &(0x7f00000000c0), 0x1081, r4}, 0x38) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000000480), 0x8) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000006c0)=@bpf_ext={0x1c, 0x6, &(0x7f0000000100)=@raw=[@initr0, @map={0x18, 0x3, 0x1, 0x0, r4}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}], 0x0, 0x1, 0xf8, &(0x7f0000000580)=""/248, 0x0, 0x18, [], 0x0, 0x0, r5, 0x8, &(0x7f0000000500)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000680)={0x0, 0x3, 0x32c96647, 0x9}, 0x10, 0x28c14, r2}, 0x78) sendmsg$kcm(r3, &(0x7f00000004c0)={&(0x7f00000003c0)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, 0x0, 0x0, &(0x7f0000000bc0)=[{0x58, 0x0, 0x3f, "3d036b2fe1c920e033fd51a7135bc633687035d4990a07405974e24f3e4f5bc747dd8cb833517dba325fb8357ec60f4b737260519cbec967f1e58025da9b5821975edd2eb5ce0e"}, {0x20, 0x116, 0x0, "e12e82da376bca8fa03c53062e627e"}, {0x10, 0x0, 0xa11}, {0x88, 0x109, 0x0, "48dcf8c1cb65b735b2d5007004b54696aa2a8d0eb98210cf2936121163b1c0584580900f864f0ebc03ba1675bbb924fa22af1c7933e3ea0fe010ebefceaa2fd20e15b805012fd2d7a3e171a57996dc09dc5df4ce65f0c01e583247522e22d559c831115bca323aa68746a2dd9dc875023459b72ec5"}, {0x40, 0x88, 0x39, "e91254173524b71a6cf4982e471433e79bae7c4a781a2a354e5dcee630a99252345f0fe48a629be09093e130c018"}], 0x150}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000002c0)='block_bio_queue\x00'}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r1, 0x12, 0x1, 0x0, 0x0}, 0x20) r6 = openat$cgroup_ro(r0, &(0x7f0000000300)='cpuset.effective_mems\x00', 0x0, 0x0) openat$cgroup_freezer_state(r6, &(0x7f0000000380)='freezer.state\x00', 0x2, 0x0) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) socket$kcm(0x2b, 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a80)={0xffffffffffffffff, 0x0, 0x67, 0x62, &(0x7f0000000840)="f99a133c46d257d5200f326d0a5562cd17685e886bf2f9b3f9a2790348e08bc05a864a96cf5d232acf4d9c795667017ab2c3fa3c298204bcf30edef2ac8db7cbfdf4deae19c3fb8efa11f5d49f040b0731924ad772daa2861563518e94c736d15a5ac7a9872008", &(0x7f00000008c0)=""/98, 0x51a, 0x0, 0x1b, 0x0, &(0x7f0000000940)="5a4fa68ec2c72f99361b9b501348d1d5bce04f26173ed66a605e0c", &(0x7f0000000980)}, 0x48) 04:38:08 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x307400, 0x0) fcntl$getownex(r0, 0x10, 0x0) 04:38:08 executing program 3: socketpair(0x0, 0xb, 0x0, &(0x7f0000000580)) 04:38:08 executing program 4: r0 = syz_open_dev$binderN(&(0x7f00000000c0)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000440)={0x4, 0x0, &(0x7f00000002c0)=[@register_looper], 0x1, 0x0, &(0x7f0000000380)='?'}) 04:38:08 executing program 1: socketpair(0x2c, 0x0, 0x0, &(0x7f0000000580)) 04:38:08 executing program 3: r0 = socket$rds(0x15, 0x5, 0x0) bind$netlink(r0, &(0x7f0000000040), 0xc) 04:38:08 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x14, 0x0, 0x4}, 0x40) 04:38:08 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000006cc0)={0x0, 0x0, &(0x7f0000006d00)=[{&(0x7f0000000280)={0x10, 0x15, 0x10}, 0x10}, {&(0x7f0000000400)={0x10a4, 0x0, 0x0, 0x0, 0x0, "", [@generic="0a5739736b596b3edcb07e1b6c133688b552cff31ea68b35d4a1b91259ceded862f9c870629893836dd979a6e2c7a5aada0a42e76d4a5ec480fc72365f829d19d3e0f2dbb3ba2f36a714947c13afc881a39e61e2e8c630b67a1b9cfb4ecc8aa2178d02b9d43fcc14e88bc2d549b355690fcb8c0e544c4d17420cb94fd6a775c8699795558e63636688c5d07f68801e8b0973082cbd936476a9bbc6f20f6a5aae07674314b632c434dc03c1", @nested={0x4, 0xd, 0x0, 0x1, [@generic]}, @generic="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"]}, 0x10a4}, {0x0}, {&(0x7f0000002d80)={0x10, 0x21}, 0x10}], 0x4}, 0x4004800) 04:38:08 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000001c0)={'sit0\x00', 0x0}) 04:38:08 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_x25_SIOCDELRT(r0, 0x890c, &(0x7f00000001c0)={@remote={[], 0x3}, 0x0, 'ip6tnl0\x00'}) 04:38:08 executing program 1: fsopen(&(0x7f0000000040)='rpc_pipefs\x00', 0x0) 04:38:08 executing program 3: futex(&(0x7f0000000a40), 0x5, 0x0, 0x0, &(0x7f0000002880), 0x1f000000) 04:38:09 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) r3 = socket$kcm(0x29, 0x7, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xa, 0x2, 0x400, 0xc}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000140), &(0x7f00000000c0), 0x1081, r4}, 0x38) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000000480), 0x8) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000006c0)=@bpf_ext={0x1c, 0x6, &(0x7f0000000100)=@raw=[@initr0, @map={0x18, 0x3, 0x1, 0x0, r4}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}], 0x0, 0x1, 0xf8, &(0x7f0000000580)=""/248, 0x0, 0x18, [], 0x0, 0x0, r5, 0x8, &(0x7f0000000500)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000680)={0x0, 0x3, 0x32c96647, 0x9}, 0x10, 0x28c14, r2}, 0x78) sendmsg$kcm(r3, &(0x7f00000004c0)={&(0x7f00000003c0)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, 0x0, 0x0, &(0x7f0000000bc0)=[{0x58, 0x0, 0x3f, "3d036b2fe1c920e033fd51a7135bc633687035d4990a07405974e24f3e4f5bc747dd8cb833517dba325fb8357ec60f4b737260519cbec967f1e58025da9b5821975edd2eb5ce0e"}, {0x10, 0x116, 0x100}, {0x10, 0x0, 0xa11}, {0x88, 0x109, 0x0, "48dcf8c1cb65b735b2d5007004b54696aa2a8d0eb98210cf2936121163b1c0584580900f864f0ebc03ba1675bbb924fa22af1c7933e3ea0fe010ebefceaa2fd20e15b805012fd2d7a3e171a57996dc09dc5df4ce65f0c01e583247522e22d559c831115bca323aa68746a2dd9dc875023459b72ec5"}, {0x40, 0x88, 0x39, "e91254173524b71a6cf4982e471433e79bae7c4a781a2a354e5dcee630a99252345f0fe48a629be09093e130c018"}], 0x140}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000002c0)='block_bio_queue\x00'}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r1, 0x12, 0x1, 0x0, 0x0}, 0x20) r6 = openat$cgroup_ro(r0, &(0x7f0000000300)='cpuset.effective_mems\x00', 0x0, 0x0) openat$cgroup_freezer_state(r6, &(0x7f0000000380)='freezer.state\x00', 0x2, 0x0) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) socket$kcm(0x2b, 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a80)={0xffffffffffffffff, 0x0, 0x67, 0x62, &(0x7f0000000840)="f99a133c46d257d5200f326d0a5562cd17685e886bf2f9b3f9a2790348e08bc05a864a96cf5d232acf4d9c795667017ab2c3fa3c298204bcf30edef2ac8db7cbfdf4deae19c3fb8efa11f5d49f040b0731924ad772daa2861563518e94c736d15a5ac7a9872008", &(0x7f00000008c0)=""/98, 0x51a, 0x0, 0x1b, 0x0, &(0x7f0000000940)="5a4fa68ec2c72f99361b9b501348d1d5bce04f26173ed66a605e0c", &(0x7f0000000980)}, 0x48) 04:38:09 executing program 4: socket(0x11, 0x802, 0x0) 04:38:09 executing program 5: syz_usb_connect$printer(0x0, 0x2d, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x20, 0x525, 0xa4a8, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x1b, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x7, 0x1, 0x0, 0x9}}]}}]}}, 0x0) syz_usb_connect$cdc_ncm(0x0, 0x6e, &(0x7f0000000500)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5c, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}}}}}}]}}, 0x0) 04:38:09 executing program 3: futex(&(0x7f0000000a40), 0x5, 0x0, 0x0, &(0x7f0000002880), 0x1f000000) 04:38:09 executing program 1: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_RW(r0, 0x118, 0x0, &(0x7f0000000000)=0xff, 0x4) 04:38:09 executing program 2: pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) write$P9_RLERROR(r0, 0x0, 0x0) 04:38:09 executing program 3: futex(&(0x7f0000000a40), 0x5, 0x0, 0x0, &(0x7f0000002880), 0x1f000000) 04:38:09 executing program 4: r0 = syz_open_dev$ndb(&(0x7f00000001c0)='/dev/nbd#\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(r0, 0x1263, 0x0) 04:38:09 executing program 3: futex(&(0x7f0000000a40), 0x5, 0x0, 0x0, &(0x7f0000002880), 0x1f000000) 04:38:09 executing program 4: openat$nvram(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvram\x00', 0x101000, 0x0) 04:38:09 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_PKTINFO(r1, 0x29, 0x32, &(0x7f0000006a00)={@local}, 0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000000)={'ip6tnl0\x00', &(0x7f0000000340)={'syztnl2\x00', 0x0, 0x29, 0x0, 0x0, 0x0, 0x6a, @remote, @private0, 0x1, 0x0, 0x0, 0xfffffffd}}) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_PKTINFO(r2, 0x29, 0x32, &(0x7f0000006a00)={@local}, 0x14) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000003c40)={'team0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(r2, 0x89fa, &(0x7f0000003d00)={'ip6gre0\x00', &(0x7f0000003c80)={'ip6gre0\x00', r3, 0x29, 0x9, 0x7f, 0x800, 0x0, @mcast2, @mcast1, 0xfd1a31d00b2c4890, 0x8000, 0x9, 0x6}}) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000000)={@rand_addr=' \x01\x00', r3}, 0x14) r4 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_PKTINFO(r4, 0x29, 0x32, &(0x7f0000006a00)={@local}, 0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r4, 0x89f1, &(0x7f0000000000)={'ip6tnl0\x00', &(0x7f0000000340)={'syztnl2\x00', 0x0, 0x29, 0x0, 0x0, 0x0, 0x6a, @remote, @private0, 0x1, 0x0, 0x0, 0xfffffffd}}) r5 = socket(0xa, 0x3, 0x7) recvmsg$kcm(r5, &(0x7f0000000a00)={&(0x7f0000000580)=@l2tp={0x2, 0x0, @private}, 0x80, &(0x7f0000000900)=[{&(0x7f0000000600)=""/236, 0xec}, {&(0x7f0000000700)=""/102, 0x66}, {&(0x7f0000000780)=""/30, 0x1e}, {&(0x7f00000007c0)=""/16, 0x10}, {&(0x7f0000000800)=""/215, 0xd7}], 0x5, &(0x7f0000000980)=""/66, 0x42}, 0x20) r6 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_PKTINFO(r6, 0x29, 0x32, &(0x7f0000006a00)={@local}, 0x14) ioctl$ifreq_SIOCGIFINDEX_team(r4, 0x8933, &(0x7f0000003c40)={'team0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(r6, 0x89fa, &(0x7f0000003d00)={'ip6gre0\x00', &(0x7f0000003c80)={'ip6gre0\x00', r7, 0x29, 0x9, 0x7f, 0x800, 0x0, @mcast2, @mcast1, 0xfd1a31d00b2c4890, 0x8000, 0x9, 0x6}}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={@dev={0xfe, 0x80, [], 0xf}, 0x1a, r7}) 04:38:09 executing program 1: socketpair(0x0, 0x0, 0x0, &(0x7f00000023c0)) [ 574.112032][ T3822] usb 6-1: new high-speed USB device number 98 using dummy_hcd [ 574.352022][ T3822] usb 6-1: Using ep0 maxpacket: 32 [ 574.473520][ T3822] usb 6-1: config 1 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 0 04:38:10 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) r3 = socket$kcm(0x29, 0x7, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xa, 0x2, 0x400, 0xc}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000140), &(0x7f00000000c0), 0x1081, r4}, 0x38) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000000480), 0x8) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000006c0)=@bpf_ext={0x1c, 0x6, &(0x7f0000000100)=@raw=[@initr0, @map={0x18, 0x3, 0x1, 0x0, r4}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}], 0x0, 0x1, 0xf8, &(0x7f0000000580)=""/248, 0x0, 0x18, [], 0x0, 0x0, r5, 0x8, &(0x7f0000000500)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000680)={0x0, 0x3, 0x32c96647, 0x9}, 0x10, 0x28c14, r2}, 0x78) sendmsg$kcm(r3, &(0x7f00000004c0)={&(0x7f00000003c0)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, 0x0, 0x0, &(0x7f0000000bc0)=[{0x58, 0x0, 0x3f, "3d036b2fe1c920e033fd51a7135bc633687035d4990a07405974e24f3e4f5bc747dd8cb833517dba325fb8357ec60f4b737260519cbec967f1e58025da9b5821975edd2eb5ce0e"}, {0x10, 0x116, 0x100}, {0x10, 0x0, 0xa11}, {0x88, 0x109, 0x0, "48dcf8c1cb65b735b2d5007004b54696aa2a8d0eb98210cf2936121163b1c0584580900f864f0ebc03ba1675bbb924fa22af1c7933e3ea0fe010ebefceaa2fd20e15b805012fd2d7a3e171a57996dc09dc5df4ce65f0c01e583247522e22d559c831115bca323aa68746a2dd9dc875023459b72ec5"}, {0x40, 0x88, 0x39, "e91254173524b71a6cf4982e471433e79bae7c4a781a2a354e5dcee630a99252345f0fe48a629be09093e130c018"}], 0x140}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000002c0)='block_bio_queue\x00'}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r1, 0x12, 0x1, 0x0, 0x0}, 0x20) r6 = openat$cgroup_ro(r0, &(0x7f0000000300)='cpuset.effective_mems\x00', 0x0, 0x0) openat$cgroup_freezer_state(r6, &(0x7f0000000380)='freezer.state\x00', 0x2, 0x0) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) socket$kcm(0x2b, 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a80)={0xffffffffffffffff, 0x0, 0x67, 0x62, &(0x7f0000000840)="f99a133c46d257d5200f326d0a5562cd17685e886bf2f9b3f9a2790348e08bc05a864a96cf5d232acf4d9c795667017ab2c3fa3c298204bcf30edef2ac8db7cbfdf4deae19c3fb8efa11f5d49f040b0731924ad772daa2861563518e94c736d15a5ac7a9872008", &(0x7f00000008c0)=""/98, 0x51a, 0x0, 0x1b, 0x0, &(0x7f0000000940)="5a4fa68ec2c72f99361b9b501348d1d5bce04f26173ed66a605e0c", &(0x7f0000000980)}, 0x48) 04:38:10 executing program 3: gettid() getpgid(0xffffffffffffffff) gettid() syz_open_procfs$namespace(0x0, 0x0) r0 = fork() sched_getparam(r0, 0x0) [ 574.652979][ T3822] usb 6-1: New USB device found, idVendor=0525, idProduct=a4a8, bcdDevice= 0.40 [ 574.662175][ T3822] usb 6-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 574.670260][ T3822] usb 6-1: Product: syz [ 574.676347][ T3822] usb 6-1: Manufacturer: syz [ 574.681057][ T3822] usb 6-1: SerialNumber: syz [ 574.927088][T23478] udc-core: couldn't find an available UDC or it's busy [ 574.934698][T23478] misc raw-gadget: fail, usb_gadget_probe_driver returned -16 [ 574.985541][ T3822] usb 6-1: USB disconnect, device number 98 [ 575.732775][ T3822] usb 6-1: new high-speed USB device number 99 using dummy_hcd [ 576.001898][ T3822] usb 6-1: Using ep0 maxpacket: 32 [ 576.122435][ T3822] usb 6-1: config 1 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 0 [ 576.292578][ T3822] usb 6-1: New USB device found, idVendor=0525, idProduct=a4a8, bcdDevice= 0.40 [ 576.302060][ T3822] usb 6-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 576.310152][ T3822] usb 6-1: Product: syz [ 576.316271][ T3822] usb 6-1: Manufacturer: syz [ 576.321005][ T3822] usb 6-1: SerialNumber: syz 04:38:12 executing program 5: syz_usb_connect$printer(0x0, 0x2d, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x20, 0x525, 0xa4a8, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x1b, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x7, 0x1, 0x0, 0x9}}]}}]}}, 0x0) syz_usb_connect$cdc_ncm(0x0, 0x6e, &(0x7f0000000500)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5c, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}}}}}}]}}, 0x0) 04:38:12 executing program 1: add_key(&(0x7f00000001c0)='cifs.idmap\x00', &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) 04:38:12 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x29, 0x35, 0x0, 0x0) 04:38:12 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x29, 0x4a, 0x0, 0x0) 04:38:12 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_PKTINFO(r1, 0x29, 0x32, &(0x7f0000006a00)={@local}, 0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000000)={'ip6tnl0\x00', &(0x7f0000000340)={'syztnl2\x00', 0x0, 0x29, 0x0, 0x0, 0x0, 0x6a, @remote, @private0, 0x1, 0x0, 0x0, 0xfffffffd}}) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_PKTINFO(r2, 0x29, 0x32, &(0x7f0000006a00)={@local}, 0x14) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000003c40)={'team0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(r2, 0x89fa, &(0x7f0000003d00)={'ip6gre0\x00', &(0x7f0000003c80)={'ip6gre0\x00', r3, 0x29, 0x9, 0x7f, 0x800, 0x0, @mcast2, @mcast1, 0xfd1a31d00b2c4890, 0x8000, 0x9, 0x6}}) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000000)={@rand_addr=' \x01\x00', r3}, 0x14) r4 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_PKTINFO(r4, 0x29, 0x32, &(0x7f0000006a00)={@local}, 0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r4, 0x89f1, &(0x7f0000000000)={'ip6tnl0\x00', &(0x7f0000000340)={'syztnl2\x00', 0x0, 0x29, 0x0, 0x0, 0x0, 0x6a, @remote, @private0, 0x1, 0x0, 0x0, 0xfffffffd}}) r5 = socket(0xa, 0x3, 0x7) recvmsg$kcm(r5, &(0x7f0000000a00)={&(0x7f0000000580)=@l2tp={0x2, 0x0, @private}, 0x80, &(0x7f0000000900)=[{&(0x7f0000000600)=""/236, 0xec}, {&(0x7f0000000700)=""/102, 0x66}, {&(0x7f0000000780)=""/30, 0x1e}, {&(0x7f00000007c0)=""/16, 0x10}, {&(0x7f0000000800)=""/215, 0xd7}], 0x5, &(0x7f0000000980)=""/66, 0x42}, 0x20) r6 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_PKTINFO(r6, 0x29, 0x32, &(0x7f0000006a00)={@local}, 0x14) ioctl$ifreq_SIOCGIFINDEX_team(r4, 0x8933, &(0x7f0000003c40)={'team0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(r6, 0x89fa, &(0x7f0000003d00)={'ip6gre0\x00', &(0x7f0000003c80)={'ip6gre0\x00', r7, 0x29, 0x9, 0x7f, 0x800, 0x0, @mcast2, @mcast1, 0xfd1a31d00b2c4890, 0x8000, 0x9, 0x6}}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={@dev={0xfe, 0x80, [], 0xf}, 0x1a, r7}) 04:38:12 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) r3 = socket$kcm(0x29, 0x7, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xa, 0x2, 0x400, 0xc}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000140), &(0x7f00000000c0), 0x1081, r4}, 0x38) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000000480), 0x8) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000006c0)=@bpf_ext={0x1c, 0x6, &(0x7f0000000100)=@raw=[@initr0, @map={0x18, 0x3, 0x1, 0x0, r4}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}], 0x0, 0x1, 0xf8, &(0x7f0000000580)=""/248, 0x0, 0x18, [], 0x0, 0x0, r5, 0x8, &(0x7f0000000500)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000680)={0x0, 0x3, 0x32c96647, 0x9}, 0x10, 0x28c14, r2}, 0x78) sendmsg$kcm(r3, &(0x7f00000004c0)={&(0x7f00000003c0)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, 0x0, 0x0, &(0x7f0000000bc0)=[{0x58, 0x0, 0x3f, "3d036b2fe1c920e033fd51a7135bc633687035d4990a07405974e24f3e4f5bc747dd8cb833517dba325fb8357ec60f4b737260519cbec967f1e58025da9b5821975edd2eb5ce0e"}, {0x10, 0x116, 0x100}, {0x10, 0x0, 0xa11}, {0x88, 0x109, 0x0, "48dcf8c1cb65b735b2d5007004b54696aa2a8d0eb98210cf2936121163b1c0584580900f864f0ebc03ba1675bbb924fa22af1c7933e3ea0fe010ebefceaa2fd20e15b805012fd2d7a3e171a57996dc09dc5df4ce65f0c01e583247522e22d559c831115bca323aa68746a2dd9dc875023459b72ec5"}, {0x40, 0x88, 0x39, "e91254173524b71a6cf4982e471433e79bae7c4a781a2a354e5dcee630a99252345f0fe48a629be09093e130c018"}], 0x140}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000002c0)='block_bio_queue\x00'}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r1, 0x12, 0x1, 0x0, 0x0}, 0x20) r6 = openat$cgroup_ro(r0, &(0x7f0000000300)='cpuset.effective_mems\x00', 0x0, 0x0) openat$cgroup_freezer_state(r6, &(0x7f0000000380)='freezer.state\x00', 0x2, 0x0) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) socket$kcm(0x2b, 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a80)={0xffffffffffffffff, 0x0, 0x67, 0x62, &(0x7f0000000840)="f99a133c46d257d5200f326d0a5562cd17685e886bf2f9b3f9a2790348e08bc05a864a96cf5d232acf4d9c795667017ab2c3fa3c298204bcf30edef2ac8db7cbfdf4deae19c3fb8efa11f5d49f040b0731924ad772daa2861563518e94c736d15a5ac7a9872008", &(0x7f00000008c0)=""/98, 0x51a, 0x0, 0x1b, 0x0, &(0x7f0000000940)="5a4fa68ec2c72f99361b9b501348d1d5bce04f26173ed66a605e0c", &(0x7f0000000980)}, 0x48) [ 576.605403][ T3822] usb 6-1: USB disconnect, device number 99 04:38:12 executing program 3: syz_usb_connect$printer(0x0, 0x2d, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x20, 0x525, 0xa4a8, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x1b, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x7, 0x1, 0x0, 0x9}}]}}]}}, 0x0) syz_usb_connect$cdc_ncm(0x0, 0x6e, &(0x7f0000000500)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5c, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}}}}}}]}}, 0x0) 04:38:12 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000004400)='net/rt6_stats\x00') write$FUSE_INTERRUPT(r0, 0x0, 0x0) 04:38:12 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000380)='net/mcfilter\x00') read$FUSE(r0, &(0x7f00000003c0)={0x2020}, 0x2020) 04:38:12 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x0, 0x801) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x0) 04:38:12 executing program 4: socketpair(0x28, 0x0, 0x5090, &(0x7f00000002c0)) 04:38:12 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x29, 0x38, 0x0, 0x300) [ 577.081842][ T3822] usb 6-1: new high-speed USB device number 100 using dummy_hcd [ 577.321918][ T3822] usb 6-1: Using ep0 maxpacket: 32 [ 577.442613][ T3822] usb 6-1: config 1 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 0 [ 577.612812][ T3822] usb 6-1: New USB device found, idVendor=0525, idProduct=a4a8, bcdDevice= 0.40 [ 577.622786][ T3822] usb 6-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 577.630884][ T3822] usb 6-1: Product: syz [ 577.636871][ T3822] usb 6-1: Manufacturer: syz [ 577.641596][ T3822] usb 6-1: SerialNumber: syz [ 577.893143][T23551] udc-core: couldn't find an available UDC or it's busy [ 577.900193][T23551] misc raw-gadget: fail, usb_gadget_probe_driver returned -16 [ 577.965441][ T3822] usb 6-1: USB disconnect, device number 100 04:38:14 executing program 5: syz_usb_connect$printer(0x0, 0x2d, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x20, 0x525, 0xa4a8, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x1b, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x7, 0x1, 0x0, 0x9}}]}}]}}, 0x0) syz_usb_connect$cdc_ncm(0x0, 0x6e, &(0x7f0000000500)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5c, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}}}}}}]}}, 0x0) 04:38:14 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x6, 0x0, 0x165812b342037e57) 04:38:14 executing program 4: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25GCAUSEDIAG(r0, 0x89a1, &(0x7f0000000000)) 04:38:14 executing program 3: syz_usb_connect$printer(0x0, 0x2d, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x20, 0x525, 0xa4a8, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x1b, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x7, 0x1, 0x0, 0x9}}]}}]}}, 0x0) syz_usb_connect$cdc_ncm(0x0, 0x6e, &(0x7f0000000500)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5c, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}}}}}}]}}, 0x0) 04:38:14 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) r3 = socket$kcm(0x29, 0x7, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xa, 0x2, 0x400, 0xc}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000140), &(0x7f00000000c0), 0x1081, r4}, 0x38) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000000480), 0x8) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000006c0)=@bpf_ext={0x1c, 0x6, &(0x7f0000000100)=@raw=[@initr0, @map={0x18, 0x3, 0x1, 0x0, r4}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}], 0x0, 0x1, 0xf8, &(0x7f0000000580)=""/248, 0x0, 0x18, [], 0x0, 0x0, r5, 0x8, &(0x7f0000000500)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000680)={0x0, 0x3, 0x32c96647, 0x9}, 0x10, 0x28c14, r2}, 0x78) sendmsg$kcm(r3, &(0x7f00000004c0)={&(0x7f00000003c0)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, 0x0, 0x0, &(0x7f0000000bc0)=[{0x58, 0x0, 0x3f, "3d036b2fe1c920e033fd51a7135bc633687035d4990a07405974e24f3e4f5bc747dd8cb833517dba325fb8357ec60f4b737260519cbec967f1e58025da9b5821975edd2eb5ce0e"}, {0x18, 0x116, 0x100, "e12e82da376bca8f"}, {0x10, 0x0, 0xa11}, {0x88, 0x109, 0x0, "48dcf8c1cb65b735b2d5007004b54696aa2a8d0eb98210cf2936121163b1c0584580900f864f0ebc03ba1675bbb924fa22af1c7933e3ea0fe010ebefceaa2fd20e15b805012fd2d7a3e171a57996dc09dc5df4ce65f0c01e583247522e22d559c831115bca323aa68746a2dd9dc875023459b72ec5"}, {0x40, 0x88, 0x39, "e91254173524b71a6cf4982e471433e79bae7c4a781a2a354e5dcee630a99252345f0fe48a629be09093e130c018"}], 0x148}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000002c0)='block_bio_queue\x00'}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r1, 0x12, 0x1, 0x0, 0x0}, 0x20) r6 = openat$cgroup_ro(r0, &(0x7f0000000300)='cpuset.effective_mems\x00', 0x0, 0x0) openat$cgroup_freezer_state(r6, &(0x7f0000000380)='freezer.state\x00', 0x2, 0x0) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) socket$kcm(0x2b, 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a80)={0xffffffffffffffff, 0x0, 0x67, 0x62, &(0x7f0000000840)="f99a133c46d257d5200f326d0a5562cd17685e886bf2f9b3f9a2790348e08bc05a864a96cf5d232acf4d9c795667017ab2c3fa3c298204bcf30edef2ac8db7cbfdf4deae19c3fb8efa11f5d49f040b0731924ad772daa2861563518e94c736d15a5ac7a9872008", &(0x7f00000008c0)=""/98, 0x51a, 0x0, 0x1b, 0x0, &(0x7f0000000940)="5a4fa68ec2c72f99361b9b501348d1d5bce04f26173ed66a605e0c", &(0x7f0000000980)}, 0x48) 04:38:14 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_PKTINFO(r1, 0x29, 0x32, &(0x7f0000006a00)={@local}, 0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000000)={'ip6tnl0\x00', &(0x7f0000000340)={'syztnl2\x00', 0x0, 0x29, 0x0, 0x0, 0x0, 0x6a, @remote, @private0, 0x1, 0x0, 0x0, 0xfffffffd}}) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_PKTINFO(r2, 0x29, 0x32, &(0x7f0000006a00)={@local}, 0x14) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000003c40)={'team0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(r2, 0x89fa, &(0x7f0000003d00)={'ip6gre0\x00', &(0x7f0000003c80)={'ip6gre0\x00', r3, 0x29, 0x9, 0x7f, 0x800, 0x0, @mcast2, @mcast1, 0xfd1a31d00b2c4890, 0x8000, 0x9, 0x6}}) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000000)={@rand_addr=' \x01\x00', r3}, 0x14) r4 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_PKTINFO(r4, 0x29, 0x32, &(0x7f0000006a00)={@local}, 0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r4, 0x89f1, &(0x7f0000000000)={'ip6tnl0\x00', &(0x7f0000000340)={'syztnl2\x00', 0x0, 0x29, 0x0, 0x0, 0x0, 0x6a, @remote, @private0, 0x1, 0x0, 0x0, 0xfffffffd}}) r5 = socket(0xa, 0x3, 0x7) recvmsg$kcm(r5, &(0x7f0000000a00)={&(0x7f0000000580)=@l2tp={0x2, 0x0, @private}, 0x80, &(0x7f0000000900)=[{&(0x7f0000000600)=""/236, 0xec}, {&(0x7f0000000700)=""/102, 0x66}, {&(0x7f0000000780)=""/30, 0x1e}, {&(0x7f00000007c0)=""/16, 0x10}, {&(0x7f0000000800)=""/215, 0xd7}], 0x5, &(0x7f0000000980)=""/66, 0x42}, 0x20) r6 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_PKTINFO(r6, 0x29, 0x32, &(0x7f0000006a00)={@local}, 0x14) ioctl$ifreq_SIOCGIFINDEX_team(r4, 0x8933, &(0x7f0000003c40)={'team0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(r6, 0x89fa, &(0x7f0000003d00)={'ip6gre0\x00', &(0x7f0000003c80)={'ip6gre0\x00', r7, 0x29, 0x9, 0x7f, 0x800, 0x0, @mcast2, @mcast1, 0xfd1a31d00b2c4890, 0x8000, 0x9, 0x6}}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={@dev={0xfe, 0x80, [], 0xf}, 0x1a, r7}) 04:38:14 executing program 4: r0 = fsopen(&(0x7f0000000000)='iso9660\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x2, 0x0, 0x0, 0x0) 04:38:14 executing program 4: setsockopt$RXRPC_UPGRADEABLE_SERVICE(0xffffffffffffffff, 0x110, 0x5, &(0x7f00000000c0), 0x2) clock_gettime(0x0, &(0x7f0000000000)) 04:38:14 executing program 4: bpf$BPF_RAW_TRACEPOINT_OPEN(0x22, &(0x7f0000000c40)={0x0}, 0x10) 04:38:14 executing program 1: openat$vim2m(0xffffffffffffff9c, &(0x7f0000001780)='/dev/vim2m\x00', 0x2, 0x0) 04:38:14 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89b0, &(0x7f0000001940)={'gre0\x00', 0x0}) 04:38:14 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/raw6\x00') read$FUSE(r0, &(0x7f00000098c0)={0x2020}, 0x2020) [ 578.801732][ T3822] usb 6-1: new high-speed USB device number 101 using dummy_hcd [ 579.071709][ T3822] usb 6-1: Using ep0 maxpacket: 32 [ 579.193638][ T3822] usb 6-1: config 1 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 0 [ 579.362881][ T3822] usb 6-1: New USB device found, idVendor=0525, idProduct=a4a8, bcdDevice= 0.40 [ 579.372095][ T3822] usb 6-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 579.380218][ T3822] usb 6-1: Product: syz [ 579.386253][ T3822] usb 6-1: Manufacturer: syz [ 579.390955][ T3822] usb 6-1: SerialNumber: syz [ 579.641869][T23594] udc-core: couldn't find an available UDC or it's busy [ 579.648940][T23594] misc raw-gadget: fail, usb_gadget_probe_driver returned -16 [ 579.695331][ T3822] usb 6-1: USB disconnect, device number 101 04:38:15 executing program 5: syz_usb_connect$printer(0x0, 0x2d, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x20, 0x525, 0xa4a8, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x1b, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x7, 0x1, 0x0, 0x9}}]}}]}}, 0x0) syz_usb_connect$cdc_ncm(0x0, 0x6e, &(0x7f0000000500)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5c, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}}}}}}]}}, 0x0) 04:38:15 executing program 1: r0 = socket$rxrpc(0x21, 0x2, 0x2) sendto$rxrpc(r0, 0x0, 0x0, 0x4801d, 0x0, 0x0) 04:38:15 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/raw6\x00') read$FUSE(r0, &(0x7f00000098c0)={0x2020}, 0x2020) 04:38:15 executing program 3: syz_usb_connect$printer(0x0, 0x2d, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x20, 0x525, 0xa4a8, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x1b, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x7, 0x1, 0x0, 0x9}}]}}]}}, 0x0) syz_usb_connect$cdc_ncm(0x0, 0x6e, &(0x7f0000000500)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5c, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}}}}}}]}}, 0x0) 04:38:15 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) r3 = socket$kcm(0x29, 0x7, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xa, 0x2, 0x400, 0xc}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000140), &(0x7f00000000c0), 0x1081, r4}, 0x38) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000000480), 0x8) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000006c0)=@bpf_ext={0x1c, 0x6, &(0x7f0000000100)=@raw=[@initr0, @map={0x18, 0x3, 0x1, 0x0, r4}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}], 0x0, 0x1, 0xf8, &(0x7f0000000580)=""/248, 0x0, 0x18, [], 0x0, 0x0, r5, 0x8, &(0x7f0000000500)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000680)={0x0, 0x3, 0x32c96647, 0x9}, 0x10, 0x28c14, r2}, 0x78) sendmsg$kcm(r3, &(0x7f00000004c0)={&(0x7f00000003c0)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, 0x0, 0x0, &(0x7f0000000bc0)=[{0x58, 0x0, 0x3f, "3d036b2fe1c920e033fd51a7135bc633687035d4990a07405974e24f3e4f5bc747dd8cb833517dba325fb8357ec60f4b737260519cbec967f1e58025da9b5821975edd2eb5ce0e"}, {0x18, 0x116, 0x100, "e12e82da376bca8f"}, {0x10, 0x0, 0xa11}, {0x88, 0x109, 0x0, "48dcf8c1cb65b735b2d5007004b54696aa2a8d0eb98210cf2936121163b1c0584580900f864f0ebc03ba1675bbb924fa22af1c7933e3ea0fe010ebefceaa2fd20e15b805012fd2d7a3e171a57996dc09dc5df4ce65f0c01e583247522e22d559c831115bca323aa68746a2dd9dc875023459b72ec5"}, {0x40, 0x88, 0x39, "e91254173524b71a6cf4982e471433e79bae7c4a781a2a354e5dcee630a99252345f0fe48a629be09093e130c018"}], 0x148}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000002c0)='block_bio_queue\x00'}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r1, 0x12, 0x1, 0x0, 0x0}, 0x20) r6 = openat$cgroup_ro(r0, &(0x7f0000000300)='cpuset.effective_mems\x00', 0x0, 0x0) openat$cgroup_freezer_state(r6, &(0x7f0000000380)='freezer.state\x00', 0x2, 0x0) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) socket$kcm(0x2b, 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a80)={0xffffffffffffffff, 0x0, 0x67, 0x62, &(0x7f0000000840)="f99a133c46d257d5200f326d0a5562cd17685e886bf2f9b3f9a2790348e08bc05a864a96cf5d232acf4d9c795667017ab2c3fa3c298204bcf30edef2ac8db7cbfdf4deae19c3fb8efa11f5d49f040b0731924ad772daa2861563518e94c736d15a5ac7a9872008", &(0x7f00000008c0)=""/98, 0x51a, 0x0, 0x1b, 0x0, &(0x7f0000000940)="5a4fa68ec2c72f99361b9b501348d1d5bce04f26173ed66a605e0c", &(0x7f0000000980)}, 0x48) 04:38:15 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_PKTINFO(r1, 0x29, 0x32, &(0x7f0000006a00)={@local}, 0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000000)={'ip6tnl0\x00', &(0x7f0000000340)={'syztnl2\x00', 0x0, 0x29, 0x0, 0x0, 0x0, 0x6a, @remote, @private0, 0x1, 0x0, 0x0, 0xfffffffd}}) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_PKTINFO(r2, 0x29, 0x32, &(0x7f0000006a00)={@local}, 0x14) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000003c40)={'team0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(r2, 0x89fa, &(0x7f0000003d00)={'ip6gre0\x00', &(0x7f0000003c80)={'ip6gre0\x00', r3, 0x29, 0x9, 0x7f, 0x800, 0x0, @mcast2, @mcast1, 0xfd1a31d00b2c4890, 0x8000, 0x9, 0x6}}) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000000)={@rand_addr=' \x01\x00', r3}, 0x14) r4 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_PKTINFO(r4, 0x29, 0x32, &(0x7f0000006a00)={@local}, 0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r4, 0x89f1, &(0x7f0000000000)={'ip6tnl0\x00', &(0x7f0000000340)={'syztnl2\x00', 0x0, 0x29, 0x0, 0x0, 0x0, 0x6a, @remote, @private0, 0x1, 0x0, 0x0, 0xfffffffd}}) r5 = socket(0xa, 0x3, 0x7) recvmsg$kcm(r5, &(0x7f0000000a00)={&(0x7f0000000580)=@l2tp={0x2, 0x0, @private}, 0x80, &(0x7f0000000900)=[{&(0x7f0000000600)=""/236, 0xec}, {&(0x7f0000000700)=""/102, 0x66}, {&(0x7f0000000780)=""/30, 0x1e}, {&(0x7f00000007c0)=""/16, 0x10}, {&(0x7f0000000800)=""/215, 0xd7}], 0x5, &(0x7f0000000980)=""/66, 0x42}, 0x20) r6 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_PKTINFO(r6, 0x29, 0x32, &(0x7f0000006a00)={@local}, 0x14) ioctl$ifreq_SIOCGIFINDEX_team(r4, 0x8933, &(0x7f0000003c40)={'team0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(r6, 0x89fa, &(0x7f0000003d00)={'ip6gre0\x00', &(0x7f0000003c80)={'ip6gre0\x00', r7, 0x29, 0x9, 0x7f, 0x800, 0x0, @mcast2, @mcast1, 0xfd1a31d00b2c4890, 0x8000, 0x9, 0x6}}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={@dev={0xfe, 0x80, [], 0xf}, 0x1a, r7}) 04:38:15 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/raw6\x00') read$FUSE(r0, &(0x7f00000098c0)={0x2020}, 0x2020) 04:38:16 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/raw6\x00') read$FUSE(r0, &(0x7f00000098c0)={0x2020}, 0x2020) 04:38:16 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x29, 0x16, 0x0, 0x300) 04:38:16 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/softnet_stat\x00') write$FUSE_DIRENT(r0, 0x0, 0x0) 04:38:16 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) ioctl$PPPIOCATTACH(r0, 0x40047438, 0x0) 04:38:16 executing program 4: bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000100)={&(0x7f00000000c0)='./file0/file0\x00'}, 0xffc9) [ 580.541721][ T3822] usb 6-1: new high-speed USB device number 102 using dummy_hcd [ 580.791606][ T3822] usb 6-1: Using ep0 maxpacket: 32 [ 580.912351][ T3822] usb 6-1: config 1 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 0 [ 581.082356][ T3822] usb 6-1: New USB device found, idVendor=0525, idProduct=a4a8, bcdDevice= 0.40 [ 581.091589][ T3822] usb 6-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 581.100423][ T3822] usb 6-1: Product: syz [ 581.106533][ T3822] usb 6-1: Manufacturer: syz [ 581.111230][ T3822] usb 6-1: SerialNumber: syz [ 581.362309][T23637] udc-core: couldn't find an available UDC or it's busy [ 581.369293][T23637] misc raw-gadget: fail, usb_gadget_probe_driver returned -16 [ 581.415134][ T3822] usb 6-1: USB disconnect, device number 102 04:38:17 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f0000000000)={'wpan1\x00'}) 04:38:17 executing program 4: clone(0x21bc8580, 0x0, 0x0, 0x0, 0x0) 04:38:17 executing program 3: r0 = socket$rds(0x15, 0x5, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, 0xfffffffffffffffe) 04:38:17 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) r3 = socket$kcm(0x29, 0x7, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xa, 0x2, 0x400, 0xc}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000140), &(0x7f00000000c0), 0x1081, r4}, 0x38) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000000480), 0x8) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000006c0)=@bpf_ext={0x1c, 0x6, &(0x7f0000000100)=@raw=[@initr0, @map={0x18, 0x3, 0x1, 0x0, r4}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}], 0x0, 0x1, 0xf8, &(0x7f0000000580)=""/248, 0x0, 0x18, [], 0x0, 0x0, r5, 0x8, &(0x7f0000000500)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000680)={0x0, 0x3, 0x32c96647, 0x9}, 0x10, 0x28c14, r2}, 0x78) sendmsg$kcm(r3, &(0x7f00000004c0)={&(0x7f00000003c0)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, 0x0, 0x0, &(0x7f0000000bc0)=[{0x58, 0x0, 0x3f, "3d036b2fe1c920e033fd51a7135bc633687035d4990a07405974e24f3e4f5bc747dd8cb833517dba325fb8357ec60f4b737260519cbec967f1e58025da9b5821975edd2eb5ce0e"}, {0x18, 0x116, 0x100, "e12e82da376bca8f"}, {0x10, 0x0, 0xa11}, {0x88, 0x109, 0x0, "48dcf8c1cb65b735b2d5007004b54696aa2a8d0eb98210cf2936121163b1c0584580900f864f0ebc03ba1675bbb924fa22af1c7933e3ea0fe010ebefceaa2fd20e15b805012fd2d7a3e171a57996dc09dc5df4ce65f0c01e583247522e22d559c831115bca323aa68746a2dd9dc875023459b72ec5"}, {0x40, 0x88, 0x39, "e91254173524b71a6cf4982e471433e79bae7c4a781a2a354e5dcee630a99252345f0fe48a629be09093e130c018"}], 0x148}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000002c0)='block_bio_queue\x00'}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r1, 0x12, 0x1, 0x0, 0x0}, 0x20) r6 = openat$cgroup_ro(r0, &(0x7f0000000300)='cpuset.effective_mems\x00', 0x0, 0x0) openat$cgroup_freezer_state(r6, &(0x7f0000000380)='freezer.state\x00', 0x2, 0x0) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) socket$kcm(0x2b, 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a80)={0xffffffffffffffff, 0x0, 0x67, 0x62, &(0x7f0000000840)="f99a133c46d257d5200f326d0a5562cd17685e886bf2f9b3f9a2790348e08bc05a864a96cf5d232acf4d9c795667017ab2c3fa3c298204bcf30edef2ac8db7cbfdf4deae19c3fb8efa11f5d49f040b0731924ad772daa2861563518e94c736d15a5ac7a9872008", &(0x7f00000008c0)=""/98, 0x51a, 0x0, 0x1b, 0x0, &(0x7f0000000940)="5a4fa68ec2c72f99361b9b501348d1d5bce04f26173ed66a605e0c", &(0x7f0000000980)}, 0x48) 04:38:17 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f0000000000)={@mcast1, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x1, 0xd2b4, 0x0, 0x0, 0x1000000}) 04:38:17 executing program 4: socket(0x18, 0x0, 0xffffffff) 04:38:17 executing program 3: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000002280)='/dev/vsock\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_BINARY(r0, 0x2, 0x0, 0x0, 0x0) 04:38:17 executing program 4: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$TUNSETIFINDEX(r0, 0x541b, 0x0) 04:38:17 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, 0x0, &(0x7f0000000280)) 04:38:17 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r0, 0x0, 0x0) 04:38:17 executing program 4: openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video36\x00', 0x2, 0x0) 04:38:17 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@mpol={'mpol', 0x3d, {'bind', '=static'}}}]}) setxattr$trusted_overlay_upper(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='trusted.overlay.upper\x00', &(0x7f0000000180)={0x0, 0xfb, 0x4b, 0x1, 0x3, "93aadb0bda031b7e2af3b50606706b54", "0e1352649c5cc1eb1a3002609f7b7f5fd3f067e6585a87920a18818104c6c32e184bfa33e6c51b921a8745fbf0df16c3558cd84a2231"}, 0x4b, 0x1) 04:38:17 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0)='nl80211\x00', 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_REKEY_OFFLOAD(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000003c0)={0x28, r1, 0x1, 0x0, 0x0, {{0x2}, {@val={0x8, 0x5}, @val={0xc}}}}, 0x28}}, 0x0) 04:38:17 executing program 5: r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, 0x0) 04:38:17 executing program 3: r0 = socket$rds(0x15, 0x5, 0x0) recvfrom(r0, 0x0, 0x0, 0x10001, &(0x7f0000001600)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80) [ 582.408034][T23703] tmpfs: Bad value for 'mpol' [ 582.466031][T23703] tmpfs: Bad value for 'mpol' 04:38:18 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) r3 = socket$kcm(0x29, 0x7, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xa, 0x2, 0x400, 0xc}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000140), &(0x7f00000000c0), 0x1081, r4}, 0x38) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000000480), 0x8) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000006c0)=@bpf_ext={0x1c, 0x6, &(0x7f0000000100)=@raw=[@initr0, @map={0x18, 0x3, 0x1, 0x0, r4}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}], 0x0, 0x1, 0xf8, &(0x7f0000000580)=""/248, 0x0, 0x18, [], 0x0, 0x0, r5, 0x8, &(0x7f0000000500)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000680)={0x0, 0x3, 0x32c96647, 0x9}, 0x10, 0x28c14, r2}, 0x78) sendmsg$kcm(r3, &(0x7f00000004c0)={&(0x7f00000003c0)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, 0x0, 0x0, &(0x7f0000000bc0)=[{0x58, 0x0, 0x3f, "3d036b2fe1c920e033fd51a7135bc633687035d4990a07405974e24f3e4f5bc747dd8cb833517dba325fb8357ec60f4b737260519cbec967f1e58025da9b5821975edd2eb5ce0e"}, {0x20, 0x116, 0x100, "e12e82da376bca8fa03c5306"}, {0x10, 0x0, 0xa11}, {0x88, 0x109, 0x0, "48dcf8c1cb65b735b2d5007004b54696aa2a8d0eb98210cf2936121163b1c0584580900f864f0ebc03ba1675bbb924fa22af1c7933e3ea0fe010ebefceaa2fd20e15b805012fd2d7a3e171a57996dc09dc5df4ce65f0c01e583247522e22d559c831115bca323aa68746a2dd9dc875023459b72ec5"}, {0x40, 0x88, 0x39, "e91254173524b71a6cf4982e471433e79bae7c4a781a2a354e5dcee630a99252345f0fe48a629be09093e130c018"}], 0x150}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000002c0)='block_bio_queue\x00'}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r1, 0x12, 0x1, 0x0, 0x0}, 0x20) r6 = openat$cgroup_ro(r0, &(0x7f0000000300)='cpuset.effective_mems\x00', 0x0, 0x0) openat$cgroup_freezer_state(r6, &(0x7f0000000380)='freezer.state\x00', 0x2, 0x0) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) socket$kcm(0x2b, 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a80)={0xffffffffffffffff, 0x0, 0x67, 0x62, &(0x7f0000000840)="f99a133c46d257d5200f326d0a5562cd17685e886bf2f9b3f9a2790348e08bc05a864a96cf5d232acf4d9c795667017ab2c3fa3c298204bcf30edef2ac8db7cbfdf4deae19c3fb8efa11f5d49f040b0731924ad772daa2861563518e94c736d15a5ac7a9872008", &(0x7f00000008c0)=""/98, 0x51a, 0x0, 0x1b, 0x0, &(0x7f0000000940)="5a4fa68ec2c72f99361b9b501348d1d5bce04f26173ed66a605e0c", &(0x7f0000000980)}, 0x48) 04:38:18 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f000001ca00)={0x0, 0x0, &(0x7f000001c9c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB="2400000026000102"], 0x24}}, 0x0) recvmmsg(r0, &(0x7f0000002e40)=[{{0x0, 0x0, &(0x7f0000002980)=[{&(0x7f0000001740)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 04:38:18 executing program 3: openat$nvram(0xffffffffffffff9c, 0x0, 0x96a00, 0x0) getsockname$netrom(0xffffffffffffffff, 0x0, 0x0) ioctl$FBIOGETCMAP(0xffffffffffffffff, 0x4604, 0x0) syz_emit_vhci(&(0x7f0000000740)=@HCI_SCODATA_PKT, 0x4) 04:38:18 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00', 0xffffffffffffffff) sendmsg$TIPC_NL_BEARER_DISABLE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)={0x18, r1, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x4}]}, 0x18}}, 0x0) 04:38:18 executing program 1: syz_read_part_table(0x0, 0x2, &(0x7f0000002780)=[{0x0, 0x0, 0x100000001}, {&(0x7f0000001580)="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", 0x1d6}]) 04:38:18 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@mpol={'mpol', 0x3d, {'bind', '=static'}}}]}) setxattr$trusted_overlay_upper(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='trusted.overlay.upper\x00', &(0x7f0000000180)={0x0, 0xfb, 0x4b, 0x1, 0x3, "93aadb0bda031b7e2af3b50606706b54", "0e1352649c5cc1eb1a3002609f7b7f5fd3f067e6585a87920a18818104c6c32e184bfa33e6c51b921a8745fbf0df16c3558cd84a2231"}, 0x4b, 0x1) 04:38:18 executing program 3: add_key$user(&(0x7f0000000080)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000200)="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", 0xfffffffffffffefa, 0xfffffffffffffff8) 04:38:18 executing program 5: socketpair(0x2c, 0x3, 0x0, &(0x7f0000000580)) 04:38:18 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000003c40)={'team0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0xc0189436, &(0x7f00000000c0)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, r2}) [ 582.918360][ T8452] Bluetooth: hci3: SCO packet for unknown connection handle 0 [ 582.953277][T23719] tmpfs: Bad value for 'mpol' 04:38:18 executing program 1: syz_genetlink_get_family_id$mptcp(0x0, 0xffffffffffffffff) openat$pfkey(0xffffffffffffff9c, &(0x7f0000002680)='/proc/self/net/pfkey\x00', 0x2, 0x0) 04:38:18 executing program 3: socketpair(0xb, 0x0, 0x0, &(0x7f0000001a00)) 04:38:18 executing program 5: socketpair(0x2c, 0x3, 0x0, &(0x7f0000000580)) 04:38:19 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) r3 = socket$kcm(0x29, 0x7, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xa, 0x2, 0x400, 0xc}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000140), &(0x7f00000000c0), 0x1081, r4}, 0x38) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000000480), 0x8) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000006c0)=@bpf_ext={0x1c, 0x6, &(0x7f0000000100)=@raw=[@initr0, @map={0x18, 0x3, 0x1, 0x0, r4}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}], 0x0, 0x1, 0xf8, &(0x7f0000000580)=""/248, 0x0, 0x18, [], 0x0, 0x0, r5, 0x8, &(0x7f0000000500)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000680)={0x0, 0x3, 0x32c96647, 0x9}, 0x10, 0x28c14, r2}, 0x78) sendmsg$kcm(r3, &(0x7f00000004c0)={&(0x7f00000003c0)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, 0x0, 0x0, &(0x7f0000000bc0)=[{0x58, 0x0, 0x3f, "3d036b2fe1c920e033fd51a7135bc633687035d4990a07405974e24f3e4f5bc747dd8cb833517dba325fb8357ec60f4b737260519cbec967f1e58025da9b5821975edd2eb5ce0e"}, {0x20, 0x116, 0x100, "e12e82da376bca8fa03c5306"}, {0x10, 0x0, 0xa11}, {0x88, 0x109, 0x0, "48dcf8c1cb65b735b2d5007004b54696aa2a8d0eb98210cf2936121163b1c0584580900f864f0ebc03ba1675bbb924fa22af1c7933e3ea0fe010ebefceaa2fd20e15b805012fd2d7a3e171a57996dc09dc5df4ce65f0c01e583247522e22d559c831115bca323aa68746a2dd9dc875023459b72ec5"}, {0x40, 0x88, 0x39, "e91254173524b71a6cf4982e471433e79bae7c4a781a2a354e5dcee630a99252345f0fe48a629be09093e130c018"}], 0x150}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000002c0)='block_bio_queue\x00'}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r1, 0x12, 0x1, 0x0, 0x0}, 0x20) r6 = openat$cgroup_ro(r0, &(0x7f0000000300)='cpuset.effective_mems\x00', 0x0, 0x0) openat$cgroup_freezer_state(r6, &(0x7f0000000380)='freezer.state\x00', 0x2, 0x0) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) socket$kcm(0x2b, 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a80)={0xffffffffffffffff, 0x0, 0x67, 0x62, &(0x7f0000000840)="f99a133c46d257d5200f326d0a5562cd17685e886bf2f9b3f9a2790348e08bc05a864a96cf5d232acf4d9c795667017ab2c3fa3c298204bcf30edef2ac8db7cbfdf4deae19c3fb8efa11f5d49f040b0731924ad772daa2861563518e94c736d15a5ac7a9872008", &(0x7f00000008c0)=""/98, 0x51a, 0x0, 0x1b, 0x0, &(0x7f0000000940)="5a4fa68ec2c72f99361b9b501348d1d5bce04f26173ed66a605e0c", &(0x7f0000000980)}, 0x48) 04:38:19 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@mpol={'mpol', 0x3d, {'bind', '=static'}}}]}) setxattr$trusted_overlay_upper(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='trusted.overlay.upper\x00', &(0x7f0000000180)={0x0, 0xfb, 0x4b, 0x1, 0x3, "93aadb0bda031b7e2af3b50606706b54", "0e1352649c5cc1eb1a3002609f7b7f5fd3f067e6585a87920a18818104c6c32e184bfa33e6c51b921a8745fbf0df16c3558cd84a2231"}, 0x4b, 0x1) 04:38:19 executing program 4: keyctl$dh_compute(0x17, &(0x7f0000000300), 0x0, 0x2, 0x0) 04:38:19 executing program 3: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) sendmmsg$nfc_llcp(r0, &(0x7f0000001f40)=[{&(0x7f00000006c0)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "3ddf8eb37cd68e893e8173f597eed4587b1f783699cfdad793dd6b320eb276a6ecb034847ba0189c8c9549e4e62c3f5ff734982a96e293b6861c0edbbec26f"}, 0x60, 0x0}], 0x1, 0x20000001) 04:38:19 executing program 5: socketpair(0x2c, 0x3, 0x0, &(0x7f0000000580)) 04:38:19 executing program 1: clone(0x30302480, 0x0, 0x0, 0x0, 0x0) 04:38:19 executing program 3: r0 = fsopen(&(0x7f0000000040)='bdev\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) 04:38:19 executing program 4: socketpair(0x10, 0x2, 0x2, &(0x7f0000000140)) 04:38:19 executing program 5: socketpair(0x2c, 0x3, 0x0, &(0x7f0000000580)) [ 583.786386][T23753] tmpfs: Bad value for 'mpol' 04:38:19 executing program 4: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x0, 0x0) syz_genetlink_get_family_id$mptcp(0x0, 0xffffffffffffffff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000840)='802.15.4 MAC\x00', 0xffffffffffffffff) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000880)='/dev/cachefiles\x00', 0x80040, 0x0) 04:38:19 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@mpol={'mpol', 0x3d, {'bind', '=static'}}}]}) setxattr$trusted_overlay_upper(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='trusted.overlay.upper\x00', &(0x7f0000000180)={0x0, 0xfb, 0x4b, 0x1, 0x3, "93aadb0bda031b7e2af3b50606706b54", "0e1352649c5cc1eb1a3002609f7b7f5fd3f067e6585a87920a18818104c6c32e184bfa33e6c51b921a8745fbf0df16c3558cd84a2231"}, 0x4b, 0x1) 04:38:19 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x36, 0x0, 0x0) [ 584.175181][T23771] tmpfs: Bad value for 'mpol' 04:38:20 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) r3 = socket$kcm(0x29, 0x7, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xa, 0x2, 0x400, 0xc}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000140), &(0x7f00000000c0), 0x1081, r4}, 0x38) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000000480), 0x8) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000006c0)=@bpf_ext={0x1c, 0x6, &(0x7f0000000100)=@raw=[@initr0, @map={0x18, 0x3, 0x1, 0x0, r4}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}], 0x0, 0x1, 0xf8, &(0x7f0000000580)=""/248, 0x0, 0x18, [], 0x0, 0x0, r5, 0x8, &(0x7f0000000500)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000680)={0x0, 0x3, 0x32c96647, 0x9}, 0x10, 0x28c14, r2}, 0x78) sendmsg$kcm(r3, &(0x7f00000004c0)={&(0x7f00000003c0)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, 0x0, 0x0, &(0x7f0000000bc0)=[{0x58, 0x0, 0x3f, "3d036b2fe1c920e033fd51a7135bc633687035d4990a07405974e24f3e4f5bc747dd8cb833517dba325fb8357ec60f4b737260519cbec967f1e58025da9b5821975edd2eb5ce0e"}, {0x20, 0x116, 0x100, "e12e82da376bca8fa03c5306"}, {0x10, 0x0, 0xa11}, {0x88, 0x109, 0x0, "48dcf8c1cb65b735b2d5007004b54696aa2a8d0eb98210cf2936121163b1c0584580900f864f0ebc03ba1675bbb924fa22af1c7933e3ea0fe010ebefceaa2fd20e15b805012fd2d7a3e171a57996dc09dc5df4ce65f0c01e583247522e22d559c831115bca323aa68746a2dd9dc875023459b72ec5"}, {0x40, 0x88, 0x39, "e91254173524b71a6cf4982e471433e79bae7c4a781a2a354e5dcee630a99252345f0fe48a629be09093e130c018"}], 0x150}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000002c0)='block_bio_queue\x00'}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r1, 0x12, 0x1, 0x0, 0x0}, 0x20) r6 = openat$cgroup_ro(r0, &(0x7f0000000300)='cpuset.effective_mems\x00', 0x0, 0x0) openat$cgroup_freezer_state(r6, &(0x7f0000000380)='freezer.state\x00', 0x2, 0x0) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) socket$kcm(0x2b, 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a80)={0xffffffffffffffff, 0x0, 0x67, 0x62, &(0x7f0000000840)="f99a133c46d257d5200f326d0a5562cd17685e886bf2f9b3f9a2790348e08bc05a864a96cf5d232acf4d9c795667017ab2c3fa3c298204bcf30edef2ac8db7cbfdf4deae19c3fb8efa11f5d49f040b0731924ad772daa2861563518e94c736d15a5ac7a9872008", &(0x7f00000008c0)=""/98, 0x51a, 0x0, 0x1b, 0x0, &(0x7f0000000940)="5a4fa68ec2c72f99361b9b501348d1d5bce04f26173ed66a605e0c", &(0x7f0000000980)}, 0x48) 04:38:20 executing program 5: r0 = socket$rxrpc(0x21, 0x2, 0xa) syz_genetlink_get_family_id$team(&(0x7f0000000000)='team\x00', r0) 04:38:20 executing program 4: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x0, 0x0) syz_genetlink_get_family_id$mptcp(0x0, 0xffffffffffffffff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000840)='802.15.4 MAC\x00', 0xffffffffffffffff) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000880)='/dev/cachefiles\x00', 0x80040, 0x0) 04:38:20 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f00000006c0)='NLBL_UNLBL\x00', r1) sendmsg$NLBL_UNLABEL_C_ACCEPT(r0, &(0x7f0000000780)={&(0x7f0000000680), 0xc, &(0x7f0000000740)={&(0x7f0000000700)={0x1c, r2, 0x1, 0x0, 0x0, {}, [@NLBL_UNLABEL_A_ACPTFLG={0x5, 0x1, 0x9}]}, 0x1c}}, 0x0) 04:38:20 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) syz_init_net_socket$rose(0xb, 0x5, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000002c0)={'bond_slave_1\x00'}) 04:38:20 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000b80)={0x0, 0x0, &(0x7f0000000b40)={0x0}}, 0x0) 04:38:20 executing program 5: r0 = syz_open_dev$video4linux(&(0x7f0000000280)='/dev/v4l-subdev#\x00', 0xfff, 0x0) ioctl$VIDIOC_G_CTRL(r0, 0xc008561c, &(0x7f0000000300)) 04:38:20 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f00000006c0)='NLBL_UNLBL\x00', r1) sendmsg$NLBL_UNLABEL_C_ACCEPT(r0, &(0x7f0000000780)={&(0x7f0000000680), 0xc, &(0x7f0000000740)={&(0x7f0000000700)={0x1c, r2, 0x1, 0x0, 0x0, {}, [@NLBL_UNLABEL_A_ACPTFLG={0x5, 0x1, 0x9}]}, 0x1c}}, 0x0) 04:38:20 executing program 4: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x0, 0x0) syz_genetlink_get_family_id$mptcp(0x0, 0xffffffffffffffff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000840)='802.15.4 MAC\x00', 0xffffffffffffffff) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000880)='/dev/cachefiles\x00', 0x80040, 0x0) 04:38:20 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f00000006c0)='NLBL_UNLBL\x00', r1) sendmsg$NLBL_UNLABEL_C_ACCEPT(r0, &(0x7f0000000780)={&(0x7f0000000680), 0xc, &(0x7f0000000740)={&(0x7f0000000700)={0x1c, r2, 0x1, 0x0, 0x0, {}, [@NLBL_UNLABEL_A_ACPTFLG={0x5, 0x1, 0x9}]}, 0x1c}}, 0x0) 04:38:20 executing program 1: syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0xffffffffffffffff, 0x307443) 04:38:20 executing program 5: r0 = syz_open_dev$video4linux(&(0x7f0000000280)='/dev/v4l-subdev#\x00', 0xfff, 0x0) ioctl$VIDIOC_G_CTRL(r0, 0xc008561c, &(0x7f0000000300)) 04:38:21 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) r3 = socket$kcm(0x29, 0x7, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xa, 0x2, 0x400, 0xc}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000140), &(0x7f00000000c0), 0x1081, r4}, 0x38) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000000480), 0x8) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000006c0)=@bpf_ext={0x1c, 0x6, &(0x7f0000000100)=@raw=[@initr0, @map={0x18, 0x3, 0x1, 0x0, r4}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}], 0x0, 0x1, 0xf8, &(0x7f0000000580)=""/248, 0x0, 0x18, [], 0x0, 0x0, r5, 0x8, &(0x7f0000000500)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000680)={0x0, 0x3, 0x32c96647, 0x9}, 0x10, 0x28c14, r2}, 0x78) sendmsg$kcm(r3, &(0x7f00000004c0)={&(0x7f00000003c0)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, 0x0, 0x0, &(0x7f0000000bc0)=[{0x58, 0x0, 0x3f, "3d036b2fe1c920e033fd51a7135bc633687035d4990a07405974e24f3e4f5bc747dd8cb833517dba325fb8357ec60f4b737260519cbec967f1e58025da9b5821975edd2eb5ce0e"}, {0x20, 0x116, 0x100, "e12e82da376bca8fa03c53062e62"}, {0x10, 0x0, 0xa11}, {0x88, 0x109, 0x0, "48dcf8c1cb65b735b2d5007004b54696aa2a8d0eb98210cf2936121163b1c0584580900f864f0ebc03ba1675bbb924fa22af1c7933e3ea0fe010ebefceaa2fd20e15b805012fd2d7a3e171a57996dc09dc5df4ce65f0c01e583247522e22d559c831115bca323aa68746a2dd9dc875023459b72ec5"}, {0x40, 0x88, 0x39, "e91254173524b71a6cf4982e471433e79bae7c4a781a2a354e5dcee630a99252345f0fe48a629be09093e130c018"}], 0x150}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000002c0)='block_bio_queue\x00'}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r1, 0x12, 0x1, 0x0, 0x0}, 0x20) r6 = openat$cgroup_ro(r0, &(0x7f0000000300)='cpuset.effective_mems\x00', 0x0, 0x0) openat$cgroup_freezer_state(r6, &(0x7f0000000380)='freezer.state\x00', 0x2, 0x0) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) socket$kcm(0x2b, 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a80)={0xffffffffffffffff, 0x0, 0x67, 0x62, &(0x7f0000000840)="f99a133c46d257d5200f326d0a5562cd17685e886bf2f9b3f9a2790348e08bc05a864a96cf5d232acf4d9c795667017ab2c3fa3c298204bcf30edef2ac8db7cbfdf4deae19c3fb8efa11f5d49f040b0731924ad772daa2861563518e94c736d15a5ac7a9872008", &(0x7f00000008c0)=""/98, 0x51a, 0x0, 0x1b, 0x0, &(0x7f0000000940)="5a4fa68ec2c72f99361b9b501348d1d5bce04f26173ed66a605e0c", &(0x7f0000000980)}, 0x48) 04:38:21 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f00000006c0)='NLBL_UNLBL\x00', r1) sendmsg$NLBL_UNLABEL_C_ACCEPT(r0, &(0x7f0000000780)={&(0x7f0000000680), 0xc, &(0x7f0000000740)={&(0x7f0000000700)={0x1c, r2, 0x1, 0x0, 0x0, {}, [@NLBL_UNLABEL_A_ACPTFLG={0x5, 0x1, 0x9}]}, 0x1c}}, 0x0) 04:38:21 executing program 4: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x0, 0x0) syz_genetlink_get_family_id$mptcp(0x0, 0xffffffffffffffff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000840)='802.15.4 MAC\x00', 0xffffffffffffffff) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000880)='/dev/cachefiles\x00', 0x80040, 0x0) 04:38:21 executing program 5: r0 = syz_open_dev$video4linux(&(0x7f0000000280)='/dev/v4l-subdev#\x00', 0xfff, 0x0) ioctl$VIDIOC_G_CTRL(r0, 0xc008561c, &(0x7f0000000300)) 04:38:21 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f00000006c0)='NLBL_UNLBL\x00', r1) sendmsg$NLBL_UNLABEL_C_ACCEPT(r0, &(0x7f0000000780)={&(0x7f0000000680), 0xc, &(0x7f0000000740)={&(0x7f0000000700)={0x1c, r2, 0x1, 0x0, 0x0, {}, [@NLBL_UNLABEL_A_ACPTFLG={0x5, 0x1, 0x9}]}, 0x1c}}, 0x0) 04:38:21 executing program 1: r0 = syz_open_dev$video4linux(&(0x7f0000000280)='/dev/v4l-subdev#\x00', 0xfff, 0x0) ioctl$VIDIOC_G_CTRL(r0, 0xc0205648, &(0x7f0000000300)) 04:38:21 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f00000006c0)='NLBL_UNLBL\x00', r1) sendmsg$NLBL_UNLABEL_C_ACCEPT(r0, &(0x7f0000000780)={&(0x7f0000000680), 0xc, &(0x7f0000000740)={&(0x7f0000000700)={0x1c, r2, 0x1, 0x0, 0x0, {}, [@NLBL_UNLABEL_A_ACPTFLG={0x5, 0x1, 0x9}]}, 0x1c}}, 0x0) 04:38:21 executing program 5: r0 = syz_open_dev$video4linux(&(0x7f0000000280)='/dev/v4l-subdev#\x00', 0xfff, 0x0) ioctl$VIDIOC_G_CTRL(r0, 0xc008561c, &(0x7f0000000300)) 04:38:21 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080)='SEG6\x00', 0xffffffffffffffff) sendmsg$SEG6_CMD_SET_TUNSRC(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000001c0)={0x28, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}, 0x28}}, 0x0) 04:38:21 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$FOU_CMD_GET(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={0x0}}, 0x0) connect$netlink(r0, &(0x7f0000000100), 0xc) 04:38:21 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f00000006c0)='NLBL_UNLBL\x00', r1) sendmsg$NLBL_UNLABEL_C_ACCEPT(r0, &(0x7f0000000780)={&(0x7f0000000680), 0xc, &(0x7f0000000740)={&(0x7f0000000700)={0x1c, r2, 0x1, 0x0, 0x0, {}, [@NLBL_UNLABEL_A_ACPTFLG={0x5, 0x1, 0x9}]}, 0x1c}}, 0x0) 04:38:21 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x65, &(0x7f0000000380)=[@in6={0xa, 0x0, 0x0, @loopback}, @in={0x2, 0x0, @broadcast}], 0x2c) 04:38:22 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) r3 = socket$kcm(0x29, 0x7, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xa, 0x2, 0x400, 0xc}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000140), &(0x7f00000000c0), 0x1081, r4}, 0x38) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000000480), 0x8) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000006c0)=@bpf_ext={0x1c, 0x6, &(0x7f0000000100)=@raw=[@initr0, @map={0x18, 0x3, 0x1, 0x0, r4}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}], 0x0, 0x1, 0xf8, &(0x7f0000000580)=""/248, 0x0, 0x18, [], 0x0, 0x0, r5, 0x8, &(0x7f0000000500)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000680)={0x0, 0x3, 0x32c96647, 0x9}, 0x10, 0x28c14, r2}, 0x78) sendmsg$kcm(r3, &(0x7f00000004c0)={&(0x7f00000003c0)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, 0x0, 0x0, &(0x7f0000000bc0)=[{0x58, 0x0, 0x3f, "3d036b2fe1c920e033fd51a7135bc633687035d4990a07405974e24f3e4f5bc747dd8cb833517dba325fb8357ec60f4b737260519cbec967f1e58025da9b5821975edd2eb5ce0e"}, {0x20, 0x116, 0x100, "e12e82da376bca8fa03c53062e62"}, {0x10, 0x0, 0xa11}, {0x88, 0x109, 0x0, "48dcf8c1cb65b735b2d5007004b54696aa2a8d0eb98210cf2936121163b1c0584580900f864f0ebc03ba1675bbb924fa22af1c7933e3ea0fe010ebefceaa2fd20e15b805012fd2d7a3e171a57996dc09dc5df4ce65f0c01e583247522e22d559c831115bca323aa68746a2dd9dc875023459b72ec5"}, {0x40, 0x88, 0x39, "e91254173524b71a6cf4982e471433e79bae7c4a781a2a354e5dcee630a99252345f0fe48a629be09093e130c018"}], 0x150}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000002c0)='block_bio_queue\x00'}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r1, 0x12, 0x1, 0x0, 0x0}, 0x20) r6 = openat$cgroup_ro(r0, &(0x7f0000000300)='cpuset.effective_mems\x00', 0x0, 0x0) openat$cgroup_freezer_state(r6, &(0x7f0000000380)='freezer.state\x00', 0x2, 0x0) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) socket$kcm(0x2b, 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a80)={0xffffffffffffffff, 0x0, 0x67, 0x62, &(0x7f0000000840)="f99a133c46d257d5200f326d0a5562cd17685e886bf2f9b3f9a2790348e08bc05a864a96cf5d232acf4d9c795667017ab2c3fa3c298204bcf30edef2ac8db7cbfdf4deae19c3fb8efa11f5d49f040b0731924ad772daa2861563518e94c736d15a5ac7a9872008", &(0x7f00000008c0)=""/98, 0x51a, 0x0, 0x1b, 0x0, &(0x7f0000000940)="5a4fa68ec2c72f99361b9b501348d1d5bce04f26173ed66a605e0c", &(0x7f0000000980)}, 0x48) 04:38:22 executing program 3: fsopen(&(0x7f0000000040)='cpuset\x00', 0x0) 04:38:22 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080)='SEG6\x00', 0xffffffffffffffff) sendmsg$SEG6_CMD_SET_TUNSRC(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000001c0)={0x28, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}, 0x28}}, 0x0) 04:38:22 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, 0x0, 0x0) 04:38:22 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCSIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r0, 0x8983, &(0x7f0000000040)={0x8, 'vlan0\x00', {'batadv_slave_0\x00'}}) 04:38:22 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r0, 0xc0045520, 0x0) 04:38:22 executing program 5: fsopen(&(0x7f0000000040)='gfs2meta\x00', 0x0) 04:38:22 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080)='SEG6\x00', 0xffffffffffffffff) sendmsg$SEG6_CMD_SET_TUNSRC(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000001c0)={0x28, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}, 0x28}}, 0x0) 04:38:22 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x7) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, 0x0, 0x0) 04:38:22 executing program 5: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/snd/seq\x00', 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0xc0bc5351, &(0x7f0000000200)) 04:38:22 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r0, 0x89f7, &(0x7f0000000180)={'syztnl1\x00', 0x0}) 04:38:22 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080)='SEG6\x00', 0xffffffffffffffff) sendmsg$SEG6_CMD_SET_TUNSRC(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000001c0)={0x28, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}, 0x28}}, 0x0) 04:38:22 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) r3 = socket$kcm(0x29, 0x7, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xa, 0x2, 0x400, 0xc}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000140), &(0x7f00000000c0), 0x1081, r4}, 0x38) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000000480), 0x8) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000006c0)=@bpf_ext={0x1c, 0x6, &(0x7f0000000100)=@raw=[@initr0, @map={0x18, 0x3, 0x1, 0x0, r4}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}], 0x0, 0x1, 0xf8, &(0x7f0000000580)=""/248, 0x0, 0x18, [], 0x0, 0x0, r5, 0x8, &(0x7f0000000500)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000680)={0x0, 0x3, 0x32c96647, 0x9}, 0x10, 0x28c14, r2}, 0x78) sendmsg$kcm(r3, &(0x7f00000004c0)={&(0x7f00000003c0)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, 0x0, 0x0, &(0x7f0000000bc0)=[{0x58, 0x0, 0x3f, "3d036b2fe1c920e033fd51a7135bc633687035d4990a07405974e24f3e4f5bc747dd8cb833517dba325fb8357ec60f4b737260519cbec967f1e58025da9b5821975edd2eb5ce0e"}, {0x20, 0x116, 0x100, "e12e82da376bca8fa03c53062e62"}, {0x10, 0x0, 0xa11}, {0x88, 0x109, 0x0, "48dcf8c1cb65b735b2d5007004b54696aa2a8d0eb98210cf2936121163b1c0584580900f864f0ebc03ba1675bbb924fa22af1c7933e3ea0fe010ebefceaa2fd20e15b805012fd2d7a3e171a57996dc09dc5df4ce65f0c01e583247522e22d559c831115bca323aa68746a2dd9dc875023459b72ec5"}, {0x40, 0x88, 0x39, "e91254173524b71a6cf4982e471433e79bae7c4a781a2a354e5dcee630a99252345f0fe48a629be09093e130c018"}], 0x150}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000002c0)='block_bio_queue\x00'}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r1, 0x12, 0x1, 0x0, 0x0}, 0x20) r6 = openat$cgroup_ro(r0, &(0x7f0000000300)='cpuset.effective_mems\x00', 0x0, 0x0) openat$cgroup_freezer_state(r6, &(0x7f0000000380)='freezer.state\x00', 0x2, 0x0) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) socket$kcm(0x2b, 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a80)={0xffffffffffffffff, 0x0, 0x67, 0x62, &(0x7f0000000840)="f99a133c46d257d5200f326d0a5562cd17685e886bf2f9b3f9a2790348e08bc05a864a96cf5d232acf4d9c795667017ab2c3fa3c298204bcf30edef2ac8db7cbfdf4deae19c3fb8efa11f5d49f040b0731924ad772daa2861563518e94c736d15a5ac7a9872008", &(0x7f00000008c0)=""/98, 0x51a, 0x0, 0x1b, 0x0, &(0x7f0000000940)="5a4fa68ec2c72f99361b9b501348d1d5bce04f26173ed66a605e0c", &(0x7f0000000980)}, 0x48) 04:38:22 executing program 2: r0 = socket(0xa, 0x3, 0x8) bind$llc(r0, 0x0, 0x0) 04:38:22 executing program 3: r0 = socket$rds(0x15, 0x5, 0x0) connect$rds(r0, &(0x7f0000000080)={0x2, 0x0, @private}, 0x20000090) 04:38:22 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89a0, 0x0) 04:38:22 executing program 4: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25SSUBSCRIP(r0, 0x89e1, &(0x7f0000000040)={'nr0\x00'}) 04:38:22 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x0, 0x0, 0x0, 0x0, @mcast2, @empty}}) 04:38:22 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(r0, 0xc4c85513, &(0x7f0000000280)={{0x7}}) 04:38:22 executing program 3: fsopen(&(0x7f0000000140)='gfs2meta\x00', 0x0) 04:38:23 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f00000004c0)='802.15.4 MAC\x00', r0) sendmsg$IEEE802154_LLSEC_DEL_DEVKEY(r1, &(0x7f00000005c0)={&(0x7f0000000480), 0xc, &(0x7f0000000580)={&(0x7f0000000500)={0x2c, r2, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan0\x00'}, @IEEE802154_ATTR_HW_ADDR={0xc}]}, 0x2c}}, 0x0) 04:38:23 executing program 2: r0 = socket$inet(0x2, 0x6, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x61, 0x0, 0x0) 04:38:23 executing program 1: memfd_create(&(0x7f0000000280)='/!^\x00', 0x5) 04:38:23 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x8, 0x7, &(0x7f0000000c00)=@framed={{}, [@call, @alu={0x4}, @map]}, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0xb5, &(0x7f0000000100)=""/181, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 04:38:23 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) r3 = socket$kcm(0x29, 0x7, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xa, 0x2, 0x400, 0xc}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000140), &(0x7f00000000c0), 0x1081, r4}, 0x38) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000000480), 0x8) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000006c0)=@bpf_ext={0x1c, 0x6, &(0x7f0000000100)=@raw=[@initr0, @map={0x18, 0x3, 0x1, 0x0, r4}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}], 0x0, 0x1, 0xf8, &(0x7f0000000580)=""/248, 0x0, 0x18, [], 0x0, 0x0, r5, 0x8, &(0x7f0000000500)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000680)={0x0, 0x3, 0x32c96647, 0x9}, 0x10, 0x28c14, r2}, 0x78) sendmsg$kcm(r3, &(0x7f00000004c0)={&(0x7f00000003c0)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, 0x0, 0x0, &(0x7f0000000bc0)=[{0x20, 0x116, 0x100, "e12e82da376bca8fa03c53062e627e"}, {0x10, 0x0, 0xa11}, {0x88, 0x109, 0x0, "48dcf8c1cb65b735b2d5007004b54696aa2a8d0eb98210cf2936121163b1c0584580900f864f0ebc03ba1675bbb924fa22af1c7933e3ea0fe010ebefceaa2fd20e15b805012fd2d7a3e171a57996dc09dc5df4ce65f0c01e583247522e22d559c831115bca323aa68746a2dd9dc875023459b72ec5"}, {0x40, 0x88, 0x39, "e91254173524b71a6cf4982e471433e79bae7c4a781a2a354e5dcee630a99252345f0fe48a629be09093e130c018"}], 0xf8}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000002c0)='block_bio_queue\x00'}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r1, 0x12, 0x1, 0x0, 0x0}, 0x20) r6 = openat$cgroup_ro(r0, &(0x7f0000000300)='cpuset.effective_mems\x00', 0x0, 0x0) openat$cgroup_freezer_state(r6, &(0x7f0000000380)='freezer.state\x00', 0x2, 0x0) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) socket$kcm(0x2b, 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a80)={0xffffffffffffffff, 0x0, 0x67, 0x62, &(0x7f0000000840)="f99a133c46d257d5200f326d0a5562cd17685e886bf2f9b3f9a2790348e08bc05a864a96cf5d232acf4d9c795667017ab2c3fa3c298204bcf30edef2ac8db7cbfdf4deae19c3fb8efa11f5d49f040b0731924ad772daa2861563518e94c736d15a5ac7a9872008", &(0x7f00000008c0)=""/98, 0x51a, 0x0, 0x1b, 0x0, &(0x7f0000000940)="5a4fa68ec2c72f99361b9b501348d1d5bce04f26173ed66a605e0c", &(0x7f0000000980)}, 0x48) 04:38:23 executing program 5: syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x5, 0x0) 04:38:23 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f00000004c0)='802.15.4 MAC\x00', r0) sendmsg$IEEE802154_LLSEC_DEL_DEVKEY(r1, &(0x7f00000005c0)={&(0x7f0000000480), 0xc, &(0x7f0000000580)={&(0x7f0000000500)={0x2c, r2, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan0\x00'}, @IEEE802154_ATTR_HW_ADDR={0xc}]}, 0x2c}}, 0x0) 04:38:23 executing program 3: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f0000000040)={0x1a, 0x1b, 0x0, 0x0, 0x0, 0x0, @random="f890bcb7b77a"}, 0x10) 04:38:23 executing program 2: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x0, 0x0) ioctl$IOC_PR_RESERVE(r0, 0x401070c9, 0x0) 04:38:23 executing program 1: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_PROMISC(r0, 0x6b, 0x2, &(0x7f00000000c0), 0x4) 04:38:23 executing program 5: r0 = syz_open_dev$video4linux(&(0x7f0000000280)='/dev/v4l-subdev#\x00', 0x0, 0x0) ioctl$VIDIOC_G_CTRL(r0, 0x8008563f, 0x0) 04:38:23 executing program 3: r0 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000)='nl802154\x00', 0xffffffffffffffff) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_CCA_ED_LEVEL(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)={0x30, r0, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}]}, 0x30}}, 0x0) 04:38:23 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f00000004c0)='802.15.4 MAC\x00', r0) sendmsg$IEEE802154_LLSEC_DEL_DEVKEY(r1, &(0x7f00000005c0)={&(0x7f0000000480), 0xc, &(0x7f0000000580)={&(0x7f0000000500)={0x2c, r2, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan0\x00'}, @IEEE802154_ATTR_HW_ADDR={0xc}]}, 0x2c}}, 0x0) 04:38:23 executing program 1: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_PROMISC(r0, 0x6b, 0x2, &(0x7f00000000c0), 0x4) 04:38:23 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg(r0, &(0x7f0000008940)=[{{&(0x7f0000000000)=@l2tp6={0xa, 0x0, 0x0, @private1={0xfc, 0x1, [], 0x1}}, 0x80, 0x0}}], 0x1, 0x0) 04:38:23 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x8924, &(0x7f0000001940)={'erspan0\x00', 0x0}) 04:38:24 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) r3 = socket$kcm(0x29, 0x7, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xa, 0x2, 0x400, 0xc}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000140), &(0x7f00000000c0), 0x1081, r4}, 0x38) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000000480), 0x8) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000006c0)=@bpf_ext={0x1c, 0x6, &(0x7f0000000100)=@raw=[@initr0, @map={0x18, 0x3, 0x1, 0x0, r4}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}], 0x0, 0x1, 0xf8, &(0x7f0000000580)=""/248, 0x0, 0x18, [], 0x0, 0x0, r5, 0x8, &(0x7f0000000500)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000680)={0x0, 0x3, 0x32c96647, 0x9}, 0x10, 0x28c14, r2}, 0x78) sendmsg$kcm(r3, &(0x7f00000004c0)={&(0x7f00000003c0)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, 0x0, 0x0, &(0x7f0000000bc0)=[{0x20, 0x116, 0x100, "e12e82da376bca8fa03c53062e627e"}, {0x10, 0x0, 0xa11}, {0x88, 0x109, 0x0, "48dcf8c1cb65b735b2d5007004b54696aa2a8d0eb98210cf2936121163b1c0584580900f864f0ebc03ba1675bbb924fa22af1c7933e3ea0fe010ebefceaa2fd20e15b805012fd2d7a3e171a57996dc09dc5df4ce65f0c01e583247522e22d559c831115bca323aa68746a2dd9dc875023459b72ec5"}, {0x40, 0x88, 0x39, "e91254173524b71a6cf4982e471433e79bae7c4a781a2a354e5dcee630a99252345f0fe48a629be09093e130c018"}], 0xf8}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000002c0)='block_bio_queue\x00'}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r1, 0x12, 0x1, 0x0, 0x0}, 0x20) r6 = openat$cgroup_ro(r0, &(0x7f0000000300)='cpuset.effective_mems\x00', 0x0, 0x0) openat$cgroup_freezer_state(r6, &(0x7f0000000380)='freezer.state\x00', 0x2, 0x0) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) socket$kcm(0x2b, 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a80)={0xffffffffffffffff, 0x0, 0x67, 0x62, &(0x7f0000000840)="f99a133c46d257d5200f326d0a5562cd17685e886bf2f9b3f9a2790348e08bc05a864a96cf5d232acf4d9c795667017ab2c3fa3c298204bcf30edef2ac8db7cbfdf4deae19c3fb8efa11f5d49f040b0731924ad772daa2861563518e94c736d15a5ac7a9872008", &(0x7f00000008c0)=""/98, 0x51a, 0x0, 0x1b, 0x0, &(0x7f0000000940)="5a4fa68ec2c72f99361b9b501348d1d5bce04f26173ed66a605e0c", &(0x7f0000000980)}, 0x48) 04:38:24 executing program 3: r0 = socket(0x2, 0x3, 0x8) sendmsg$TEAM_CMD_OPTIONS_GET(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0}}, 0xf0ff7f) 04:38:24 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f00000004c0)='802.15.4 MAC\x00', r0) sendmsg$IEEE802154_LLSEC_DEL_DEVKEY(r1, &(0x7f00000005c0)={&(0x7f0000000480), 0xc, &(0x7f0000000580)={&(0x7f0000000500)={0x2c, r2, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan0\x00'}, @IEEE802154_ATTR_HW_ADDR={0xc}]}, 0x2c}}, 0x0) 04:38:24 executing program 5: r0 = syz_open_dev$video4linux(&(0x7f0000000280)='/dev/v4l-subdev#\x00', 0xfff, 0x0) ioctl$VIDIOC_G_CTRL(r0, 0xc038563b, &(0x7f0000000300)) 04:38:24 executing program 1: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_PROMISC(r0, 0x6b, 0x2, &(0x7f00000000c0), 0x4) 04:38:24 executing program 2: r0 = fsopen(&(0x7f0000000480)='devpts\x00', 0x0) fsconfig$FSCONFIG_SET_PATH(r0, 0x3, &(0x7f0000000540)='\x8d4\xbf\xee\x1d\xab\x15]>\xbb\xc9\xfa\f\xf5\xb30\xa7\xb0`\xa3R\xe7\x9b\xe6\xb6\xa3\x8f\xdf\xb1\xa8\xb3\xc5\xf5\xf6\xedh\tB\xd1o%`6\xf9\x00\n\x91\x9a\t\xc17\x16\xda\xfd+G\f\xf6\x17\x13\x13@\x12\xbb\xa77\x9d\xfa\x93[R\xf8L\x17@\xc1sK\f2\xf7s>\x8f/I|\x932\x8d\xfa\xe1\x91\x91G\x89\xb7\xee-\xd7\r\x83\'', 0x0, 0xffffffffffffffff) 04:38:24 executing program 3: msgctl$IPC_SET(0x0, 0x1, &(0x7f0000002080)={{0x1, 0x0, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffc0, 0x0, 0x0, 0x0, 0xffffffffffffffff}) 04:38:24 executing program 5: write$tun(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$v7(&(0x7f0000000380)='v7\x00', 0x0, 0x0, 0x7, &(0x7f0000002840)=[{&(0x7f0000000480)="6950876bfbc74192fef0d41bbd6a26f6266b079f6997a058a3f4ae304cc698e85cfaacd8908296c2fc0e02300f9af28f8ebd01ba08f62fc2b5293405e608be5b1e8859c1ea90dab64c099c932b75187c8043f673dd58af7c31ea9428a5", 0x5d}, {0x0, 0x0, 0x6}, {&(0x7f0000000600)="98ba63980272414f2afe6ca731d03255c12fd033c5c984187dfc18feba4af6d276ca4245d1611016e38d19d8f9fa30a261a0fac47999cfc22d07f4ed9b47c5162ea631f4349dee15f82bacc0d6ee34a84929abc4a6aca6eb0006e2bd2fe21901cd02bac4821c78da7a74966513269c290b26c2c7a4eb8d8883df9beef288cc3d3caaa99db9d80167a31a4878cc4a620fe271943d28", 0x95}, {&(0x7f00000006c0)="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", 0xfe0, 0x7}, {0x0, 0x0, 0x9}, {&(0x7f0000002740)="ecdd0a8590f36c01ba69ff12add7742e84712077e362fa16e6d031217fc12a08f7979c1fa8e4cf4001f14784fccfe9e976a1a0f14f74c386dccc028381d2972838ffef5e4dbab9201b7ac3c656b45335234b09abf2e5d4693742a23c5c8ab888c95eb7d4d96dea0e4d0e5f3e93c77443e2dd52710ca74a90e09876eb40cf15", 0x7f, 0xffffffffffff8880}, {&(0x7f0000002800)='d', 0x1, 0x8b0b}], 0x804001, &(0x7f0000002940)={[{'$'}, {'[(].#]-'}, {}], [{@fowner_gt={'fowner>', 0xee01}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) unlinkat(0xffffffffffffffff, &(0x7f00000029c0)='./file0\x00', 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000005940)=[{{0x0, 0x0, 0x0}, 0x1ff}, {{&(0x7f00000030c0)=@can, 0x80, &(0x7f00000043c0)=[{&(0x7f0000003140)=""/97, 0x61}, {&(0x7f0000003200)=""/104, 0x68}, {&(0x7f0000003280)=""/221, 0xdd}, {&(0x7f0000003380)=""/6, 0x6}, {&(0x7f00000033c0)=""/4096, 0x1000}], 0x5}}, {{0x0, 0x0, &(0x7f0000004880)=[{&(0x7f0000004440)=""/24, 0x18}, {&(0x7f00000045c0)=""/98, 0x62}, {&(0x7f0000004640)=""/44, 0x2c}, {&(0x7f0000004680)=""/113, 0x71}, {&(0x7f0000004700)=""/54, 0x36}, {&(0x7f0000004740)=""/63, 0x3f}, {&(0x7f0000004780)=""/196, 0xc4}], 0x7, &(0x7f0000004940)=""/4096, 0x1000}, 0x8000}], 0x3, 0x40002000, &(0x7f0000005a40)={0x0, 0x989680}) 04:38:24 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000880)='nl802154\x00', 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f0000000340)={'wpan3\x00', 0x0}) sendmsg$NL802154_CMD_SET_ACKREQ_DEFAULT(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)={0x24, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_ACKREQ_DEFAULT={0x5}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r2}]}, 0x24}}, 0x0) 04:38:24 executing program 1: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_PROMISC(r0, 0x6b, 0x2, &(0x7f00000000c0), 0x4) 04:38:24 executing program 3: syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@mpol={'mpol', 0x3d, {'bind', '=static'}}}]}) 04:38:24 executing program 2: r0 = fsopen(&(0x7f0000000000)='iso9660\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x5, 0x3, 0x0, 0x0) [ 589.106429][T23940] loop5: detected capacity change from 0 to 16264 [ 589.175093][T23940] loop5: detected capacity change from 0 to 16264 [ 589.199871][T23951] tmpfs: Bad value for 'mpol' [ 589.206997][T23951] tmpfs: Bad value for 'mpol' 04:38:25 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) r3 = socket$kcm(0x29, 0x7, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xa, 0x2, 0x400, 0xc}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000140), &(0x7f00000000c0), 0x1081, r4}, 0x38) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000000480), 0x8) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000006c0)=@bpf_ext={0x1c, 0x6, &(0x7f0000000100)=@raw=[@initr0, @map={0x18, 0x3, 0x1, 0x0, r4}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}], 0x0, 0x1, 0xf8, &(0x7f0000000580)=""/248, 0x0, 0x18, [], 0x0, 0x0, r5, 0x8, &(0x7f0000000500)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000680)={0x0, 0x3, 0x32c96647, 0x9}, 0x10, 0x28c14, r2}, 0x78) sendmsg$kcm(r3, &(0x7f00000004c0)={&(0x7f00000003c0)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, 0x0, 0x0, &(0x7f0000000bc0)=[{0x20, 0x116, 0x100, "e12e82da376bca8fa03c53062e627e"}, {0x10, 0x0, 0xa11}, {0x88, 0x109, 0x0, "48dcf8c1cb65b735b2d5007004b54696aa2a8d0eb98210cf2936121163b1c0584580900f864f0ebc03ba1675bbb924fa22af1c7933e3ea0fe010ebefceaa2fd20e15b805012fd2d7a3e171a57996dc09dc5df4ce65f0c01e583247522e22d559c831115bca323aa68746a2dd9dc875023459b72ec5"}, {0x40, 0x88, 0x39, "e91254173524b71a6cf4982e471433e79bae7c4a781a2a354e5dcee630a99252345f0fe48a629be09093e130c018"}], 0xf8}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000002c0)='block_bio_queue\x00'}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r1, 0x12, 0x1, 0x0, 0x0}, 0x20) r6 = openat$cgroup_ro(r0, &(0x7f0000000300)='cpuset.effective_mems\x00', 0x0, 0x0) openat$cgroup_freezer_state(r6, &(0x7f0000000380)='freezer.state\x00', 0x2, 0x0) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) socket$kcm(0x2b, 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a80)={0xffffffffffffffff, 0x0, 0x67, 0x62, &(0x7f0000000840)="f99a133c46d257d5200f326d0a5562cd17685e886bf2f9b3f9a2790348e08bc05a864a96cf5d232acf4d9c795667017ab2c3fa3c298204bcf30edef2ac8db7cbfdf4deae19c3fb8efa11f5d49f040b0731924ad772daa2861563518e94c736d15a5ac7a9872008", &(0x7f00000008c0)=""/98, 0x51a, 0x0, 0x1b, 0x0, &(0x7f0000000940)="5a4fa68ec2c72f99361b9b501348d1d5bce04f26173ed66a605e0c", &(0x7f0000000980)}, 0x48) 04:38:25 executing program 3: r0 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(r0, 0xc4c85512, &(0x7f0000000300)={{0x3, 0x0, 0x0, 0x0, 'syz0\x00'}}) 04:38:25 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) bind(r0, &(0x7f00000000c0)=@nl=@proc, 0x80) 04:38:25 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x29, 0x32, 0x0, 0x300) 04:38:25 executing program 2: r0 = fanotify_init(0x0, 0x0) fanotify_mark(r0, 0x2, 0x23, 0xffffffffffffffff, &(0x7f0000000000)='./file0\x00') 04:38:25 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$SO_BINDTODEVICE_wg(r0, 0x1, 0x19, 0x0, 0x0) 04:38:25 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x8930, &(0x7f0000001940)={'gre0\x00', 0x0}) 04:38:25 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$MPTCP_PM_CMD_GET_ADDR(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="30000000fbce83"], 0x30}}, 0x0) 04:38:25 executing program 4: socketpair(0x25, 0x5, 0x0, &(0x7f0000000080)) 04:38:25 executing program 5: clock_gettime(0xb, &(0x7f0000000480)) 04:38:25 executing program 1: syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0xa040) 04:38:25 executing program 3: syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)={[{@nr_blocks={'nr_blocks', 0x3d, [0x65]}}]}) 04:38:26 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) r3 = socket$kcm(0x29, 0x7, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xa, 0x2, 0x400, 0xc}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000140), &(0x7f00000000c0), 0x1081, r4}, 0x38) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000000480), 0x8) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000006c0)=@bpf_ext={0x1c, 0x6, &(0x7f0000000100)=@raw=[@initr0, @map={0x18, 0x3, 0x1, 0x0, r4}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}], 0x0, 0x1, 0xf8, &(0x7f0000000580)=""/248, 0x0, 0x18, [], 0x0, 0x0, r5, 0x8, &(0x7f0000000500)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000680)={0x0, 0x3, 0x32c96647, 0x9}, 0x10, 0x28c14, r2}, 0x78) sendmsg$kcm(r3, &(0x7f00000004c0)={&(0x7f00000003c0)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, 0x0, 0x0, &(0x7f0000000bc0)=[{0x58, 0x0, 0x0, "3d036b2fe1c920e033fd51a7135bc633687035d4990a07405974e24f3e4f5bc747dd8cb833517dba325fb8357ec60f4b737260519cbec967f1e58025da9b5821975edd2eb5ce0e"}, {0x20, 0x116, 0x100, "e12e82da376bca8fa03c53062e627e"}, {0x10, 0x0, 0xa11}, {0x88, 0x109, 0x0, "48dcf8c1cb65b735b2d5007004b54696aa2a8d0eb98210cf2936121163b1c0584580900f864f0ebc03ba1675bbb924fa22af1c7933e3ea0fe010ebefceaa2fd20e15b805012fd2d7a3e171a57996dc09dc5df4ce65f0c01e583247522e22d559c831115bca323aa68746a2dd9dc875023459b72ec5"}, {0x40, 0x88, 0x39, "e91254173524b71a6cf4982e471433e79bae7c4a781a2a354e5dcee630a99252345f0fe48a629be09093e130c018"}], 0x150}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000002c0)='block_bio_queue\x00'}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r1, 0x12, 0x1, 0x0, 0x0}, 0x20) r6 = openat$cgroup_ro(r0, &(0x7f0000000300)='cpuset.effective_mems\x00', 0x0, 0x0) openat$cgroup_freezer_state(r6, &(0x7f0000000380)='freezer.state\x00', 0x2, 0x0) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) socket$kcm(0x2b, 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a80)={0xffffffffffffffff, 0x0, 0x67, 0x62, &(0x7f0000000840)="f99a133c46d257d5200f326d0a5562cd17685e886bf2f9b3f9a2790348e08bc05a864a96cf5d232acf4d9c795667017ab2c3fa3c298204bcf30edef2ac8db7cbfdf4deae19c3fb8efa11f5d49f040b0731924ad772daa2861563518e94c736d15a5ac7a9872008", &(0x7f00000008c0)=""/98, 0x51a, 0x0, 0x1b, 0x0, &(0x7f0000000940)="5a4fa68ec2c72f99361b9b501348d1d5bce04f26173ed66a605e0c", &(0x7f0000000980)}, 0x48) 04:38:26 executing program 4: r0 = syz_open_dev$binderN(&(0x7f00000000c0)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000440)={0x48, 0x0, &(0x7f00000002c0)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, @register_looper], 0x50, 0x0, &(0x7f0000000380)="3f052248e8a74a4451d81d5163af1985a1032f92e0b3f906905059376e2a4351e2e5b4c303b41dd3800f132d9c604d8711a52d3e83be24ad4fafac11a1d6b0bd87ab1801264857d8cf4675ded788dffe"}) 04:38:26 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000000)=0x7, 0x4) 04:38:26 executing program 5: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) sendmsg$nfc_llcp(r0, &(0x7f00000013c0)={0x0, 0x0, &(0x7f0000000300)=[{0x0}, {0x0}], 0x2, &(0x7f0000002500)=ANY=[], 0x1010}, 0x0) 04:38:26 executing program 3: syz_open_procfs(0x0, &(0x7f0000000100)='timers\x00') 04:38:26 executing program 1: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(r0, 0xc4c85513, &(0x7f0000000080)={{0x8, 0x0, 0x0, 0x0, 'syz0\x00'}}) 04:38:26 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg(r0, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000000080)="4806f5145b8cf6caf9c309b424e3f137530e6018c7f0b6c7390f988998e62794a522f1764bacd736d12738e58a14d816310be0d2e12f2a32bd8736e27dcbf224dc0bc1a39c5a25c182707691c67dd8e90db1d724cd0aa2fd4416357041bdeb350cf6aea8c69c67871567d47ab45d416476f93af1322824f28bf2397d885b5307b8209ef09d4d650f25bf0af728e74a452ec1cd8d56b0f1ebeb0ddf76bcb4fa08b4f2ae7a66b64bf4f8c7fb1379f8fb7fa9ecc4af32d2d9f2a2349f15e5ee039964de4eae4aecc975cd0680dc80a2212b48bdc11e8b3174fcc80fa2", 0xdb}, {&(0x7f0000000180)="04a7b9ef579ffef34b322d5df1f4b521b97aa2223591cdb97785fb166885bdc9a08144ac345fd1d8122c2516a6512f8fa8c8594aca", 0x35}, {&(0x7f00000001c0)="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", 0xdb1}], 0x3}, 0x0) 04:38:26 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x31, &(0x7f0000000040)={0x88, {{0x2, 0x0, @multicast2}}}, 0x88) 04:38:26 executing program 4: syz_usb_connect$uac1(0x0, 0xb4, &(0x7f0000000100)=ANY=[@ANYBLOB="12010000000000206b1d01012700010203010902a200030100000009040000000101"], 0x0) syz_usb_connect$uac1(0x0, 0x71, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1d6b, 0x101, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5f, 0x3, 0x1, 0x0, 0x0, 0x0, {{}, {}, {0x9, 0x4, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x1, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}, {}, {0x9, 0x4, 0x2, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x82, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}}}}]}}, 0x0) 04:38:26 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x40000, &(0x7f00000003c0)) 04:38:26 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x49, 0x0, 0x0) 04:38:26 executing program 5: socketpair(0x29, 0x5, 0x0, &(0x7f0000000bc0)) [ 591.230971][ T19] usb 5-1: new high-speed USB device number 22 using dummy_hcd [ 591.471001][ T19] usb 5-1: Using ep0 maxpacket: 32 04:38:27 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) r3 = socket$kcm(0x29, 0x7, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xa, 0x2, 0x400, 0xc}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000140), &(0x7f00000000c0), 0x1081, r4}, 0x38) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000000480), 0x8) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000006c0)=@bpf_ext={0x1c, 0x6, &(0x7f0000000100)=@raw=[@initr0, @map={0x18, 0x3, 0x1, 0x0, r4}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}], 0x0, 0x1, 0xf8, &(0x7f0000000580)=""/248, 0x0, 0x18, [], 0x0, 0x0, r5, 0x8, &(0x7f0000000500)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000680)={0x0, 0x3, 0x32c96647, 0x9}, 0x10, 0x28c14, r2}, 0x78) sendmsg$kcm(r3, &(0x7f00000004c0)={&(0x7f00000003c0)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, 0x0, 0x0, &(0x7f0000000bc0)=[{0x58, 0x0, 0x0, "3d036b2fe1c920e033fd51a7135bc633687035d4990a07405974e24f3e4f5bc747dd8cb833517dba325fb8357ec60f4b737260519cbec967f1e58025da9b5821975edd2eb5ce0e"}, {0x20, 0x116, 0x100, "e12e82da376bca8fa03c53062e627e"}, {0x10, 0x0, 0xa11}, {0x88, 0x109, 0x0, "48dcf8c1cb65b735b2d5007004b54696aa2a8d0eb98210cf2936121163b1c0584580900f864f0ebc03ba1675bbb924fa22af1c7933e3ea0fe010ebefceaa2fd20e15b805012fd2d7a3e171a57996dc09dc5df4ce65f0c01e583247522e22d559c831115bca323aa68746a2dd9dc875023459b72ec5"}, {0x40, 0x88, 0x39, "e91254173524b71a6cf4982e471433e79bae7c4a781a2a354e5dcee630a99252345f0fe48a629be09093e130c018"}], 0x150}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000002c0)='block_bio_queue\x00'}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r1, 0x12, 0x1, 0x0, 0x0}, 0x20) r6 = openat$cgroup_ro(r0, &(0x7f0000000300)='cpuset.effective_mems\x00', 0x0, 0x0) openat$cgroup_freezer_state(r6, &(0x7f0000000380)='freezer.state\x00', 0x2, 0x0) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) socket$kcm(0x2b, 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a80)={0xffffffffffffffff, 0x0, 0x67, 0x62, &(0x7f0000000840)="f99a133c46d257d5200f326d0a5562cd17685e886bf2f9b3f9a2790348e08bc05a864a96cf5d232acf4d9c795667017ab2c3fa3c298204bcf30edef2ac8db7cbfdf4deae19c3fb8efa11f5d49f040b0731924ad772daa2861563518e94c736d15a5ac7a9872008", &(0x7f00000008c0)=""/98, 0x51a, 0x0, 0x1b, 0x0, &(0x7f0000000940)="5a4fa68ec2c72f99361b9b501348d1d5bce04f26173ed66a605e0c", &(0x7f0000000980)}, 0x48) 04:38:27 executing program 3: r0 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(r0, 0xc4c85513, &(0x7f0000000300)={{0x2, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x0, [0x2]}) 04:38:27 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) connect$netlink(r0, &(0x7f0000000100), 0xb) 04:38:27 executing program 1: socketpair(0x1e, 0x0, 0x6, &(0x7f0000000000)) 04:38:27 executing program 2: r0 = fsopen(&(0x7f0000000000)='nfsd\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) [ 591.591714][ T19] usb 5-1: config 1 has an invalid descriptor of length 0, skipping remainder of the config [ 591.601971][ T19] usb 5-1: config 1 has 1 interface, different from the descriptor's value: 3 04:38:27 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) connect$netlink(r0, &(0x7f0000000100), 0xb) 04:38:27 executing program 3: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vim2m\x00', 0x2, 0x0) ioctl$vim2m_VIDIOC_PREPARE_BUF(r0, 0xc058565d, &(0x7f00000000c0)={0x0, 0x2, 0x4, 0x0, 0x0, {0x77359400}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6a3a50c2"}, 0x0, 0x0, @planes=0x0}) 04:38:27 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) connect$netlink(r0, &(0x7f0000000100), 0xb) [ 591.821666][ T19] usb 5-1: New USB device found, idVendor=1d6b, idProduct=0101, bcdDevice= 0.27 [ 591.835284][ T19] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 591.850053][ T19] usb 5-1: Product: syz [ 591.857215][ T19] usb 5-1: Manufacturer: syz [ 591.868903][ T19] usb 5-1: SerialNumber: syz [ 592.125848][T24003] udc-core: couldn't find an available UDC or it's busy [ 592.135236][T24003] misc raw-gadget: fail, usb_gadget_probe_driver returned -16 [ 592.221836][ T19] usb 5-1: cannot find UAC_HEADER [ 592.228449][ T19] snd-usb-audio: probe of 5-1:1.0 failed with error -22 [ 592.243131][ T19] usb 5-1: USB disconnect, device number 22 [ 592.932974][ T19] usb 5-1: new high-speed USB device number 23 using dummy_hcd [ 593.200864][ T19] usb 5-1: Using ep0 maxpacket: 32 [ 593.351760][ T19] usb 5-1: config 1 has an invalid descriptor of length 0, skipping remainder of the config [ 593.361993][ T19] usb 5-1: config 1 has 1 interface, different from the descriptor's value: 3 [ 593.531495][ T19] usb 5-1: New USB device found, idVendor=1d6b, idProduct=0101, bcdDevice= 0.27 [ 593.540857][ T19] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 593.548916][ T19] usb 5-1: Product: syz [ 593.554435][ T19] usb 5-1: Manufacturer: syz [ 593.559080][ T19] usb 5-1: SerialNumber: syz 04:38:29 executing program 4: syz_usb_connect$uac1(0x0, 0xb4, &(0x7f0000000100)=ANY=[@ANYBLOB="12010000000000206b1d01012700010203010902a200030100000009040000000101"], 0x0) syz_usb_connect$uac1(0x0, 0x71, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1d6b, 0x101, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5f, 0x3, 0x1, 0x0, 0x0, 0x0, {{}, {}, {0x9, 0x4, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x1, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}, {}, {0x9, 0x4, 0x2, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x82, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}}}}]}}, 0x0) 04:38:29 executing program 1: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) setsockopt$inet6_dccp_buf(r0, 0x21, 0x0, 0x0, 0x0) 04:38:29 executing program 3: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_INFO(r0, 0xc0045520, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, [], [], [], 0x0, 0x0, 0x0, 0x0, "f013a7b77ab0932bdd1bab27788b31b3"}) 04:38:29 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) fstat(r0, &(0x7f0000000080)) 04:38:29 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) connect$netlink(r0, &(0x7f0000000100), 0xb) 04:38:29 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) r3 = socket$kcm(0x29, 0x7, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xa, 0x2, 0x400, 0xc}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000140), &(0x7f00000000c0), 0x1081, r4}, 0x38) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000000480), 0x8) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000006c0)=@bpf_ext={0x1c, 0x6, &(0x7f0000000100)=@raw=[@initr0, @map={0x18, 0x3, 0x1, 0x0, r4}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}], 0x0, 0x1, 0xf8, &(0x7f0000000580)=""/248, 0x0, 0x18, [], 0x0, 0x0, r5, 0x8, &(0x7f0000000500)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000680)={0x0, 0x3, 0x32c96647, 0x9}, 0x10, 0x28c14, r2}, 0x78) sendmsg$kcm(r3, &(0x7f00000004c0)={&(0x7f00000003c0)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, 0x0, 0x0, &(0x7f0000000bc0)=[{0x58, 0x0, 0x0, "3d036b2fe1c920e033fd51a7135bc633687035d4990a07405974e24f3e4f5bc747dd8cb833517dba325fb8357ec60f4b737260519cbec967f1e58025da9b5821975edd2eb5ce0e"}, {0x20, 0x116, 0x100, "e12e82da376bca8fa03c53062e627e"}, {0x10, 0x0, 0xa11}, {0x88, 0x109, 0x0, "48dcf8c1cb65b735b2d5007004b54696aa2a8d0eb98210cf2936121163b1c0584580900f864f0ebc03ba1675bbb924fa22af1c7933e3ea0fe010ebefceaa2fd20e15b805012fd2d7a3e171a57996dc09dc5df4ce65f0c01e583247522e22d559c831115bca323aa68746a2dd9dc875023459b72ec5"}, {0x40, 0x88, 0x39, "e91254173524b71a6cf4982e471433e79bae7c4a781a2a354e5dcee630a99252345f0fe48a629be09093e130c018"}], 0x150}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000002c0)='block_bio_queue\x00'}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r1, 0x12, 0x1, 0x0, 0x0}, 0x20) r6 = openat$cgroup_ro(r0, &(0x7f0000000300)='cpuset.effective_mems\x00', 0x0, 0x0) openat$cgroup_freezer_state(r6, &(0x7f0000000380)='freezer.state\x00', 0x2, 0x0) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) socket$kcm(0x2b, 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a80)={0xffffffffffffffff, 0x0, 0x67, 0x62, &(0x7f0000000840)="f99a133c46d257d5200f326d0a5562cd17685e886bf2f9b3f9a2790348e08bc05a864a96cf5d232acf4d9c795667017ab2c3fa3c298204bcf30edef2ac8db7cbfdf4deae19c3fb8efa11f5d49f040b0731924ad772daa2861563518e94c736d15a5ac7a9872008", &(0x7f00000008c0)=""/98, 0x51a, 0x0, 0x1b, 0x0, &(0x7f0000000940)="5a4fa68ec2c72f99361b9b501348d1d5bce04f26173ed66a605e0c", &(0x7f0000000980)}, 0x48) [ 593.880934][ T19] usb 5-1: cannot find UAC_HEADER [ 593.886565][ T19] snd-usb-audio: probe of 5-1:1.0 failed with error -22 04:38:29 executing program 5: r0 = syz_usb_connect$cdc_ncm(0x0, 0x6e, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x20, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5c, 0x2, 0x1, 0x2, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}}, {{0x9, 0x5, 0x81, 0x3, 0x10}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x10}}, {{0x9, 0x5, 0x3, 0x2, 0x3ff}}}}}}}]}}, 0x0) syz_usb_control_io$cdc_ncm(r0, &(0x7f0000000540)={0x14, 0x0, &(0x7f0000000500)={0x0, 0x3, 0x1a, {0x1a}}}, 0x0) syz_usb_control_io$cdc_ncm(r0, 0x0, 0x0) 04:38:29 executing program 3: fanotify_mark(0xffffffffffffffff, 0x11, 0x40000027, 0xffffffffffffffff, 0x0) [ 593.927211][ T19] usb 5-1: USB disconnect, device number 23 04:38:29 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) fcntl$dupfd(r0, 0x635b0e516bde6cf7, 0xffffffffffffffff) 04:38:29 executing program 2: r0 = socket(0x11, 0x2, 0x0) recvfrom$llc(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 04:38:29 executing program 3: syz_emit_ethernet(0x9a, &(0x7f0000000000)={@empty=[0xff], @broadcast, @void, {@ipv6={0x86dd, @udp={0x0, 0x6, "8ac406", 0x64, 0x11, 0x0, @private1, @loopback, {[], {0x0, 0x0, 0x64, 0x0, @wg=@response={0x2, 0x0, 0x0, "a063ebb4b7bac3d4c7916f6c48c787becf8b9455bec2136437a7fb33b91db1b9", "38edb3fdf226776c431a592cfebd66d0", {"b3817720f91e63e201d8cf9908a20759", "89bdbb9acfb33e22e7d8384774e2b3ae"}}}}}}}}, 0x0) 04:38:29 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000040)='devlink\x00', 0xffffffffffffffff) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x0, 0x0, {}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}, {0xc}, {0xc}}]}, 0x54}}, 0x0) [ 594.330847][ T19] usb 5-1: new high-speed USB device number 24 using dummy_hcd [ 594.338568][ T36] usb 6-1: new high-speed USB device number 103 using dummy_hcd [ 594.580796][ T36] usb 6-1: Using ep0 maxpacket: 32 [ 594.586063][ T19] usb 5-1: Using ep0 maxpacket: 32 [ 594.712361][ T36] usb 6-1: config 1 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 594.724210][ T19] usb 5-1: config 1 has an invalid descriptor of length 0, skipping remainder of the config [ 594.734498][ T19] usb 5-1: config 1 has 1 interface, different from the descriptor's value: 3 [ 594.746105][ T36] usb 6-1: config 1 interface 1 altsetting 1 bulk endpoint 0x82 has invalid maxpacket 16 [ 594.757168][ T36] usb 6-1: config 1 interface 1 altsetting 1 bulk endpoint 0x3 has invalid maxpacket 1023 [ 594.910867][ T19] usb 5-1: New USB device found, idVendor=1d6b, idProduct=0101, bcdDevice= 0.27 [ 594.922421][ T36] usb 6-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 594.931793][ T19] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 594.939925][ T36] usb 6-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 594.950185][ T19] usb 5-1: Product: syz [ 594.955185][ T19] usb 5-1: Manufacturer: syz [ 594.959932][ T36] usb 6-1: Product: syz [ 594.965438][ T19] usb 5-1: SerialNumber: syz [ 594.970169][ T36] usb 6-1: Manufacturer: syz [ 594.978315][ T36] usb 6-1: SerialNumber: syz [ 595.247464][T24068] udc-core: couldn't find an available UDC or it's busy [ 595.254699][T24068] misc raw-gadget: fail, usb_gadget_probe_driver returned -16 [ 595.350862][ T19] usb 5-1: cannot find UAC_HEADER [ 595.356529][ T19] snd-usb-audio: probe of 5-1:1.0 failed with error -22 [ 595.369291][ T19] usb 5-1: USB disconnect, device number 24 [ 595.443419][T24078] raw-gadget gadget: fail, usb_ep_enable returned -22 [ 595.451533][T24078] raw-gadget gadget: fail, usb_ep_enable returned -22 [ 595.700851][ T36] cdc_ncm 6-1:1.0: bind() failure [ 595.720853][ T36] cdc_ncm: probe of 6-1:1.1 failed with error -71 [ 595.741119][ T36] cdc_mbim: probe of 6-1:1.1 failed with error -71 04:38:31 executing program 4: syz_usb_connect$uac1(0x0, 0xb4, &(0x7f0000000100)=ANY=[@ANYBLOB="12010000000000206b1d01012700010203010902a200030100000009040000000101"], 0x0) syz_usb_connect$uac1(0x0, 0x71, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1d6b, 0x101, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5f, 0x3, 0x1, 0x0, 0x0, 0x0, {{}, {}, {0x9, 0x4, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x1, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}, {}, {0x9, 0x4, 0x2, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x82, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}}}}]}}, 0x0) 04:38:31 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000040)='devlink\x00', 0xffffffffffffffff) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x0, 0x0, {}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}, {0xc}, {0xc}}]}, 0x54}}, 0x0) 04:38:31 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000040)='devlink\x00', 0xffffffffffffffff) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x0, 0x0, {}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}, {0xc}, {0xc}}]}, 0x54}}, 0x0) 04:38:31 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) r3 = socket$kcm(0x29, 0x7, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xa, 0x2, 0x400, 0xc}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000140), &(0x7f00000000c0), 0x1081, r4}, 0x38) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000000480), 0x8) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000006c0)=@bpf_ext={0x1c, 0x6, &(0x7f0000000100)=@raw=[@initr0, @map={0x18, 0x3, 0x1, 0x0, r4}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}], 0x0, 0x1, 0xf8, &(0x7f0000000580)=""/248, 0x0, 0x18, [], 0x0, 0x0, r5, 0x8, &(0x7f0000000500)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000680)={0x0, 0x3, 0x32c96647, 0x9}, 0x10, 0x28c14, r2}, 0x78) sendmsg$kcm(r3, &(0x7f00000004c0)={&(0x7f00000003c0)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, 0x0, 0x0, &(0x7f0000000bc0)=[{0x10, 0x0, 0x3f}, {0x20, 0x116, 0x100, "e12e82da376bca8fa03c53062e627e"}, {0x10, 0x0, 0xa11}, {0x88, 0x109, 0x0, "48dcf8c1cb65b735b2d5007004b54696aa2a8d0eb98210cf2936121163b1c0584580900f864f0ebc03ba1675bbb924fa22af1c7933e3ea0fe010ebefceaa2fd20e15b805012fd2d7a3e171a57996dc09dc5df4ce65f0c01e583247522e22d559c831115bca323aa68746a2dd9dc875023459b72ec5"}, {0x40, 0x88, 0x39, "e91254173524b71a6cf4982e471433e79bae7c4a781a2a354e5dcee630a99252345f0fe48a629be09093e130c018"}], 0x108}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000002c0)='block_bio_queue\x00'}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r1, 0x12, 0x1, 0x0, 0x0}, 0x20) r6 = openat$cgroup_ro(r0, &(0x7f0000000300)='cpuset.effective_mems\x00', 0x0, 0x0) openat$cgroup_freezer_state(r6, &(0x7f0000000380)='freezer.state\x00', 0x2, 0x0) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) socket$kcm(0x2b, 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a80)={0xffffffffffffffff, 0x0, 0x67, 0x62, &(0x7f0000000840)="f99a133c46d257d5200f326d0a5562cd17685e886bf2f9b3f9a2790348e08bc05a864a96cf5d232acf4d9c795667017ab2c3fa3c298204bcf30edef2ac8db7cbfdf4deae19c3fb8efa11f5d49f040b0731924ad772daa2861563518e94c736d15a5ac7a9872008", &(0x7f00000008c0)=""/98, 0x51a, 0x0, 0x1b, 0x0, &(0x7f0000000940)="5a4fa68ec2c72f99361b9b501348d1d5bce04f26173ed66a605e0c", &(0x7f0000000980)}, 0x48) 04:38:31 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8921, &(0x7f0000000000)={'batadv0\x00'}) [ 595.760958][ T36] usbtest: probe of 6-1:1.1 failed with error -71 [ 595.770344][ T36] usb 6-1: USB disconnect, device number 103 04:38:31 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000040)='devlink\x00', 0xffffffffffffffff) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x0, 0x0, {}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}, {0xc}, {0xc}}]}, 0x54}}, 0x0) [ 596.170705][ T19] usb 5-1: new high-speed USB device number 25 using dummy_hcd [ 596.420693][ T19] usb 5-1: Using ep0 maxpacket: 32 [ 596.450694][ T36] usb 6-1: new high-speed USB device number 104 using dummy_hcd [ 596.541813][ T19] usb 5-1: config 1 has an invalid descriptor of length 0, skipping remainder of the config [ 596.552115][ T19] usb 5-1: config 1 has 1 interface, different from the descriptor's value: 3 [ 596.690698][ T36] usb 6-1: Using ep0 maxpacket: 32 [ 596.721472][ T19] usb 5-1: New USB device found, idVendor=1d6b, idProduct=0101, bcdDevice= 0.27 [ 596.731324][ T19] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 596.739399][ T19] usb 5-1: Product: syz [ 596.745377][ T19] usb 5-1: Manufacturer: syz [ 596.750135][ T19] usb 5-1: SerialNumber: syz [ 596.811474][ T36] usb 6-1: config 1 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 596.822489][ T36] usb 6-1: config 1 interface 1 altsetting 1 bulk endpoint 0x82 has invalid maxpacket 16 [ 596.834350][ T36] usb 6-1: config 1 interface 1 altsetting 1 bulk endpoint 0x3 has invalid maxpacket 1023 [ 597.001666][ T36] usb 6-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 597.014823][T24129] udc-core: couldn't find an available UDC or it's busy [ 597.022101][T24129] misc raw-gadget: fail, usb_gadget_probe_driver returned -16 [ 597.029725][ T36] usb 6-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 04:38:32 executing program 5: r0 = fsopen(&(0x7f0000000040)='minix\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) 04:38:32 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_GET_DEST(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x14}, 0x14}, 0x300}, 0x0) 04:38:32 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000040)='devlink\x00', 0xffffffffffffffff) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x0, 0x0, {}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}, {0xc}, {0xc}}]}, 0x54}}, 0x0) 04:38:32 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000040)='devlink\x00', 0xffffffffffffffff) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x0, 0x0, {}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}, {0xc}, {0xc}}]}, 0x54}}, 0x0) 04:38:32 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) r3 = socket$kcm(0x29, 0x7, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xa, 0x2, 0x400, 0xc}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000140), &(0x7f00000000c0), 0x1081, r4}, 0x38) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000000480), 0x8) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000006c0)=@bpf_ext={0x1c, 0x6, &(0x7f0000000100)=@raw=[@initr0, @map={0x18, 0x3, 0x1, 0x0, r4}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}], 0x0, 0x1, 0xf8, &(0x7f0000000580)=""/248, 0x0, 0x18, [], 0x0, 0x0, r5, 0x8, &(0x7f0000000500)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000680)={0x0, 0x3, 0x32c96647, 0x9}, 0x10, 0x28c14, r2}, 0x78) sendmsg$kcm(r3, &(0x7f00000004c0)={&(0x7f00000003c0)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, 0x0, 0x0, &(0x7f0000000bc0)=[{0x10, 0x0, 0x3f}, {0x20, 0x116, 0x100, "e12e82da376bca8fa03c53062e627e"}, {0x10, 0x0, 0xa11}, {0x88, 0x109, 0x0, "48dcf8c1cb65b735b2d5007004b54696aa2a8d0eb98210cf2936121163b1c0584580900f864f0ebc03ba1675bbb924fa22af1c7933e3ea0fe010ebefceaa2fd20e15b805012fd2d7a3e171a57996dc09dc5df4ce65f0c01e583247522e22d559c831115bca323aa68746a2dd9dc875023459b72ec5"}, {0x40, 0x88, 0x39, "e91254173524b71a6cf4982e471433e79bae7c4a781a2a354e5dcee630a99252345f0fe48a629be09093e130c018"}], 0x108}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000002c0)='block_bio_queue\x00'}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r1, 0x12, 0x1, 0x0, 0x0}, 0x20) r6 = openat$cgroup_ro(r0, &(0x7f0000000300)='cpuset.effective_mems\x00', 0x0, 0x0) openat$cgroup_freezer_state(r6, &(0x7f0000000380)='freezer.state\x00', 0x2, 0x0) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) socket$kcm(0x2b, 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a80)={0xffffffffffffffff, 0x0, 0x67, 0x62, &(0x7f0000000840)="f99a133c46d257d5200f326d0a5562cd17685e886bf2f9b3f9a2790348e08bc05a864a96cf5d232acf4d9c795667017ab2c3fa3c298204bcf30edef2ac8db7cbfdf4deae19c3fb8efa11f5d49f040b0731924ad772daa2861563518e94c736d15a5ac7a9872008", &(0x7f00000008c0)=""/98, 0x51a, 0x0, 0x1b, 0x0, &(0x7f0000000940)="5a4fa68ec2c72f99361b9b501348d1d5bce04f26173ed66a605e0c", &(0x7f0000000980)}, 0x48) [ 597.052293][ T36] usb 6-1: Product: syz [ 597.056626][ T36] usb 6-1: Manufacturer: syz [ 597.062706][ T36] usb 6-1: SerialNumber: syz [ 597.101012][ T36] usb 6-1: can't set config #1, error -71 [ 597.125750][ T36] usb 6-1: USB disconnect, device number 104 [ 597.140738][ T19] usb 5-1: cannot find UAC_HEADER [ 597.146372][ T19] snd-usb-audio: probe of 5-1:1.0 failed with error -22 04:38:32 executing program 3: r0 = syz_open_dev$vbi(&(0x7f0000000100)='/dev/vbi#\x00', 0x2, 0x2) ioctl$VIDIOC_QBUF(r0, 0xc058560f, &(0x7f0000000140)={0x0, 0x5, 0x4, 0x0, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "ffcab2d3"}, 0x0, 0x0, @userptr}) [ 597.178578][ T19] usb 5-1: USB disconnect, device number 25 04:38:33 executing program 4: syz_usb_connect$uac1(0x0, 0xb4, &(0x7f0000000100)=ANY=[@ANYBLOB="12010000000000206b1d01012700010203010902a200030100000009040000000101"], 0x0) syz_usb_connect$uac1(0x0, 0x71, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1d6b, 0x101, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5f, 0x3, 0x1, 0x0, 0x0, 0x0, {{}, {}, {0x9, 0x4, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x1, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}, {}, {0x9, 0x4, 0x2, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x82, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}}}}]}}, 0x0) 04:38:33 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x14) 04:38:33 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0xc, 0x0, 0x0) 04:38:33 executing program 3: r0 = syz_open_dev$vbi(&(0x7f0000000100)='/dev/vbi#\x00', 0x2, 0x2) ioctl$VIDIOC_QBUF(r0, 0xc058560f, &(0x7f0000000140)={0x0, 0x5, 0x4, 0x0, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "ffcab2d3"}, 0x0, 0x0, @userptr}) 04:38:33 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000040)='devlink\x00', 0xffffffffffffffff) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x0, 0x0, {}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}, {0xc}, {0xc}}]}, 0x54}}, 0x0) 04:38:33 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r0, 0x89fb, &(0x7f0000000380)={'ip6_vti0\x00', 0x0}) 04:38:33 executing program 3: r0 = syz_open_dev$vbi(&(0x7f0000000100)='/dev/vbi#\x00', 0x2, 0x2) ioctl$VIDIOC_QBUF(r0, 0xc058560f, &(0x7f0000000140)={0x0, 0x5, 0x4, 0x0, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "ffcab2d3"}, 0x0, 0x0, @userptr}) 04:38:33 executing program 5: socket$packet(0x11, 0x2, 0x300) syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00', 0xffffffffffffffff) 04:38:33 executing program 3: r0 = syz_open_dev$vbi(&(0x7f0000000100)='/dev/vbi#\x00', 0x2, 0x2) ioctl$VIDIOC_QBUF(r0, 0xc058560f, &(0x7f0000000140)={0x0, 0x5, 0x4, 0x0, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "ffcab2d3"}, 0x0, 0x0, @userptr}) 04:38:33 executing program 2: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f0000000200)=0x1) 04:38:33 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) r3 = socket$kcm(0x29, 0x7, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xa, 0x2, 0x400, 0xc}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000140), &(0x7f00000000c0), 0x1081, r4}, 0x38) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000000480), 0x8) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000006c0)=@bpf_ext={0x1c, 0x6, &(0x7f0000000100)=@raw=[@initr0, @map={0x18, 0x3, 0x1, 0x0, r4}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}], 0x0, 0x1, 0xf8, &(0x7f0000000580)=""/248, 0x0, 0x18, [], 0x0, 0x0, r5, 0x8, &(0x7f0000000500)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000680)={0x0, 0x3, 0x32c96647, 0x9}, 0x10, 0x28c14, r2}, 0x78) sendmsg$kcm(r3, &(0x7f00000004c0)={&(0x7f00000003c0)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, 0x0, 0x0, &(0x7f0000000bc0)=[{0x10, 0x0, 0x3f}, {0x20, 0x116, 0x100, "e12e82da376bca8fa03c53062e627e"}, {0x10, 0x0, 0xa11}, {0x88, 0x109, 0x0, "48dcf8c1cb65b735b2d5007004b54696aa2a8d0eb98210cf2936121163b1c0584580900f864f0ebc03ba1675bbb924fa22af1c7933e3ea0fe010ebefceaa2fd20e15b805012fd2d7a3e171a57996dc09dc5df4ce65f0c01e583247522e22d559c831115bca323aa68746a2dd9dc875023459b72ec5"}, {0x40, 0x88, 0x39, "e91254173524b71a6cf4982e471433e79bae7c4a781a2a354e5dcee630a99252345f0fe48a629be09093e130c018"}], 0x108}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000002c0)='block_bio_queue\x00'}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r1, 0x12, 0x1, 0x0, 0x0}, 0x20) r6 = openat$cgroup_ro(r0, &(0x7f0000000300)='cpuset.effective_mems\x00', 0x0, 0x0) openat$cgroup_freezer_state(r6, &(0x7f0000000380)='freezer.state\x00', 0x2, 0x0) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) socket$kcm(0x2b, 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a80)={0xffffffffffffffff, 0x0, 0x67, 0x62, &(0x7f0000000840)="f99a133c46d257d5200f326d0a5562cd17685e886bf2f9b3f9a2790348e08bc05a864a96cf5d232acf4d9c795667017ab2c3fa3c298204bcf30edef2ac8db7cbfdf4deae19c3fb8efa11f5d49f040b0731924ad772daa2861563518e94c736d15a5ac7a9872008", &(0x7f00000008c0)=""/98, 0x51a, 0x0, 0x1b, 0x0, &(0x7f0000000940)="5a4fa68ec2c72f99361b9b501348d1d5bce04f26173ed66a605e0c", &(0x7f0000000980)}, 0x48) 04:38:33 executing program 1: sendmsg$netlink(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, &(0x7f0000002080)=[{&(0x7f0000000b40)={0x110, 0x0, 0x0, 0x0, 0x0, "", [@nested={0xfd, 0x0, 0x0, 0x1, [@generic="8396fb724abac20282e50cce92ca920ce40018673731b6ff4b494dff5eab092e439e2eabb2550bf0f9a9d7a77ed8f1aa025a359f408c78b3caa03202072d707637cb60f46bcca165f02fb936a311c5fd1657c90b194ae79eb0115a09e1f7eaca9a1a4921ca070d9d51ad5d559e99fa0ca29781660c3a6acd1943a6c23dc8cfbe0ee7f5dba3c76e5fc071262bd96e018ab819bb3927917d7ee12365270feae9de5377e4f5e750e5b88e1338fc3e79eddb92ed8dd43a05fd9103419f692fb8dccb8a5fa407ea456f7b25a34215", @generic="1682a1809c908c8127ca32544b930dce719ac55ad3766846e80e2f91cff5bc2dfe684a961cc44815d39d41284d"]}]}, 0x110}], 0x1}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000c40)={0x0}, 0x10) [ 598.010603][ T36] usb 5-1: new high-speed USB device number 26 using dummy_hcd [ 598.250601][ T36] usb 5-1: Using ep0 maxpacket: 32 [ 598.371282][ T36] usb 5-1: config 1 has an invalid descriptor of length 0, skipping remainder of the config [ 598.381638][ T36] usb 5-1: config 1 has 1 interface, different from the descriptor's value: 3 [ 598.551387][ T36] usb 5-1: New USB device found, idVendor=1d6b, idProduct=0101, bcdDevice= 0.27 [ 598.560619][ T36] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 598.568710][ T36] usb 5-1: Product: syz [ 598.574874][ T36] usb 5-1: Manufacturer: syz [ 598.579584][ T36] usb 5-1: SerialNumber: syz [ 598.838405][T24183] udc-core: couldn't find an available UDC or it's busy [ 598.845573][T24183] misc raw-gadget: fail, usb_gadget_probe_driver returned -16 [ 598.940645][ T36] usb 5-1: cannot find UAC_HEADER [ 598.946164][ T36] snd-usb-audio: probe of 5-1:1.0 failed with error -22 [ 598.960378][ T36] usb 5-1: USB disconnect, device number 26 04:38:35 executing program 5: clone(0x20800500, 0x0, 0x0, 0x0, 0x0) 04:38:35 executing program 3: r0 = add_key$keyring(&(0x7f0000000680)='keyring\x00', &(0x7f00000006c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) request_key(&(0x7f0000000900)='trusted\x00', &(0x7f0000000940)={'syz', 0x3}, 0x0, r0) 04:38:35 executing program 2: getgroups(0x1, &(0x7f0000000080)=[0xee00]) 04:38:35 executing program 1: add_key$fscrypt_provisioning(&(0x7f0000000100)='fscrypt-provisioning\x00', &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) 04:38:35 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) r3 = socket$kcm(0x29, 0x7, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xa, 0x2, 0x400, 0xc}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000140), &(0x7f00000000c0), 0x1081, r4}, 0x38) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000000480), 0x8) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000006c0)=@bpf_ext={0x1c, 0x6, &(0x7f0000000100)=@raw=[@initr0, @map={0x18, 0x3, 0x1, 0x0, r4}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}], 0x0, 0x1, 0xf8, &(0x7f0000000580)=""/248, 0x0, 0x18, [], 0x0, 0x0, r5, 0x8, &(0x7f0000000500)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000680)={0x0, 0x3, 0x32c96647, 0x9}, 0x10, 0x28c14, r2}, 0x78) sendmsg$kcm(r3, &(0x7f00000004c0)={&(0x7f00000003c0)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, 0x0, 0x0, &(0x7f0000000bc0)=[{0x38, 0x0, 0x3f, "3d036b2fe1c920e033fd51a7135bc633687035d4990a07405974e24f3e4f5bc747dd8cb8"}, {0x20, 0x116, 0x100, "e12e82da376bca8fa03c53062e627e"}, {0x10, 0x0, 0xa11}, {0x88, 0x109, 0x0, "48dcf8c1cb65b735b2d5007004b54696aa2a8d0eb98210cf2936121163b1c0584580900f864f0ebc03ba1675bbb924fa22af1c7933e3ea0fe010ebefceaa2fd20e15b805012fd2d7a3e171a57996dc09dc5df4ce65f0c01e583247522e22d559c831115bca323aa68746a2dd9dc875023459b72ec5"}, {0x40, 0x88, 0x39, "e91254173524b71a6cf4982e471433e79bae7c4a781a2a354e5dcee630a99252345f0fe48a629be09093e130c018"}], 0x130}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000002c0)='block_bio_queue\x00'}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r1, 0x12, 0x1, 0x0, 0x0}, 0x20) r6 = openat$cgroup_ro(r0, &(0x7f0000000300)='cpuset.effective_mems\x00', 0x0, 0x0) openat$cgroup_freezer_state(r6, &(0x7f0000000380)='freezer.state\x00', 0x2, 0x0) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) socket$kcm(0x2b, 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a80)={0xffffffffffffffff, 0x0, 0x67, 0x62, &(0x7f0000000840)="f99a133c46d257d5200f326d0a5562cd17685e886bf2f9b3f9a2790348e08bc05a864a96cf5d232acf4d9c795667017ab2c3fa3c298204bcf30edef2ac8db7cbfdf4deae19c3fb8efa11f5d49f040b0731924ad772daa2861563518e94c736d15a5ac7a9872008", &(0x7f00000008c0)=""/98, 0x51a, 0x0, 0x1b, 0x0, &(0x7f0000000940)="5a4fa68ec2c72f99361b9b501348d1d5bce04f26173ed66a605e0c", &(0x7f0000000980)}, 0x48) 04:38:35 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x9) sendmsg$GTP_CMD_GETPDP(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)={0x14}, 0x14}}, 0x0) 04:38:35 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:38:35 executing program 5: r0 = socket(0x11, 0x800000003, 0x0) r1 = socket(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000600)={'team0\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newqdisc={0x40, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_fq={{0x7, 0x1, 'fq\x00'}, {0x14, 0x2, [@TCA_FQ_FLOW_DEFAULT_RATE={0x8}, @TCA_FQ_FLOW_REFILL_DELAY={0x8}]}}]}, 0x40}}, 0x0) 04:38:35 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x20002000, &(0x7f0000000000/0x2000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, &(0x7f0000000000)={0x5, 0xbd2, 0x34e, 0xfffffffb, 0x0, "40982e07edea9e639ae175ca5fa75576a4cf88"}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) memfd_create(&(0x7f0000000080)='/+!%/\x00', 0x5) r4 = syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{0x0}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r4, &(0x7f0000000980)='./file3\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0xf154, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat(r4, &(0x7f0000000100)='./file3\x00', r4, &(0x7f0000000200)='./file0\x00') pipe(&(0x7f0000000080)={0xffffffffffffffff}) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff}) vmsplice(r6, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) syz_kvm_setup_cpu$x86(r5, r6, &(0x7f000060e000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="66e403baa100ecf30f1efa6766c7442400000000006766c7442402000000006766c744240600000000670f011c242e0faefef48218dc0f01dfba4300b80050ef66b8010000000f01d9", 0x49}], 0x1, 0x21, &(0x7f00000002c0)=[@flags={0x3, 0x80000}, @dstype0={0x6, 0x2}], 0x2) openat$fuse(0xffffffffffffff9c, 0x0, 0x42, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) 04:38:35 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0x48, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @ipv4={[], [], @private=0xa010102}}, @in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6={0xa, 0x0, 0x0, @private2}]}, &(0x7f0000000100)=0x10) [ 599.623907][T24236] sch_fq: defrate 0 ignored. 04:38:35 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f00000001c0)={&(0x7f0000000140)={0x2}, 0xc, &(0x7f0000000040)={0x0}}, 0x0) 04:38:35 executing program 1: clock_gettime(0x0, &(0x7f00000016c0)={0x0, 0x0}) select(0x40, &(0x7f0000001600), &(0x7f0000001640), &(0x7f0000001680)={0x1ff}, &(0x7f0000001700)={0x0, r0/1000+10000}) 04:38:35 executing program 5: r0 = socket(0x11, 0x800000003, 0x0) r1 = socket(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000600)={'team0\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newqdisc={0x40, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_fq={{0x7, 0x1, 'fq\x00'}, {0x14, 0x2, [@TCA_FQ_FLOW_DEFAULT_RATE={0x8}, @TCA_FQ_FLOW_REFILL_DELAY={0x8}]}}]}, 0x40}}, 0x0) [ 599.664712][T24236] sch_fq: defrate 0 ignored. 04:38:35 executing program 5: r0 = socket(0x11, 0x800000003, 0x0) r1 = socket(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000600)={'team0\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newqdisc={0x40, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_fq={{0x7, 0x1, 'fq\x00'}, {0x14, 0x2, [@TCA_FQ_FLOW_DEFAULT_RATE={0x8}, @TCA_FQ_FLOW_REFILL_DELAY={0x8}]}}]}, 0x40}}, 0x0) [ 599.758251][T24245] sch_fq: defrate 0 ignored. 04:38:35 executing program 5: r0 = socket(0x11, 0x800000003, 0x0) r1 = socket(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000600)={'team0\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newqdisc={0x40, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_fq={{0x7, 0x1, 'fq\x00'}, {0x14, 0x2, [@TCA_FQ_FLOW_DEFAULT_RATE={0x8}, @TCA_FQ_FLOW_REFILL_DELAY={0x8}]}}]}, 0x40}}, 0x0) [ 599.845688][T24250] sch_fq: defrate 0 ignored. 04:38:35 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000200)='\xcfF\'\x02r\x1f\x9f\x02\x8b\x06}r\x9dq\xed\x82\xf1\x0f\n\x9e\x04\x00\x00\x00\x9d?\xb4\xdc\x10Uk\xf9\x99\x9b8\x92\xd7\xd7\x15p\xc4\xce\x1a\xa40\x7f\x8cc^!t\xc9l\x84\x92\x92w\xec\xd0\xc4\xf4\xc2\'\x82\x1b3\xe5%\xbb\x04\xd2a\xec\xb3_\xd4\x9f\x8cb\'^T,\xfd=\xc6\bku\x1f2\x87r\x10\xb2O\x1f\xc0\x1cgv\xa8\x83\x03\xa8\r\xb3\xfe\xd6\xf1\xef\xa2o&\xc7\xcd\xa9_\x1d\xf0\xff\xfb\xdfVaa\x1c\xa6!\xe1G!\r\xcd\xb39\x1d$\nz\xa5/y\xe7\xa7\xecf\xb8G\x97_\xb6\xc4\xd8\xa4b\xc5\xf5\xb7\x1a\xd1\xb9j)0\\\xbd5\xe3\xa8\x83\xf3Xp\x872Q\xa5$P\xeed\x7f\x06\x7f\x9d\x7f\x8c\x8c^X\x1a/\xae\xfaE\xb1\xe8\x15]\x98\x11\x1b\xc4\xf7\b\x98!\xf7\xe5\xb7+\xfdf\x8f\xcb\xd9\xbc\xd2)v<\xde\xb9\xed\xd4\xd6\xb5\xa0\xff\x80\x986\xad@\xc1\xe31\xbf\xd5\x16V\xafTKq\xbb\x0ex5\xe0\xe6\xf0&\xd7\x94\xecD\x03\x0f/\xc6]!g,\x01ZT\x14#\x1f\tp6\xe4J_\xc02\x8az\xe2zL\x83d\xd1d\xa2\xe02]\xba\xb9f\xa72J\xaf\xf5\xdc\xe8\x14f)=\xbcZ\x9a\xbf\xe1:=VY\xd6\xc3%\xa8{\x12\x95(uOsda\x8e\x85\x86z\xd3\xf2\xbc%3\xbd\xed\xd1\xbf\xe0k\xc5\xce?\xaeBJb\x8b8\x81\xd7\xed\xcfr\x91\x03}1\xb4\x8c\xab\"\xb9\xe4\xc4\x13)cfg\xdfNr\x7fL4\b\a\xb6\xd2\vU\x90\r$&ghD<\xa9\x03\x89A\xd4\ag|A\x87\x16b\xeb\xc6>|\x0fs7~:\x18\xda\x06\xc5R\xab\x8d~\xe8iz\xa3E\xf2u\xda\xb5\xc18\xf3\xc3\xfb\xfa\xa6\',\x92\xc6\x1eHg\x1a0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000000)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private0}, r1}}, 0x30) 04:38:36 executing program 1: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_FILL_RING(r0, 0x11b, 0x5, &(0x7f00000000c0)=0x840, 0x4) 04:38:36 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x20002000, &(0x7f0000000000/0x2000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, &(0x7f0000000000)={0x5, 0xbd2, 0x34e, 0xfffffffb, 0x0, "40982e07edea9e639ae175ca5fa75576a4cf88"}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) memfd_create(&(0x7f0000000080)='/+!%/\x00', 0x5) r4 = syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{0x0}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r4, &(0x7f0000000980)='./file3\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0xf154, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat(r4, &(0x7f0000000100)='./file3\x00', r4, &(0x7f0000000200)='./file0\x00') pipe(&(0x7f0000000080)={0xffffffffffffffff}) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff}) vmsplice(r6, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) syz_kvm_setup_cpu$x86(r5, r6, &(0x7f000060e000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="66e403baa100ecf30f1efa6766c7442400000000006766c7442402000000006766c744240600000000670f011c242e0faefef48218dc0f01dfba4300b80050ef66b8010000000f01d9", 0x49}], 0x1, 0x21, &(0x7f00000002c0)=[@flags={0x3, 0x80000}, @dstype0={0x6, 0x2}], 0x2) openat$fuse(0xffffffffffffff9c, 0x0, 0x42, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) 04:38:36 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0x48, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @ipv4={[], [], @private=0xa010102}}, @in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6={0xa, 0x0, 0x0, @private2}]}, &(0x7f0000000100)=0x10) 04:38:36 executing program 5: syz_open_dev$sg(&(0x7f00000001c0)='/dev/sg#\x00', 0x0, 0x0) 04:38:36 executing program 1: r0 = io_uring_setup(0x133, &(0x7f0000000000)) mmap$IORING_OFF_SQES(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x13, r0, 0x10000000) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0x51, r0, 0x10006000) 04:38:36 executing program 2: r0 = fanotify_init(0x0, 0x0) fanotify_mark(r0, 0xe, 0x20, 0xffffffffffffffff, 0x0) 04:38:36 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) 04:38:36 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x23, &(0x7f0000006a00)={@local}, 0x2) 04:38:36 executing program 5: r0 = syz_open_dev$binderN(&(0x7f00000000c0)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000440)={0x48, 0x0, &(0x7f00000002c0)=[@transaction={0x40406300, {0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, @register_looper], 0x50, 0x0, &(0x7f0000000380)="3f052248e8a74a4451d81d5163af1985a1032f92e0b3f906905059376e2a4351e2e5b4c303b41dd3800f132d9c604d8711a52d3e83be24ad4fafac11a1d6b0bd87ab1801264857d8cf4675ded788dffe"}) 04:38:36 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) r3 = socket$kcm(0x29, 0x7, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xa, 0x2, 0x400, 0xc}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000140), &(0x7f00000000c0), 0x1081, r4}, 0x38) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000000480), 0x8) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000006c0)=@bpf_ext={0x1c, 0x6, &(0x7f0000000100)=@raw=[@initr0, @map={0x18, 0x3, 0x1, 0x0, r4}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}], 0x0, 0x1, 0xf8, &(0x7f0000000580)=""/248, 0x0, 0x18, [], 0x0, 0x0, r5, 0x8, &(0x7f0000000500)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000680)={0x0, 0x3, 0x32c96647, 0x9}, 0x10, 0x28c14, r2}, 0x78) sendmsg$kcm(r3, &(0x7f00000004c0)={&(0x7f00000003c0)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, 0x0, 0x0, &(0x7f0000000bc0)=[{0x38, 0x0, 0x3f, "3d036b2fe1c920e033fd51a7135bc633687035d4990a07405974e24f3e4f5bc747dd8cb8"}, {0x20, 0x116, 0x100, "e12e82da376bca8fa03c53062e627e"}, {0x10, 0x0, 0xa11}, {0x88, 0x109, 0x0, "48dcf8c1cb65b735b2d5007004b54696aa2a8d0eb98210cf2936121163b1c0584580900f864f0ebc03ba1675bbb924fa22af1c7933e3ea0fe010ebefceaa2fd20e15b805012fd2d7a3e171a57996dc09dc5df4ce65f0c01e583247522e22d559c831115bca323aa68746a2dd9dc875023459b72ec5"}, {0x40, 0x88, 0x39, "e91254173524b71a6cf4982e471433e79bae7c4a781a2a354e5dcee630a99252345f0fe48a629be09093e130c018"}], 0x130}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000002c0)='block_bio_queue\x00'}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r1, 0x12, 0x1, 0x0, 0x0}, 0x20) r6 = openat$cgroup_ro(r0, &(0x7f0000000300)='cpuset.effective_mems\x00', 0x0, 0x0) openat$cgroup_freezer_state(r6, &(0x7f0000000380)='freezer.state\x00', 0x2, 0x0) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) socket$kcm(0x2b, 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a80)={0xffffffffffffffff, 0x0, 0x67, 0x62, &(0x7f0000000840)="f99a133c46d257d5200f326d0a5562cd17685e886bf2f9b3f9a2790348e08bc05a864a96cf5d232acf4d9c795667017ab2c3fa3c298204bcf30edef2ac8db7cbfdf4deae19c3fb8efa11f5d49f040b0731924ad772daa2861563518e94c736d15a5ac7a9872008", &(0x7f00000008c0)=""/98, 0x51a, 0x0, 0x1b, 0x0, &(0x7f0000000940)="5a4fa68ec2c72f99361b9b501348d1d5bce04f26173ed66a605e0c", &(0x7f0000000980)}, 0x48) 04:38:36 executing program 5: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$RNDADDENTROPY(r0, 0x40085203, &(0x7f0000000140)={0x80000005}) 04:38:36 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000008bc0)={'ip6_vti0\x00', &(0x7f0000008b40)={'ip6_vti0\x00', 0x0, 0x29, 0x0, 0x0, 0x0, 0x0, @private0, @empty}}) 04:38:36 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8936, 0x0) 04:38:37 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x20002000, &(0x7f0000000000/0x2000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, &(0x7f0000000000)={0x5, 0xbd2, 0x34e, 0xfffffffb, 0x0, "40982e07edea9e639ae175ca5fa75576a4cf88"}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) memfd_create(&(0x7f0000000080)='/+!%/\x00', 0x5) r4 = syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{0x0}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r4, &(0x7f0000000980)='./file3\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0xf154, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat(r4, &(0x7f0000000100)='./file3\x00', r4, &(0x7f0000000200)='./file0\x00') pipe(&(0x7f0000000080)={0xffffffffffffffff}) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff}) vmsplice(r6, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) syz_kvm_setup_cpu$x86(r5, r6, &(0x7f000060e000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="66e403baa100ecf30f1efa6766c7442400000000006766c7442402000000006766c744240600000000670f011c242e0faefef48218dc0f01dfba4300b80050ef66b8010000000f01d9", 0x49}], 0x1, 0x21, &(0x7f00000002c0)=[@flags={0x3, 0x80000}, @dstype0={0x6, 0x2}], 0x2) openat$fuse(0xffffffffffffff9c, 0x0, 0x42, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) 04:38:37 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0x48, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @ipv4={[], [], @private=0xa010102}}, @in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6={0xa, 0x0, 0x0, @private2}]}, &(0x7f0000000100)=0x10) 04:38:37 executing program 5: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) bind$rose(r0, &(0x7f0000000040)=@full={0xb, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @default, 0x0, [@null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x40) 04:38:37 executing program 2: r0 = socket(0x2, 0x3, 0x8) bind(r0, 0x0, 0x0) 04:38:37 executing program 1: openat$bsg(0xffffffffffffff9c, &(0x7f0000000080)='/dev/bsg\x00', 0x107800, 0x0) 04:38:37 executing program 5: r0 = socket(0xa, 0x3, 0x8) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, &(0x7f0000002140)={'sit0\x00', &(0x7f00000020c0)={'ip6_vti0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @mcast2}}) 04:38:37 executing program 5: r0 = socket(0x15, 0x5, 0x0) getsockopt$llc_int(r0, 0x10c, 0x0, 0x0, 0x0) 04:38:37 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000000), 0x4) 04:38:37 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) r3 = socket$kcm(0x29, 0x7, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xa, 0x2, 0x400, 0xc}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000140), &(0x7f00000000c0), 0x1081, r4}, 0x38) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000000480), 0x8) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000006c0)=@bpf_ext={0x1c, 0x6, &(0x7f0000000100)=@raw=[@initr0, @map={0x18, 0x3, 0x1, 0x0, r4}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}], 0x0, 0x1, 0xf8, &(0x7f0000000580)=""/248, 0x0, 0x18, [], 0x0, 0x0, r5, 0x8, &(0x7f0000000500)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000680)={0x0, 0x3, 0x32c96647, 0x9}, 0x10, 0x28c14, r2}, 0x78) sendmsg$kcm(r3, &(0x7f00000004c0)={&(0x7f00000003c0)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, 0x0, 0x0, &(0x7f0000000bc0)=[{0x48, 0x0, 0x3f, "3d036b2fe1c920e033fd51a7135bc633687035d4990a07405974e24f3e4f5bc747dd8cb833517dba325fb8357ec60f4b737260519cbe"}, {0x20, 0x116, 0x100, "e12e82da376bca8fa03c53062e627e"}, {0x10, 0x0, 0xa11}, {0x88, 0x109, 0x0, "48dcf8c1cb65b735b2d5007004b54696aa2a8d0eb98210cf2936121163b1c0584580900f864f0ebc03ba1675bbb924fa22af1c7933e3ea0fe010ebefceaa2fd20e15b805012fd2d7a3e171a57996dc09dc5df4ce65f0c01e583247522e22d559c831115bca323aa68746a2dd9dc875023459b72ec5"}, {0x40, 0x88, 0x39, "e91254173524b71a6cf4982e471433e79bae7c4a781a2a354e5dcee630a99252345f0fe48a629be09093e130c018"}], 0x140}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000002c0)='block_bio_queue\x00'}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r1, 0x12, 0x1, 0x0, 0x0}, 0x20) r6 = openat$cgroup_ro(r0, &(0x7f0000000300)='cpuset.effective_mems\x00', 0x0, 0x0) openat$cgroup_freezer_state(r6, &(0x7f0000000380)='freezer.state\x00', 0x2, 0x0) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) socket$kcm(0x2b, 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a80)={0xffffffffffffffff, 0x0, 0x67, 0x62, &(0x7f0000000840)="f99a133c46d257d5200f326d0a5562cd17685e886bf2f9b3f9a2790348e08bc05a864a96cf5d232acf4d9c795667017ab2c3fa3c298204bcf30edef2ac8db7cbfdf4deae19c3fb8efa11f5d49f040b0731924ad772daa2861563518e94c736d15a5ac7a9872008", &(0x7f00000008c0)=""/98, 0x51a, 0x0, 0x1b, 0x0, &(0x7f0000000940)="5a4fa68ec2c72f99361b9b501348d1d5bce04f26173ed66a605e0c", &(0x7f0000000980)}, 0x48) 04:38:37 executing program 5: r0 = syz_open_dev$video4linux(&(0x7f0000000280)='/dev/v4l-subdev#\x00', 0x0, 0x0) ioctl$VIDIOC_G_CTRL(r0, 0xc0305615, &(0x7f0000000300)) 04:38:37 executing program 2: r0 = fsopen(&(0x7f0000000000)='qnx6\x00', 0x0) fsconfig$FSCONFIG_SET_FLAG(r0, 0x0, &(0x7f0000000040)='posixacl\x00', 0x0, 0x0) 04:38:37 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140)='nl80211\x00', 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000140)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_START_P2P_DEVICE(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)={0x1c, r1, 0x1, 0x0, 0x0, {{0x5}, {@val={0x8, 0x3, r2}, @void}}}, 0x1c}}, 0x0) 04:38:37 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x20002000, &(0x7f0000000000/0x2000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, &(0x7f0000000000)={0x5, 0xbd2, 0x34e, 0xfffffffb, 0x0, "40982e07edea9e639ae175ca5fa75576a4cf88"}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) memfd_create(&(0x7f0000000080)='/+!%/\x00', 0x5) r4 = syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{0x0}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r4, &(0x7f0000000980)='./file3\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0xf154, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat(r4, &(0x7f0000000100)='./file3\x00', r4, &(0x7f0000000200)='./file0\x00') pipe(&(0x7f0000000080)={0xffffffffffffffff}) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff}) vmsplice(r6, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) syz_kvm_setup_cpu$x86(r5, r6, &(0x7f000060e000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="66e403baa100ecf30f1efa6766c7442400000000006766c7442402000000006766c744240600000000670f011c242e0faefef48218dc0f01dfba4300b80050ef66b8010000000f01d9", 0x49}], 0x1, 0x21, &(0x7f00000002c0)=[@flags={0x3, 0x80000}, @dstype0={0x6, 0x2}], 0x2) openat$fuse(0xffffffffffffff9c, 0x0, 0x42, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) 04:38:38 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0x48, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @ipv4={[], [], @private=0xa010102}}, @in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6={0xa, 0x0, 0x0, @private2}]}, &(0x7f0000000100)=0x10) 04:38:38 executing program 5: r0 = syz_open_dev$video4linux(&(0x7f0000000280)='/dev/v4l-subdev#\x00', 0x0, 0x0) ioctl$VIDIOC_G_CTRL(r0, 0xc0305615, &(0x7f0000000300)) 04:38:38 executing program 2: r0 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$search(0xa, r0, &(0x7f0000000340)='trusted\x00', &(0x7f0000000380)={'syz', 0x2}, 0xffffffffffffffff) 04:38:38 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_CONNECT(r0, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000001340)={&(0x7f0000001300)=ANY=[], 0x38}}, 0x0) 04:38:38 executing program 5: r0 = syz_open_dev$video4linux(&(0x7f0000000280)='/dev/v4l-subdev#\x00', 0x0, 0x0) ioctl$VIDIOC_G_CTRL(r0, 0xc0305615, &(0x7f0000000300)) 04:38:38 executing program 5: r0 = syz_open_dev$video4linux(&(0x7f0000000280)='/dev/v4l-subdev#\x00', 0x0, 0x0) ioctl$VIDIOC_G_CTRL(r0, 0xc0305615, &(0x7f0000000300)) 04:38:38 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_ABS_SETUP(r0, 0xc06855c8, &(0x7f0000000040)) 04:38:38 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) r3 = socket$kcm(0x29, 0x7, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xa, 0x2, 0x400, 0xc}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000140), &(0x7f00000000c0), 0x1081, r4}, 0x38) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000000480), 0x8) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000006c0)=@bpf_ext={0x1c, 0x6, &(0x7f0000000100)=@raw=[@initr0, @map={0x18, 0x3, 0x1, 0x0, r4}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}], 0x0, 0x1, 0xf8, &(0x7f0000000580)=""/248, 0x0, 0x18, [], 0x0, 0x0, r5, 0x8, &(0x7f0000000500)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000680)={0x0, 0x3, 0x32c96647, 0x9}, 0x10, 0x28c14, r2}, 0x78) sendmsg$kcm(r3, &(0x7f00000004c0)={&(0x7f00000003c0)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, 0x0, 0x0, &(0x7f0000000bc0)=[{0x48, 0x0, 0x3f, "3d036b2fe1c920e033fd51a7135bc633687035d4990a07405974e24f3e4f5bc747dd8cb833517dba325fb8357ec60f4b737260519cbe"}, {0x20, 0x116, 0x100, "e12e82da376bca8fa03c53062e627e"}, {0x10, 0x0, 0xa11}, {0x88, 0x109, 0x0, "48dcf8c1cb65b735b2d5007004b54696aa2a8d0eb98210cf2936121163b1c0584580900f864f0ebc03ba1675bbb924fa22af1c7933e3ea0fe010ebefceaa2fd20e15b805012fd2d7a3e171a57996dc09dc5df4ce65f0c01e583247522e22d559c831115bca323aa68746a2dd9dc875023459b72ec5"}, {0x40, 0x88, 0x39, "e91254173524b71a6cf4982e471433e79bae7c4a781a2a354e5dcee630a99252345f0fe48a629be09093e130c018"}], 0x140}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000002c0)='block_bio_queue\x00'}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r1, 0x12, 0x1, 0x0, 0x0}, 0x20) r6 = openat$cgroup_ro(r0, &(0x7f0000000300)='cpuset.effective_mems\x00', 0x0, 0x0) openat$cgroup_freezer_state(r6, &(0x7f0000000380)='freezer.state\x00', 0x2, 0x0) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) socket$kcm(0x2b, 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a80)={0xffffffffffffffff, 0x0, 0x67, 0x62, &(0x7f0000000840)="f99a133c46d257d5200f326d0a5562cd17685e886bf2f9b3f9a2790348e08bc05a864a96cf5d232acf4d9c795667017ab2c3fa3c298204bcf30edef2ac8db7cbfdf4deae19c3fb8efa11f5d49f040b0731924ad772daa2861563518e94c736d15a5ac7a9872008", &(0x7f00000008c0)=""/98, 0x51a, 0x0, 0x1b, 0x0, &(0x7f0000000940)="5a4fa68ec2c72f99361b9b501348d1d5bce04f26173ed66a605e0c", &(0x7f0000000980)}, 0x48) 04:38:38 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x2, 0x0, &(0x7f0000000080)) 04:38:38 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x21006, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:38:38 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r0, 0x89f7, 0x0) 04:38:38 executing program 3: fsopen(&(0x7f0000000040)='nfs4\x00', 0x0) 04:38:39 executing program 3: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)="3f4bb4729c5c4a75bb9f1928b339531a058c4cd08e5f09", 0x17, r0) 04:38:39 executing program 5: syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x172f, 0x37, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0x4, 0x0, 0x20, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x3}}}]}}]}}, 0x0) syz_usb_ep_write(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:38:39 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_ABS_SETUP(r0, 0x4008556c, &(0x7f0000000040)) 04:38:39 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f000001ca00)={0x0, 0x0, &(0x7f000001c9c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB="2400000026000102"], 0x24}}, 0x0) recvmmsg(r0, &(0x7f0000002e40)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) 04:38:39 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100)='nl80211\x00', 0xffffffffffffffff) sendmsg$NL80211_CMD_TDLS_MGMT(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, r1, 0x1, 0x0, 0x0, {{0x2}, {@void, @void}}}, 0x14}}, 0x0) 04:38:39 executing program 4: socket$caif_seqpacket(0x25, 0x5, 0x4) 04:38:39 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x8, 0x5, &(0x7f0000000c00)=@framed={{}, [@alu={0x4}, @jmp={0x5, 0x0, 0x3}]}, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0xb5, &(0x7f0000000100)=""/181, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 603.399952][T24373] encrypted_key: master key parameter '' is invalid [ 603.680407][ T19] usb 6-1: new high-speed USB device number 105 using dummy_hcd [ 603.920278][ T19] usb 6-1: Using ep0 maxpacket: 8 04:38:39 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) r3 = socket$kcm(0x29, 0x7, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xa, 0x2, 0x400, 0xc}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000140), &(0x7f00000000c0), 0x1081, r4}, 0x38) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000000480), 0x8) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000006c0)=@bpf_ext={0x1c, 0x6, &(0x7f0000000100)=@raw=[@initr0, @map={0x18, 0x3, 0x1, 0x0, r4}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}], 0x0, 0x1, 0xf8, &(0x7f0000000580)=""/248, 0x0, 0x18, [], 0x0, 0x0, r5, 0x8, &(0x7f0000000500)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000680)={0x0, 0x3, 0x32c96647, 0x9}, 0x10, 0x28c14, r2}, 0x78) sendmsg$kcm(r3, &(0x7f00000004c0)={&(0x7f00000003c0)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, 0x0, 0x0, &(0x7f0000000bc0)=[{0x48, 0x0, 0x3f, "3d036b2fe1c920e033fd51a7135bc633687035d4990a07405974e24f3e4f5bc747dd8cb833517dba325fb8357ec60f4b737260519cbe"}, {0x20, 0x116, 0x100, "e12e82da376bca8fa03c53062e627e"}, {0x10, 0x0, 0xa11}, {0x88, 0x109, 0x0, "48dcf8c1cb65b735b2d5007004b54696aa2a8d0eb98210cf2936121163b1c0584580900f864f0ebc03ba1675bbb924fa22af1c7933e3ea0fe010ebefceaa2fd20e15b805012fd2d7a3e171a57996dc09dc5df4ce65f0c01e583247522e22d559c831115bca323aa68746a2dd9dc875023459b72ec5"}, {0x40, 0x88, 0x39, "e91254173524b71a6cf4982e471433e79bae7c4a781a2a354e5dcee630a99252345f0fe48a629be09093e130c018"}], 0x140}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000002c0)='block_bio_queue\x00'}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r1, 0x12, 0x1, 0x0, 0x0}, 0x20) r6 = openat$cgroup_ro(r0, &(0x7f0000000300)='cpuset.effective_mems\x00', 0x0, 0x0) openat$cgroup_freezer_state(r6, &(0x7f0000000380)='freezer.state\x00', 0x2, 0x0) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) socket$kcm(0x2b, 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a80)={0xffffffffffffffff, 0x0, 0x67, 0x62, &(0x7f0000000840)="f99a133c46d257d5200f326d0a5562cd17685e886bf2f9b3f9a2790348e08bc05a864a96cf5d232acf4d9c795667017ab2c3fa3c298204bcf30edef2ac8db7cbfdf4deae19c3fb8efa11f5d49f040b0731924ad772daa2861563518e94c736d15a5ac7a9872008", &(0x7f00000008c0)=""/98, 0x51a, 0x0, 0x1b, 0x0, &(0x7f0000000940)="5a4fa68ec2c72f99361b9b501348d1d5bce04f26173ed66a605e0c", &(0x7f0000000980)}, 0x48) 04:38:39 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x29, &(0x7f0000000040)={0x0, {{0x2, 0x0, @multicast2}}}, 0x200000c8) 04:38:39 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x8, 0x5, &(0x7f0000000c00)=@framed={{}, [@alu={0x4}, @jmp={0x5, 0x0, 0x3}]}, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0xb5, &(0x7f0000000100)=""/181, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 04:38:39 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100)='nl80211\x00', 0xffffffffffffffff) sendmsg$NL80211_CMD_TDLS_MGMT(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, r1, 0x1, 0x0, 0x0, {{0x2}, {@void, @void}}}, 0x14}}, 0x0) 04:38:39 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f000001ca00)={0x0, 0x0, &(0x7f000001c9c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB="2400000026000102"], 0x24}}, 0x0) recvmmsg(r0, &(0x7f0000002e40)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) [ 604.043199][ T19] usb 6-1: config 1 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 0 04:38:39 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x8, 0x5, &(0x7f0000000c00)=@framed={{}, [@alu={0x4}, @jmp={0x5, 0x0, 0x3}]}, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0xb5, &(0x7f0000000100)=""/181, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 604.210983][ T19] usb 6-1: New USB device found, idVendor=172f, idProduct=0037, bcdDevice= 0.40 [ 604.223883][ T19] usb 6-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 604.233974][ T19] usb 6-1: Product: syz [ 604.238239][ T19] usb 6-1: Manufacturer: syz [ 604.245126][ T19] usb 6-1: SerialNumber: syz [ 604.532766][ T19] usbhid 6-1:1.0: couldn't find an input interrupt endpoint [ 604.548587][ T19] usb 6-1: USB disconnect, device number 105 [ 605.270189][ T19] usb 6-1: new high-speed USB device number 106 using dummy_hcd [ 605.510186][ T19] usb 6-1: Using ep0 maxpacket: 8 [ 605.630851][ T19] usb 6-1: config 1 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 0 [ 605.803608][ T19] usb 6-1: New USB device found, idVendor=172f, idProduct=0037, bcdDevice= 0.40 [ 605.812895][ T19] usb 6-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 605.822474][ T19] usb 6-1: Product: syz [ 605.826744][ T19] usb 6-1: Manufacturer: syz [ 605.832501][ T19] usb 6-1: SerialNumber: syz 04:38:41 executing program 5: syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x172f, 0x37, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0x4, 0x0, 0x20, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x3}}}]}}]}}, 0x0) syz_usb_ep_write(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:38:41 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x8, 0x5, &(0x7f0000000c00)=@framed={{}, [@alu={0x4}, @jmp={0x5, 0x0, 0x3}]}, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0xb5, &(0x7f0000000100)=""/181, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 04:38:41 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x16, 0x0, 0x1, 0x800, 0x4}, 0x40) 04:38:41 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f000001ca00)={0x0, 0x0, &(0x7f000001c9c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB="2400000026000102"], 0x24}}, 0x0) recvmmsg(r0, &(0x7f0000002e40)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) 04:38:41 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100)='nl80211\x00', 0xffffffffffffffff) sendmsg$NL80211_CMD_TDLS_MGMT(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, r1, 0x1, 0x0, 0x0, {{0x2}, {@void, @void}}}, 0x14}}, 0x0) 04:38:41 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) r3 = socket$kcm(0x29, 0x7, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xa, 0x2, 0x400, 0xc}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000140), &(0x7f00000000c0), 0x1081, r4}, 0x38) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000000480), 0x8) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000006c0)=@bpf_ext={0x1c, 0x6, &(0x7f0000000100)=@raw=[@initr0, @map={0x18, 0x3, 0x1, 0x0, r4}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}], 0x0, 0x1, 0xf8, &(0x7f0000000580)=""/248, 0x0, 0x18, [], 0x0, 0x0, r5, 0x8, &(0x7f0000000500)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000680)={0x0, 0x3, 0x32c96647, 0x9}, 0x10, 0x28c14, r2}, 0x78) sendmsg$kcm(r3, &(0x7f00000004c0)={&(0x7f00000003c0)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, 0x0, 0x0, &(0x7f0000000bc0)=[{0x50, 0x0, 0x3f, "3d036b2fe1c920e033fd51a7135bc633687035d4990a07405974e24f3e4f5bc747dd8cb833517dba325fb8357ec60f4b737260519cbec967f1e58025da9b58"}, {0x20, 0x116, 0x100, "e12e82da376bca8fa03c53062e627e"}, {0x10, 0x0, 0xa11}, {0x88, 0x109, 0x0, "48dcf8c1cb65b735b2d5007004b54696aa2a8d0eb98210cf2936121163b1c0584580900f864f0ebc03ba1675bbb924fa22af1c7933e3ea0fe010ebefceaa2fd20e15b805012fd2d7a3e171a57996dc09dc5df4ce65f0c01e583247522e22d559c831115bca323aa68746a2dd9dc875023459b72ec5"}, {0x40, 0x88, 0x39, "e91254173524b71a6cf4982e471433e79bae7c4a781a2a354e5dcee630a99252345f0fe48a629be09093e130c018"}], 0x148}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000002c0)='block_bio_queue\x00'}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r1, 0x12, 0x1, 0x0, 0x0}, 0x20) r6 = openat$cgroup_ro(r0, &(0x7f0000000300)='cpuset.effective_mems\x00', 0x0, 0x0) openat$cgroup_freezer_state(r6, &(0x7f0000000380)='freezer.state\x00', 0x2, 0x0) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) socket$kcm(0x2b, 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a80)={0xffffffffffffffff, 0x0, 0x67, 0x62, &(0x7f0000000840)="f99a133c46d257d5200f326d0a5562cd17685e886bf2f9b3f9a2790348e08bc05a864a96cf5d232acf4d9c795667017ab2c3fa3c298204bcf30edef2ac8db7cbfdf4deae19c3fb8efa11f5d49f040b0731924ad772daa2861563518e94c736d15a5ac7a9872008", &(0x7f00000008c0)=""/98, 0x51a, 0x0, 0x1b, 0x0, &(0x7f0000000940)="5a4fa68ec2c72f99361b9b501348d1d5bce04f26173ed66a605e0c", &(0x7f0000000980)}, 0x48) 04:38:41 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getpeername(r0, 0x0, 0x0) [ 606.132458][ T19] usbhid 6-1:1.0: couldn't find an input interrupt endpoint [ 606.163188][ T19] usb 6-1: USB disconnect, device number 106 04:38:41 executing program 4: r0 = syz_open_dev$binderN(&(0x7f00000000c0)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000440)={0x48, 0x0, &(0x7f00000002c0)=[@transaction={0x40406300, {0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, @register_looper], 0x4, 0x0, &(0x7f0000000380)="3f052248"}) 04:38:41 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000002140)=""/148, &(0x7f0000002200)=0xfffffffffffffe77) 04:38:42 executing program 3: syz_mount_image$afs(&(0x7f0000000040)='afs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2008084, &(0x7f00000002c0)={[], [{@uid_lt={'uid<'}}]}) 04:38:42 executing program 4: fsopen(&(0x7f0000000040)='hugetlbfs\x00', 0x0) 04:38:42 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100)='nl80211\x00', 0xffffffffffffffff) sendmsg$NL80211_CMD_TDLS_MGMT(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, r1, 0x1, 0x0, 0x0, {{0x2}, {@void, @void}}}, 0x14}}, 0x0) [ 606.379468][T24449] afs: Unknown parameter 'uid<00000000000000000000' [ 606.397520][T24449] afs: Unknown parameter 'uid<00000000000000000000' [ 606.590134][ T19] usb 6-1: new high-speed USB device number 107 using dummy_hcd [ 606.830123][ T19] usb 6-1: Using ep0 maxpacket: 8 [ 606.950788][ T19] usb 6-1: config 1 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 0 [ 607.121521][ T19] usb 6-1: New USB device found, idVendor=172f, idProduct=0037, bcdDevice= 0.40 [ 607.130735][ T19] usb 6-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 607.138831][ T19] usb 6-1: Product: syz [ 607.144822][ T19] usb 6-1: Manufacturer: syz [ 607.149533][ T19] usb 6-1: SerialNumber: syz [ 607.432628][ T19] usbhid 6-1:1.0: couldn't find an input interrupt endpoint [ 607.447402][ T19] usb 6-1: USB disconnect, device number 107 04:38:43 executing program 5: syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x172f, 0x37, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0x4, 0x0, 0x20, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x3}}}]}}]}}, 0x0) syz_usb_ep_write(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:38:43 executing program 3: keyctl$dh_compute(0x19, 0x0, 0x0, 0x0, 0x0) 04:38:43 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f000001ca00)={0x0, 0x0, &(0x7f000001c9c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB="2400000026000102"], 0x24}}, 0x0) recvmmsg(r0, &(0x7f0000002e40)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) 04:38:43 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000040)='devlink\x00', 0xffffffffffffffff) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x0, 0x0, {}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x8e, 0x1}, {0xc, 0x8f, 0x4}, {0xc}}]}, 0x54}}, 0x0) 04:38:43 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x7) recvmsg(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x2000) 04:38:43 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) r3 = socket$kcm(0x29, 0x7, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xa, 0x2, 0x400, 0xc}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000140), &(0x7f00000000c0), 0x1081, r4}, 0x38) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000000480), 0x8) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000006c0)=@bpf_ext={0x1c, 0x6, &(0x7f0000000100)=@raw=[@initr0, @map={0x18, 0x3, 0x1, 0x0, r4}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}], 0x0, 0x1, 0xf8, &(0x7f0000000580)=""/248, 0x0, 0x18, [], 0x0, 0x0, r5, 0x8, &(0x7f0000000500)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000680)={0x0, 0x3, 0x32c96647, 0x9}, 0x10, 0x28c14, r2}, 0x78) sendmsg$kcm(r3, &(0x7f00000004c0)={&(0x7f00000003c0)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, 0x0, 0x0, &(0x7f0000000bc0)=[{0x50, 0x0, 0x3f, "3d036b2fe1c920e033fd51a7135bc633687035d4990a07405974e24f3e4f5bc747dd8cb833517dba325fb8357ec60f4b737260519cbec967f1e58025da9b58"}, {0x20, 0x116, 0x100, "e12e82da376bca8fa03c53062e627e"}, {0x10, 0x0, 0xa11}, {0x88, 0x109, 0x0, "48dcf8c1cb65b735b2d5007004b54696aa2a8d0eb98210cf2936121163b1c0584580900f864f0ebc03ba1675bbb924fa22af1c7933e3ea0fe010ebefceaa2fd20e15b805012fd2d7a3e171a57996dc09dc5df4ce65f0c01e583247522e22d559c831115bca323aa68746a2dd9dc875023459b72ec5"}, {0x40, 0x88, 0x39, "e91254173524b71a6cf4982e471433e79bae7c4a781a2a354e5dcee630a99252345f0fe48a629be09093e130c018"}], 0x148}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000002c0)='block_bio_queue\x00'}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r1, 0x12, 0x1, 0x0, 0x0}, 0x20) r6 = openat$cgroup_ro(r0, &(0x7f0000000300)='cpuset.effective_mems\x00', 0x0, 0x0) openat$cgroup_freezer_state(r6, &(0x7f0000000380)='freezer.state\x00', 0x2, 0x0) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) socket$kcm(0x2b, 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a80)={0xffffffffffffffff, 0x0, 0x67, 0x62, &(0x7f0000000840)="f99a133c46d257d5200f326d0a5562cd17685e886bf2f9b3f9a2790348e08bc05a864a96cf5d232acf4d9c795667017ab2c3fa3c298204bcf30edef2ac8db7cbfdf4deae19c3fb8efa11f5d49f040b0731924ad772daa2861563518e94c736d15a5ac7a9872008", &(0x7f00000008c0)=""/98, 0x51a, 0x0, 0x1b, 0x0, &(0x7f0000000940)="5a4fa68ec2c72f99361b9b501348d1d5bce04f26173ed66a605e0c", &(0x7f0000000980)}, 0x48) 04:38:43 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_HMAC_IDENT(r0, 0x84, 0x16, 0x0, 0x0) 04:38:43 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$WG_CMD_GET_DEVICE(r0, &(0x7f0000001200)={0x0, 0x0, &(0x7f00000011c0)={&(0x7f00000000c0)={0xec4, 0x0, 0x0, 0x0, 0x0, {}, [@WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_PEERS={0xea8, 0x8, 0x0, 0x1, [{0x754, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_ALLOWEDIPS={0x200, 0x9, 0x0, 0x1, [{0x118, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @private0}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @local}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @private=0xa010101}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x3f}}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5, 0x3, 0x2}}]}, {0x34, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5, 0x3, 0x1}}]}, {0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @private2={0xfc, 0x2, [], 0x1}}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @local}, {0x5, 0x3, 0x1}}]}]}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg='\xdb\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff'}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x44}}}, @WGPEER_A_ALLOWEDIPS={0x4fc, 0x9, 0x0, 0x1, [{0x88, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5, 0x3, 0x2}}]}, {0xc4, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010102}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @private1}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @ipv4={[], [], @initdev={0xac, 0x1e, 0x1, 0x0}}}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5, 0x3, 0x3}}]}, {0xdc, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @dev={0xfe, 0x80, [], 0x18}}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @broadcast}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5}}]}, {0x124, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @private1}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x30}}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @local}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @rand_addr=' \x01\x00'}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010100}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5, 0x3, 0x2}}]}, {0xd0, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5, 0x3, 0x40}}, @ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x2f}}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @broadcast}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010102}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @local}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5}}]}, {0xdc, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @dev={0xfe, 0x80, [], 0x29}}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5, 0x3, 0x1}}]}]}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e24, @broadcast}}]}, {0x4c, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e21, 0xc5e2, @dev={0xfe, 0x80, [], 0x29}, 0x8}}, @WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e20, 0x2, @local, 0x753}}]}, {0x84, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e24, @multicast1}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "ec885d2c89d6be053976d613843dda3405936caed005fe725b32c76b2f0e27c8"}, @WGPEER_A_FLAGS={0x8, 0x3, 0x3}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x7f, 0x0, @private0, 0x4733b0f3}}, @WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6, 0x5, 0x9}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6, 0x5, 0x9}, @WGPEER_A_PROTOCOL_VERSION={0x8}]}, {0xc, 0x0, 0x0, 0x1, [@WGPEER_A_FLAGS={0x8, 0x3, 0x5}]}, {0x674, 0x0, 0x0, 0x1, [@WGPEER_A_PUBLIC_KEY={0x24, 0x1, @a_g='\x97\\\x9d\x81\xc9\x83\xc8 \x9e\xe7\x81%K\x89\x9f\x8e\xd9%\xae\x9f\t#\xc20x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 04:38:43 executing program 3: r0 = socket$phonet_pipe(0x23, 0x5, 0x2) ioctl$SIOCPNADDRESOURCE(r0, 0x89e0, &(0x7f0000000280)) 04:38:43 executing program 2: mknodat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) 04:38:43 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f0000000040)=0xfffffffa, 0x4) [ 608.290108][ T9752] usb 6-1: new high-speed USB device number 108 using dummy_hcd [ 608.530017][ T9752] usb 6-1: Using ep0 maxpacket: 8 [ 608.650808][ T9752] usb 6-1: config 1 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 0 [ 608.820768][ T9752] usb 6-1: New USB device found, idVendor=172f, idProduct=0037, bcdDevice= 0.40 [ 608.830023][ T9752] usb 6-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 608.838144][ T9752] usb 6-1: Product: syz [ 608.844429][ T9752] usb 6-1: Manufacturer: syz [ 608.850646][ T9752] usb 6-1: SerialNumber: syz [ 609.132416][ T9752] usbhid 6-1:1.0: couldn't find an input interrupt endpoint [ 609.147038][ T9752] usb 6-1: USB disconnect, device number 108 04:38:45 executing program 5: syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x172f, 0x37, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0x4, 0x0, 0x20, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x3}}}]}}]}}, 0x0) syz_usb_ep_write(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:38:45 executing program 4: r0 = socket(0x2, 0x3, 0x8) ioctl$sock_TIOCOUTQ(r0, 0x5411, 0x0) 04:38:45 executing program 3: r0 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f00000002c0)={0x8, 0x4, 0x0, 0x0, &(0x7f0000000100)=[{}, {}, {}, {}]}) 04:38:45 executing program 1: bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500), 0x10) 04:38:45 executing program 2: setsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0x0, 0x0, 0xfffffffffffffc7f) 04:38:45 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) r3 = socket$kcm(0x29, 0x7, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xa, 0x2, 0x400, 0xc}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000140), &(0x7f00000000c0), 0x1081, r4}, 0x38) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000000480), 0x8) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000006c0)=@bpf_ext={0x1c, 0x6, &(0x7f0000000100)=@raw=[@initr0, @map={0x18, 0x3, 0x1, 0x0, r4}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}], 0x0, 0x1, 0xf8, &(0x7f0000000580)=""/248, 0x0, 0x18, [], 0x0, 0x0, r5, 0x8, &(0x7f0000000500)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000680)={0x0, 0x3, 0x32c96647, 0x9}, 0x10, 0x28c14, r2}, 0x78) sendmsg$kcm(r3, &(0x7f00000004c0)={&(0x7f00000003c0)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, 0x0, 0x0, &(0x7f0000000bc0)=[{0x50, 0x0, 0x3f, "3d036b2fe1c920e033fd51a7135bc633687035d4990a07405974e24f3e4f5bc747dd8cb833517dba325fb8357ec60f4b737260519cbec967f1e58025da9b58"}, {0x20, 0x116, 0x100, "e12e82da376bca8fa03c53062e627e"}, {0x10, 0x0, 0xa11}, {0x88, 0x109, 0x0, "48dcf8c1cb65b735b2d5007004b54696aa2a8d0eb98210cf2936121163b1c0584580900f864f0ebc03ba1675bbb924fa22af1c7933e3ea0fe010ebefceaa2fd20e15b805012fd2d7a3e171a57996dc09dc5df4ce65f0c01e583247522e22d559c831115bca323aa68746a2dd9dc875023459b72ec5"}, {0x40, 0x88, 0x39, "e91254173524b71a6cf4982e471433e79bae7c4a781a2a354e5dcee630a99252345f0fe48a629be09093e130c018"}], 0x148}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000002c0)='block_bio_queue\x00'}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r1, 0x12, 0x1, 0x0, 0x0}, 0x20) r6 = openat$cgroup_ro(r0, &(0x7f0000000300)='cpuset.effective_mems\x00', 0x0, 0x0) openat$cgroup_freezer_state(r6, &(0x7f0000000380)='freezer.state\x00', 0x2, 0x0) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) socket$kcm(0x2b, 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a80)={0xffffffffffffffff, 0x0, 0x67, 0x62, &(0x7f0000000840)="f99a133c46d257d5200f326d0a5562cd17685e886bf2f9b3f9a2790348e08bc05a864a96cf5d232acf4d9c795667017ab2c3fa3c298204bcf30edef2ac8db7cbfdf4deae19c3fb8efa11f5d49f040b0731924ad772daa2861563518e94c736d15a5ac7a9872008", &(0x7f00000008c0)=""/98, 0x51a, 0x0, 0x1b, 0x0, &(0x7f0000000940)="5a4fa68ec2c72f99361b9b501348d1d5bce04f26173ed66a605e0c", &(0x7f0000000980)}, 0x48) 04:38:45 executing program 4: sendmsg$netlink(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, &(0x7f0000002080)=[{&(0x7f0000000b40)={0x110, 0x0, 0x0, 0x0, 0x0, "", [@nested={0xfd, 0x0, 0x0, 0x1, [@generic="8396fb724abac20282e50cce92ca920ce40018673731b6ff4b494dff5eab092e439e2eabb2550bf0f9a9d7a77ed8f1aa025a359f408c78b3caa03202072d707637cb60f46bcca165f02fb936a311c5fd1657c90b194ae79eb0115a09e1f7eaca9a1a4921ca070d9d51ad5d559e99fa0ca29781660c3a6acd1943a6c23dc8cfbe0ee7f5dba3c76e5fc071262bd96e018ab819bb3927917d7ee12365270feae9de5377e4f5e750e5b88e1338fc3e79eddb92ed8dd43a05fd9103419f692fb8dccb8a5fa407ea456f7b25a34215", @generic="1682a1809c908c8127ca32544b930dce719ac55ad3766846e80e2f91cff5bc2dfe684a961cc44815d39d41284d"]}]}, 0x110}], 0x1}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x6, &(0x7f0000000c40)={0x0}, 0x10) 04:38:45 executing program 3: r0 = socket$rds(0x15, 0x5, 0x0) recvfrom(r0, 0x0, 0x0, 0x2003, 0x0, 0x0) 04:38:45 executing program 3: r0 = socket$rxrpc(0x21, 0x2, 0x2) connect$rxrpc(r0, &(0x7f0000000000)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @multicast2}}, 0x24) 04:38:45 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8930, &(0x7f0000000000)={'batadv0\x00'}) 04:38:45 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x30, 0x0, 0x0) 04:38:45 executing program 1: syz_open_dev$dri(&(0x7f0000000300)='/dev/dri/card#\x00', 0x2, 0x125040) [ 609.989968][ T9752] usb 6-1: new high-speed USB device number 109 using dummy_hcd [ 610.229927][ T9752] usb 6-1: Using ep0 maxpacket: 8 [ 610.350648][ T9752] usb 6-1: config 1 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 0 [ 610.520684][ T9752] usb 6-1: New USB device found, idVendor=172f, idProduct=0037, bcdDevice= 0.40 [ 610.530002][ T9752] usb 6-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 610.538149][ T9752] usb 6-1: Product: syz [ 610.544259][ T9752] usb 6-1: Manufacturer: syz [ 610.548967][ T9752] usb 6-1: SerialNumber: syz [ 610.834492][ T9752] usbhid 6-1:1.0: couldn't find an input interrupt endpoint [ 610.843597][ T9752] usb 6-1: USB disconnect, device number 109 04:38:47 executing program 4: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/udmabuf\x00', 0x2) ioctl$UDMABUF_CREATE(r0, 0x40187542, &(0x7f0000000140)) 04:38:47 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x8932, &(0x7f0000001940)={'gre0\x00', 0x0}) 04:38:47 executing program 2: socketpair(0x15, 0x5, 0xa0000000, &(0x7f0000000000)) 04:38:47 executing program 1: msgctl$IPC_STAT(0x0, 0x2, &(0x7f0000000000)=""/190) 04:38:47 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) r3 = socket$kcm(0x29, 0x7, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xa, 0x2, 0x400, 0xc}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000140), &(0x7f00000000c0), 0x1081, r4}, 0x38) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000000480), 0x8) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000006c0)=@bpf_ext={0x1c, 0x6, &(0x7f0000000100)=@raw=[@initr0, @map={0x18, 0x3, 0x1, 0x0, r4}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}], 0x0, 0x1, 0xf8, &(0x7f0000000580)=""/248, 0x0, 0x18, [], 0x0, 0x0, r5, 0x8, &(0x7f0000000500)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000680)={0x0, 0x3, 0x32c96647, 0x9}, 0x10, 0x28c14, r2}, 0x78) sendmsg$kcm(r3, &(0x7f00000004c0)={&(0x7f00000003c0)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, 0x0, 0x0, &(0x7f0000000bc0)=[{0x58, 0x0, 0x3f, "3d036b2fe1c920e033fd51a7135bc633687035d4990a07405974e24f3e4f5bc747dd8cb833517dba325fb8357ec60f4b737260519cbec967f1e58025da9b5821975edd"}, {0x20, 0x116, 0x100, "e12e82da376bca8fa03c53062e627e"}, {0x10, 0x0, 0xa11}, {0x88, 0x109, 0x0, "48dcf8c1cb65b735b2d5007004b54696aa2a8d0eb98210cf2936121163b1c0584580900f864f0ebc03ba1675bbb924fa22af1c7933e3ea0fe010ebefceaa2fd20e15b805012fd2d7a3e171a57996dc09dc5df4ce65f0c01e583247522e22d559c831115bca323aa68746a2dd9dc875023459b72ec5"}, {0x40, 0x88, 0x39, "e91254173524b71a6cf4982e471433e79bae7c4a781a2a354e5dcee630a99252345f0fe48a629be09093e130c018"}], 0x150}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000002c0)='block_bio_queue\x00'}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r1, 0x12, 0x1, 0x0, 0x0}, 0x20) r6 = openat$cgroup_ro(r0, &(0x7f0000000300)='cpuset.effective_mems\x00', 0x0, 0x0) openat$cgroup_freezer_state(r6, &(0x7f0000000380)='freezer.state\x00', 0x2, 0x0) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) socket$kcm(0x2b, 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a80)={0xffffffffffffffff, 0x0, 0x67, 0x62, &(0x7f0000000840)="f99a133c46d257d5200f326d0a5562cd17685e886bf2f9b3f9a2790348e08bc05a864a96cf5d232acf4d9c795667017ab2c3fa3c298204bcf30edef2ac8db7cbfdf4deae19c3fb8efa11f5d49f040b0731924ad772daa2861563518e94c736d15a5ac7a9872008", &(0x7f00000008c0)=""/98, 0x51a, 0x0, 0x1b, 0x0, &(0x7f0000000940)="5a4fa68ec2c72f99361b9b501348d1d5bce04f26173ed66a605e0c", &(0x7f0000000980)}, 0x48) 04:38:47 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000600)='/dev/ppp\x00', 0x0, 0x0) fcntl$getownex(r0, 0x40a, 0x0) 04:38:47 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000080)=@assoc_value, 0x8) 04:38:47 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89a1, &(0x7f0000001940)={'gre0\x00', 0x0}) 04:38:47 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000100), 0xc, &(0x7f0000000180)={&(0x7f0000000140)=@deltfilter={0x24, 0x2d, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {}, {}, {0x0, 0xfff3}}}, 0x24}}, 0x0) 04:38:47 executing program 4: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000100)='/dev/udmabuf\x00', 0x2) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/bsg\x00', 0x0, 0x0) ioctl$UDMABUF_CREATE(r0, 0x40187542, &(0x7f00000000c0)={r1}) 04:38:47 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000023c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000002380)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000002400)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e24, 0x0, @empty}, r1}}, 0x30) 04:38:47 executing program 1: r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap$perf(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x0) 04:38:47 executing program 2: syz_open_procfs(0x0, &(0x7f0000000040)='smaps_rollup\x00') 04:38:47 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)={@empty=[0xff], @dev, @void, {@ipv6={0x86dd, @udp={0x0, 0x6, '5b\v', 0x3, 0x2c, 0x0, @local, @empty, {[], {0x0, 0x0, 0x8}}}}}}, 0x0) 04:38:47 executing program 4: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/snd/seq\x00', 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x80045301, 0x0) 04:38:47 executing program 5: socketpair(0x18, 0x0, 0x0, &(0x7f00000000c0)) 04:38:47 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) r3 = socket$kcm(0x29, 0x7, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xa, 0x2, 0x400, 0xc}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000140), &(0x7f00000000c0), 0x1081, r4}, 0x38) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000000480), 0x8) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000006c0)=@bpf_ext={0x1c, 0x6, &(0x7f0000000100)=@raw=[@initr0, @map={0x18, 0x3, 0x1, 0x0, r4}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}], 0x0, 0x1, 0xf8, &(0x7f0000000580)=""/248, 0x0, 0x18, [], 0x0, 0x0, r5, 0x8, &(0x7f0000000500)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000680)={0x0, 0x3, 0x32c96647, 0x9}, 0x10, 0x28c14, r2}, 0x78) sendmsg$kcm(r3, &(0x7f00000004c0)={&(0x7f00000003c0)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, 0x0, 0x0, &(0x7f0000000bc0)=[{0x58, 0x0, 0x3f, "3d036b2fe1c920e033fd51a7135bc633687035d4990a07405974e24f3e4f5bc747dd8cb833517dba325fb8357ec60f4b737260519cbec967f1e58025da9b5821975edd"}, {0x20, 0x116, 0x100, "e12e82da376bca8fa03c53062e627e"}, {0x10, 0x0, 0xa11}, {0x88, 0x109, 0x0, "48dcf8c1cb65b735b2d5007004b54696aa2a8d0eb98210cf2936121163b1c0584580900f864f0ebc03ba1675bbb924fa22af1c7933e3ea0fe010ebefceaa2fd20e15b805012fd2d7a3e171a57996dc09dc5df4ce65f0c01e583247522e22d559c831115bca323aa68746a2dd9dc875023459b72ec5"}, {0x40, 0x88, 0x39, "e91254173524b71a6cf4982e471433e79bae7c4a781a2a354e5dcee630a99252345f0fe48a629be09093e130c018"}], 0x150}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000002c0)='block_bio_queue\x00'}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r1, 0x12, 0x1, 0x0, 0x0}, 0x20) r6 = openat$cgroup_ro(r0, &(0x7f0000000300)='cpuset.effective_mems\x00', 0x0, 0x0) openat$cgroup_freezer_state(r6, &(0x7f0000000380)='freezer.state\x00', 0x2, 0x0) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) socket$kcm(0x2b, 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a80)={0xffffffffffffffff, 0x0, 0x67, 0x62, &(0x7f0000000840)="f99a133c46d257d5200f326d0a5562cd17685e886bf2f9b3f9a2790348e08bc05a864a96cf5d232acf4d9c795667017ab2c3fa3c298204bcf30edef2ac8db7cbfdf4deae19c3fb8efa11f5d49f040b0731924ad772daa2861563518e94c736d15a5ac7a9872008", &(0x7f00000008c0)=""/98, 0x51a, 0x0, 0x1b, 0x0, &(0x7f0000000940)="5a4fa68ec2c72f99361b9b501348d1d5bce04f26173ed66a605e0c", &(0x7f0000000980)}, 0x48) 04:38:47 executing program 3: r0 = syz_open_dev$ndb(&(0x7f00000001c0)='/dev/nbd#\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(r0, 0xc0481273, 0x0) 04:38:47 executing program 5: socketpair(0x18, 0x0, 0x0, &(0x7f00000000c0)) 04:38:47 executing program 4: sched_getparam(0x0, &(0x7f0000000540)) 04:38:47 executing program 1: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000100)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) ioctl$LOOP_SET_FD(r0, 0x4c00, 0xffffffffffffffff) 04:38:47 executing program 2: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000002580), 0x0, &(0x7f00000028c0)=ANY=[@ANYBLOB='quiet']) 04:38:48 executing program 5: socketpair(0x18, 0x0, 0x0, &(0x7f00000000c0)) 04:38:48 executing program 3: select(0x40, &(0x7f0000000100)={0x1}, 0x0, 0x0, 0x0) 04:38:48 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8922, &(0x7f0000000000)={'batadv0\x00'}) [ 612.360306][T24609] FAT-fs (loop2): bogus number of reserved sectors 04:38:48 executing program 1: openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x113c44, 0x0) [ 612.404375][T24609] FAT-fs (loop2): Can't find a valid FAT filesystem 04:38:48 executing program 5: socketpair(0x18, 0x0, 0x0, &(0x7f00000000c0)) 04:38:48 executing program 3: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) sendmsg$nfc_llcp(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000002c0)=[{0x0}, {0x0}], 0x2, &(0x7f0000000340)={0x28, 0x0, 0x0, "8bd6a013365cbdadf9dc269cac762f6c7c"}, 0x28}, 0x0) [ 612.462503][T24621] batadv0: mtu less than device minimum [ 612.549107][T24609] FAT-fs (loop2): bogus number of reserved sectors [ 612.582610][T24609] FAT-fs (loop2): Can't find a valid FAT filesystem 04:38:48 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) r3 = socket$kcm(0x29, 0x7, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xa, 0x2, 0x400, 0xc}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000140), &(0x7f00000000c0), 0x1081, r4}, 0x38) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000000480), 0x8) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000006c0)=@bpf_ext={0x1c, 0x6, &(0x7f0000000100)=@raw=[@initr0, @map={0x18, 0x3, 0x1, 0x0, r4}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}], 0x0, 0x1, 0xf8, &(0x7f0000000580)=""/248, 0x0, 0x18, [], 0x0, 0x0, r5, 0x8, &(0x7f0000000500)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000680)={0x0, 0x3, 0x32c96647, 0x9}, 0x10, 0x28c14, r2}, 0x78) sendmsg$kcm(r3, &(0x7f00000004c0)={&(0x7f00000003c0)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, 0x0, 0x0, &(0x7f0000000bc0)=[{0x58, 0x0, 0x3f, "3d036b2fe1c920e033fd51a7135bc633687035d4990a07405974e24f3e4f5bc747dd8cb833517dba325fb8357ec60f4b737260519cbec967f1e58025da9b5821975edd"}, {0x20, 0x116, 0x100, "e12e82da376bca8fa03c53062e627e"}, {0x10, 0x0, 0xa11}, {0x88, 0x109, 0x0, "48dcf8c1cb65b735b2d5007004b54696aa2a8d0eb98210cf2936121163b1c0584580900f864f0ebc03ba1675bbb924fa22af1c7933e3ea0fe010ebefceaa2fd20e15b805012fd2d7a3e171a57996dc09dc5df4ce65f0c01e583247522e22d559c831115bca323aa68746a2dd9dc875023459b72ec5"}, {0x40, 0x88, 0x39, "e91254173524b71a6cf4982e471433e79bae7c4a781a2a354e5dcee630a99252345f0fe48a629be09093e130c018"}], 0x150}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000002c0)='block_bio_queue\x00'}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r1, 0x12, 0x1, 0x0, 0x0}, 0x20) r6 = openat$cgroup_ro(r0, &(0x7f0000000300)='cpuset.effective_mems\x00', 0x0, 0x0) openat$cgroup_freezer_state(r6, &(0x7f0000000380)='freezer.state\x00', 0x2, 0x0) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) socket$kcm(0x2b, 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a80)={0xffffffffffffffff, 0x0, 0x67, 0x62, &(0x7f0000000840)="f99a133c46d257d5200f326d0a5562cd17685e886bf2f9b3f9a2790348e08bc05a864a96cf5d232acf4d9c795667017ab2c3fa3c298204bcf30edef2ac8db7cbfdf4deae19c3fb8efa11f5d49f040b0731924ad772daa2861563518e94c736d15a5ac7a9872008", &(0x7f00000008c0)=""/98, 0x51a, 0x0, 0x1b, 0x0, &(0x7f0000000940)="5a4fa68ec2c72f99361b9b501348d1d5bce04f26173ed66a605e0c", &(0x7f0000000980)}, 0x48) 04:38:48 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8922, &(0x7f0000000000)={'batadv0\x00'}) 04:38:48 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000240)=ANY=[], 0x84) 04:38:48 executing program 5: shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000000)=""/115) 04:38:48 executing program 2: bpf$MAP_CREATE(0x4, &(0x7f0000000740)={0x11, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x1c) 04:38:48 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x80108906, 0x0) 04:38:48 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x891b, &(0x7f0000001940)={'gre0\x00', 0x0}) 04:38:48 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8922, &(0x7f0000000000)={'batadv0\x00'}) [ 613.157180][T24641] batadv0: mtu less than device minimum 04:38:48 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000080), &(0x7f00000000c0)=0x8) 04:38:48 executing program 1: syz_init_net_socket$x25(0x6, 0x5, 0x0) 04:38:48 executing program 3: r0 = socket(0x15, 0x5, 0x0) getpeername$unix(r0, 0x0, 0x0) 04:38:48 executing program 2: syz_open_dev$vcsu(&(0x7f00000000c0)='/dev/vcsu#\x00', 0x0, 0x82600) [ 613.359498][T24655] batadv0: mtu less than device minimum 04:38:49 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) r3 = socket$kcm(0x29, 0x7, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xa, 0x2, 0x400, 0xc}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000140), &(0x7f00000000c0), 0x1081, r4}, 0x38) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000000480), 0x8) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000006c0)=@bpf_ext={0x1c, 0x6, &(0x7f0000000100)=@raw=[@initr0, @map={0x18, 0x3, 0x1, 0x0, r4}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}], 0x0, 0x1, 0xf8, &(0x7f0000000580)=""/248, 0x0, 0x18, [], 0x0, 0x0, r5, 0x8, &(0x7f0000000500)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000680)={0x0, 0x3, 0x32c96647, 0x9}, 0x10, 0x28c14, r2}, 0x78) sendmsg$kcm(r3, &(0x7f00000004c0)={&(0x7f00000003c0)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, 0x0, 0x0, &(0x7f0000000bc0)=[{0x58, 0x0, 0x3f, "3d036b2fe1c920e033fd51a7135bc633687035d4990a07405974e24f3e4f5bc747dd8cb833517dba325fb8357ec60f4b737260519cbec967f1e58025da9b5821975edd2eb5"}, {0x20, 0x116, 0x100, "e12e82da376bca8fa03c53062e627e"}, {0x10, 0x0, 0xa11}, {0x88, 0x109, 0x0, "48dcf8c1cb65b735b2d5007004b54696aa2a8d0eb98210cf2936121163b1c0584580900f864f0ebc03ba1675bbb924fa22af1c7933e3ea0fe010ebefceaa2fd20e15b805012fd2d7a3e171a57996dc09dc5df4ce65f0c01e583247522e22d559c831115bca323aa68746a2dd9dc875023459b72ec5"}, {0x40, 0x88, 0x39, "e91254173524b71a6cf4982e471433e79bae7c4a781a2a354e5dcee630a99252345f0fe48a629be09093e130c018"}], 0x150}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000002c0)='block_bio_queue\x00'}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r1, 0x12, 0x1, 0x0, 0x0}, 0x20) r6 = openat$cgroup_ro(r0, &(0x7f0000000300)='cpuset.effective_mems\x00', 0x0, 0x0) openat$cgroup_freezer_state(r6, &(0x7f0000000380)='freezer.state\x00', 0x2, 0x0) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) socket$kcm(0x2b, 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a80)={0xffffffffffffffff, 0x0, 0x67, 0x62, &(0x7f0000000840)="f99a133c46d257d5200f326d0a5562cd17685e886bf2f9b3f9a2790348e08bc05a864a96cf5d232acf4d9c795667017ab2c3fa3c298204bcf30edef2ac8db7cbfdf4deae19c3fb8efa11f5d49f040b0731924ad772daa2861563518e94c736d15a5ac7a9872008", &(0x7f00000008c0)=""/98, 0x51a, 0x0, 0x1b, 0x0, &(0x7f0000000940)="5a4fa68ec2c72f99361b9b501348d1d5bce04f26173ed66a605e0c", &(0x7f0000000980)}, 0x48) 04:38:49 executing program 5: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='stack\x00') read$FUSE(r0, &(0x7f0000000500)={0x2020}, 0x2020) 04:38:49 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8922, &(0x7f0000000000)={'batadv0\x00'}) 04:38:49 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00', 0xffffffffffffffff) sendmsg$IPVS_CMD_SET_CONFIG(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000001c0)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x6}]}, 0x1c}}, 0x0) 04:38:49 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x23, 0x0, 0x0) 04:38:49 executing program 2: r0 = socket(0xa, 0x3, 0x5) bind$can_j1939(r0, &(0x7f0000000000), 0x18) 04:38:49 executing program 3: msgctl$IPC_INFO(0x0, 0x3, &(0x7f0000000040)=""/4096) 04:38:49 executing program 5: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='stack\x00') read$FUSE(r0, &(0x7f0000000500)={0x2020}, 0x2020) [ 614.018992][T24670] batadv0: mtu less than device minimum 04:38:49 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000600)='/dev/ppp\x00', 0x0, 0x0) fcntl$getownex(r0, 0xf, &(0x7f0000000000)) 04:38:49 executing program 2: r0 = socket$rds(0x15, 0x5, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(r0, 0x4020940d, &(0x7f0000000080)={0x6, 'veth1_macvtap\x00'}) 04:38:49 executing program 1: openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000240)='/dev/cachefiles\x00', 0x0, 0x0) fork() openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) 04:38:49 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140)='nl80211\x00', 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)={0x1c, r1, 0x1, 0x0, 0x0, {{0x1a}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) 04:38:50 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) r3 = socket$kcm(0x29, 0x7, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xa, 0x2, 0x400, 0xc}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000140), &(0x7f00000000c0), 0x1081, r4}, 0x38) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000000480), 0x8) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000006c0)=@bpf_ext={0x1c, 0x6, &(0x7f0000000100)=@raw=[@initr0, @map={0x18, 0x3, 0x1, 0x0, r4}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}], 0x0, 0x1, 0xf8, &(0x7f0000000580)=""/248, 0x0, 0x18, [], 0x0, 0x0, r5, 0x8, &(0x7f0000000500)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000680)={0x0, 0x3, 0x32c96647, 0x9}, 0x10, 0x28c14, r2}, 0x78) sendmsg$kcm(r3, &(0x7f00000004c0)={&(0x7f00000003c0)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, 0x0, 0x0, &(0x7f0000000bc0)=[{0x58, 0x0, 0x3f, "3d036b2fe1c920e033fd51a7135bc633687035d4990a07405974e24f3e4f5bc747dd8cb833517dba325fb8357ec60f4b737260519cbec967f1e58025da9b5821975edd2eb5"}, {0x20, 0x116, 0x100, "e12e82da376bca8fa03c53062e627e"}, {0x10, 0x0, 0xa11}, {0x88, 0x109, 0x0, "48dcf8c1cb65b735b2d5007004b54696aa2a8d0eb98210cf2936121163b1c0584580900f864f0ebc03ba1675bbb924fa22af1c7933e3ea0fe010ebefceaa2fd20e15b805012fd2d7a3e171a57996dc09dc5df4ce65f0c01e583247522e22d559c831115bca323aa68746a2dd9dc875023459b72ec5"}, {0x40, 0x88, 0x39, "e91254173524b71a6cf4982e471433e79bae7c4a781a2a354e5dcee630a99252345f0fe48a629be09093e130c018"}], 0x150}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000002c0)='block_bio_queue\x00'}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r1, 0x12, 0x1, 0x0, 0x0}, 0x20) r6 = openat$cgroup_ro(r0, &(0x7f0000000300)='cpuset.effective_mems\x00', 0x0, 0x0) openat$cgroup_freezer_state(r6, &(0x7f0000000380)='freezer.state\x00', 0x2, 0x0) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) socket$kcm(0x2b, 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a80)={0xffffffffffffffff, 0x0, 0x67, 0x62, &(0x7f0000000840)="f99a133c46d257d5200f326d0a5562cd17685e886bf2f9b3f9a2790348e08bc05a864a96cf5d232acf4d9c795667017ab2c3fa3c298204bcf30edef2ac8db7cbfdf4deae19c3fb8efa11f5d49f040b0731924ad772daa2861563518e94c736d15a5ac7a9872008", &(0x7f00000008c0)=""/98, 0x51a, 0x0, 0x1b, 0x0, &(0x7f0000000940)="5a4fa68ec2c72f99361b9b501348d1d5bce04f26173ed66a605e0c", &(0x7f0000000980)}, 0x48) 04:38:50 executing program 5: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='stack\x00') read$FUSE(r0, &(0x7f0000000500)={0x2020}, 0x2020) 04:38:50 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000080)=ANY=[@ANYRES32=0x0, @ANYBLOB="79050002"], 0xc) 04:38:50 executing program 3: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25SCALLUSERDATA(r0, 0x89e5, &(0x7f0000000100)={0x80001f, "8af96f390d4a245ab8a0599534bfd709576c428e5f93978715a8fc25248fc44f5d93e8159a3ac8681f64f09b137d1bb955421d9c5a2acba5bad208e125de219cbbe89508fc3fc3f2e4b0377943f63c743cc054141880a0218e080096793a5aa91640bcc92d34836a1ca91d7d15f6c167c3f383821bdf2d0163a554348a9771bd"}) 04:38:50 executing program 2: r0 = socket(0xa, 0x3, 0x8) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f00000000c0)) 04:38:50 executing program 1: r0 = socket$qrtr(0x2a, 0x2, 0x0) recvmsg$qrtr(r0, &(0x7f0000000340)={&(0x7f0000000000), 0xc, 0x0}, 0x38, 0x0) 04:38:50 executing program 4: syz_open_dev$ndb(&(0x7f0000000100)='/dev/nbd#\x00', 0x0, 0x400200) 04:38:50 executing program 3: accept4$x25(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:38:50 executing program 5: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='stack\x00') read$FUSE(r0, &(0x7f0000000500)={0x2020}, 0x2020) 04:38:50 executing program 2: io_setup(0x2, &(0x7f00000001c0)=0x0) io_getevents(r0, 0x7fffffff, 0x0, 0x0, 0x0) 04:38:50 executing program 1: r0 = socket$can_j1939(0x1d, 0x2, 0x7) recvmsg$can_j1939(r0, &(0x7f00000005c0)={0x0, 0x0, 0x0}, 0x40000100) 04:38:50 executing program 4: fsopen(&(0x7f0000000000)='nfsd\x00', 0x0) 04:38:51 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) r3 = socket$kcm(0x29, 0x7, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xa, 0x2, 0x400, 0xc}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000140), &(0x7f00000000c0), 0x1081, r4}, 0x38) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000000480), 0x8) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000006c0)=@bpf_ext={0x1c, 0x6, &(0x7f0000000100)=@raw=[@initr0, @map={0x18, 0x3, 0x1, 0x0, r4}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}], 0x0, 0x1, 0xf8, &(0x7f0000000580)=""/248, 0x0, 0x18, [], 0x0, 0x0, r5, 0x8, &(0x7f0000000500)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000680)={0x0, 0x3, 0x32c96647, 0x9}, 0x10, 0x28c14, r2}, 0x78) sendmsg$kcm(r3, &(0x7f00000004c0)={&(0x7f00000003c0)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, 0x0, 0x0, &(0x7f0000000bc0)=[{0x58, 0x0, 0x3f, "3d036b2fe1c920e033fd51a7135bc633687035d4990a07405974e24f3e4f5bc747dd8cb833517dba325fb8357ec60f4b737260519cbec967f1e58025da9b5821975edd2eb5"}, {0x20, 0x116, 0x100, "e12e82da376bca8fa03c53062e627e"}, {0x10, 0x0, 0xa11}, {0x88, 0x109, 0x0, "48dcf8c1cb65b735b2d5007004b54696aa2a8d0eb98210cf2936121163b1c0584580900f864f0ebc03ba1675bbb924fa22af1c7933e3ea0fe010ebefceaa2fd20e15b805012fd2d7a3e171a57996dc09dc5df4ce65f0c01e583247522e22d559c831115bca323aa68746a2dd9dc875023459b72ec5"}, {0x40, 0x88, 0x39, "e91254173524b71a6cf4982e471433e79bae7c4a781a2a354e5dcee630a99252345f0fe48a629be09093e130c018"}], 0x150}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000002c0)='block_bio_queue\x00'}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r1, 0x12, 0x1, 0x0, 0x0}, 0x20) r6 = openat$cgroup_ro(r0, &(0x7f0000000300)='cpuset.effective_mems\x00', 0x0, 0x0) openat$cgroup_freezer_state(r6, &(0x7f0000000380)='freezer.state\x00', 0x2, 0x0) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) socket$kcm(0x2b, 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a80)={0xffffffffffffffff, 0x0, 0x67, 0x62, &(0x7f0000000840)="f99a133c46d257d5200f326d0a5562cd17685e886bf2f9b3f9a2790348e08bc05a864a96cf5d232acf4d9c795667017ab2c3fa3c298204bcf30edef2ac8db7cbfdf4deae19c3fb8efa11f5d49f040b0731924ad772daa2861563518e94c736d15a5ac7a9872008", &(0x7f00000008c0)=""/98, 0x51a, 0x0, 0x1b, 0x0, &(0x7f0000000940)="5a4fa68ec2c72f99361b9b501348d1d5bce04f26173ed66a605e0c", &(0x7f0000000980)}, 0x48) 04:38:51 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_ifreq(r0, 0x8942, &(0x7f0000000080)={'vlan0\x00', @ifru_mtu}) 04:38:51 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080)='SEG6\x00', 0xffffffffffffffff) sendmsg$SEG6_CMD_SET_TUNSRC(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000001c0)={0x14, r1, 0x1}, 0x14}}, 0x0) 04:38:51 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x8946, &(0x7f0000001940)={'gre0\x00', &(0x7f0000001780)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast1, @multicast2}}}}) 04:38:51 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000040)='devlink\x00', 0xffffffffffffffff) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x0, 0x0, {}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x8e, 0x1}, {0xc, 0x8f, 0x4}, {0xc, 0x90, 0xd4}}]}, 0x54}}, 0x0) 04:38:51 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x29, 0x1d, 0x0, 0x300) 04:38:51 executing program 4: openat$pfkey(0xffffffffffffff9c, &(0x7f0000001780)='/proc/self/net/pfkey\x00', 0x200000, 0x0) 04:38:51 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x30, &(0x7f0000000040)={0x0, {{0x2, 0x0, @multicast2}}}, 0x5000) 04:38:51 executing program 3: bpf$BPF_LINK_CREATE(0xa, 0x0, 0x0) 04:38:51 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_DEV(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000500)=ANY=[@ANYBLOB="880000007ec476"], 0x88}}, 0x0) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000)='nl802154\x00', 0xffffffffffffffff) syz_genetlink_get_family_id$nl802154(&(0x7f00000002c0)='nl802154\x00', r0) sendmsg$NL802154_CMD_SET_CCA_ED_LEVEL(r0, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000640)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="01b3677e6d352b00080001"], 0x24}}, 0x0) syz_genetlink_get_family_id$nl802154(&(0x7f0000000140)='nl802154\x00', r0) 04:38:51 executing program 4: r0 = socket$rxrpc(0x21, 0x2, 0xa) connect$rxrpc(r0, &(0x7f0000000280)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @private2}}, 0x24) 04:38:51 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000040)='devlink\x00', 0xffffffffffffffff) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x0, 0x0, {}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x8e, 0x1}, {0xc, 0x8f, 0x4}, {0xc, 0x90, 0xd4}}]}, 0x54}}, 0x0) [ 615.992399][T24751] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.2'. [ 616.082714][T24754] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.2'. 04:38:52 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) r3 = socket$kcm(0x29, 0x7, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xa, 0x2, 0x400, 0xc}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000140), &(0x7f00000000c0), 0x1081, r4}, 0x38) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000000480), 0x8) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000006c0)=@bpf_ext={0x1c, 0x6, &(0x7f0000000100)=@raw=[@initr0, @map={0x18, 0x3, 0x1, 0x0, r4}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}], 0x0, 0x1, 0xf8, &(0x7f0000000580)=""/248, 0x0, 0x18, [], 0x0, 0x0, r5, 0x8, &(0x7f0000000500)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000680)={0x0, 0x3, 0x32c96647, 0x9}, 0x10, 0x28c14, r2}, 0x78) sendmsg$kcm(r3, &(0x7f00000004c0)={&(0x7f00000003c0)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, 0x0, 0x0, &(0x7f0000000bc0)=[{0x58, 0x0, 0x3f, "3d036b2fe1c920e033fd51a7135bc633687035d4990a07405974e24f3e4f5bc747dd8cb833517dba325fb8357ec60f4b737260519cbec967f1e58025da9b5821975edd2eb5ce"}, {0x20, 0x116, 0x100, "e12e82da376bca8fa03c53062e627e"}, {0x10, 0x0, 0xa11}, {0x88, 0x109, 0x0, "48dcf8c1cb65b735b2d5007004b54696aa2a8d0eb98210cf2936121163b1c0584580900f864f0ebc03ba1675bbb924fa22af1c7933e3ea0fe010ebefceaa2fd20e15b805012fd2d7a3e171a57996dc09dc5df4ce65f0c01e583247522e22d559c831115bca323aa68746a2dd9dc875023459b72ec5"}, {0x40, 0x88, 0x39, "e91254173524b71a6cf4982e471433e79bae7c4a781a2a354e5dcee630a99252345f0fe48a629be09093e130c018"}], 0x150}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000002c0)='block_bio_queue\x00'}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r1, 0x12, 0x1, 0x0, 0x0}, 0x20) r6 = openat$cgroup_ro(r0, &(0x7f0000000300)='cpuset.effective_mems\x00', 0x0, 0x0) openat$cgroup_freezer_state(r6, &(0x7f0000000380)='freezer.state\x00', 0x2, 0x0) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) socket$kcm(0x2b, 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a80)={0xffffffffffffffff, 0x0, 0x67, 0x62, &(0x7f0000000840)="f99a133c46d257d5200f326d0a5562cd17685e886bf2f9b3f9a2790348e08bc05a864a96cf5d232acf4d9c795667017ab2c3fa3c298204bcf30edef2ac8db7cbfdf4deae19c3fb8efa11f5d49f040b0731924ad772daa2861563518e94c736d15a5ac7a9872008", &(0x7f00000008c0)=""/98, 0x51a, 0x0, 0x1b, 0x0, &(0x7f0000000940)="5a4fa68ec2c72f99361b9b501348d1d5bce04f26173ed66a605e0c", &(0x7f0000000980)}, 0x48) 04:38:52 executing program 5: clock_gettime(0x80010000, 0x0) 04:38:52 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x7) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000040)) 04:38:52 executing program 4: r0 = socket(0x11, 0x802, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r0, 0x84, 0x1c, 0x0, 0x0) 04:38:52 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000040)='devlink\x00', 0xffffffffffffffff) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x0, 0x0, {}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x8e, 0x1}, {0xc, 0x8f, 0x4}, {0xc, 0x90, 0xd4}}]}, 0x54}}, 0x0) 04:38:52 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_DEV(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000500)=ANY=[@ANYBLOB="880000007ec476"], 0x88}}, 0x0) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000)='nl802154\x00', 0xffffffffffffffff) syz_genetlink_get_family_id$nl802154(&(0x7f00000002c0)='nl802154\x00', r0) sendmsg$NL802154_CMD_SET_CCA_ED_LEVEL(r0, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000640)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="01b3677e6d352b00080001"], 0x24}}, 0x0) syz_genetlink_get_family_id$nl802154(&(0x7f0000000140)='nl802154\x00', r0) 04:38:52 executing program 5: fanotify_mark(0xffffffffffffffff, 0x26, 0x40000009, 0xffffffffffffffff, 0x0) 04:38:52 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCOUTQ(r0, 0x5411, &(0x7f00000001c0)) 04:38:52 executing program 3: syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x0, 0x400) [ 616.717799][T24765] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.2'. 04:38:52 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000040)='devlink\x00', 0xffffffffffffffff) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x0, 0x0, {}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x8e, 0x1}, {0xc, 0x8f, 0x4}, {0xc, 0x90, 0xd4}}]}, 0x54}}, 0x0) 04:38:52 executing program 4: r0 = socket$qrtr(0x2a, 0x2, 0x0) getsockname$qrtr(r0, 0x0, 0x0) 04:38:52 executing program 5: getresuid(&(0x7f0000002040), &(0x7f0000002080), &(0x7f00000020c0)) 04:38:53 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) r3 = socket$kcm(0x29, 0x7, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xa, 0x2, 0x400, 0xc}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000140), &(0x7f00000000c0), 0x1081, r4}, 0x38) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000000480), 0x8) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000006c0)=@bpf_ext={0x1c, 0x6, &(0x7f0000000100)=@raw=[@initr0, @map={0x18, 0x3, 0x1, 0x0, r4}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}], 0x0, 0x1, 0xf8, &(0x7f0000000580)=""/248, 0x0, 0x18, [], 0x0, 0x0, r5, 0x8, &(0x7f0000000500)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000680)={0x0, 0x3, 0x32c96647, 0x9}, 0x10, 0x28c14, r2}, 0x78) sendmsg$kcm(r3, &(0x7f00000004c0)={&(0x7f00000003c0)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, 0x0, 0x0, &(0x7f0000000bc0)=[{0x58, 0x0, 0x3f, "3d036b2fe1c920e033fd51a7135bc633687035d4990a07405974e24f3e4f5bc747dd8cb833517dba325fb8357ec60f4b737260519cbec967f1e58025da9b5821975edd2eb5ce"}, {0x20, 0x116, 0x100, "e12e82da376bca8fa03c53062e627e"}, {0x10, 0x0, 0xa11}, {0x88, 0x109, 0x0, "48dcf8c1cb65b735b2d5007004b54696aa2a8d0eb98210cf2936121163b1c0584580900f864f0ebc03ba1675bbb924fa22af1c7933e3ea0fe010ebefceaa2fd20e15b805012fd2d7a3e171a57996dc09dc5df4ce65f0c01e583247522e22d559c831115bca323aa68746a2dd9dc875023459b72ec5"}, {0x40, 0x88, 0x39, "e91254173524b71a6cf4982e471433e79bae7c4a781a2a354e5dcee630a99252345f0fe48a629be09093e130c018"}], 0x150}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000002c0)='block_bio_queue\x00'}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r1, 0x12, 0x1, 0x0, 0x0}, 0x20) r6 = openat$cgroup_ro(r0, &(0x7f0000000300)='cpuset.effective_mems\x00', 0x0, 0x0) openat$cgroup_freezer_state(r6, &(0x7f0000000380)='freezer.state\x00', 0x2, 0x0) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) socket$kcm(0x2b, 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a80)={0xffffffffffffffff, 0x0, 0x67, 0x62, &(0x7f0000000840)="f99a133c46d257d5200f326d0a5562cd17685e886bf2f9b3f9a2790348e08bc05a864a96cf5d232acf4d9c795667017ab2c3fa3c298204bcf30edef2ac8db7cbfdf4deae19c3fb8efa11f5d49f040b0731924ad772daa2861563518e94c736d15a5ac7a9872008", &(0x7f00000008c0)=""/98, 0x51a, 0x0, 0x1b, 0x0, &(0x7f0000000940)="5a4fa68ec2c72f99361b9b501348d1d5bce04f26173ed66a605e0c", &(0x7f0000000980)}, 0x48) 04:38:53 executing program 3: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x2, 0x0) 04:38:53 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_DEV(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000500)=ANY=[@ANYBLOB="880000007ec476"], 0x88}}, 0x0) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000)='nl802154\x00', 0xffffffffffffffff) syz_genetlink_get_family_id$nl802154(&(0x7f00000002c0)='nl802154\x00', r0) sendmsg$NL802154_CMD_SET_CCA_ED_LEVEL(r0, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000640)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="01b3677e6d352b00080001"], 0x24}}, 0x0) syz_genetlink_get_family_id$nl802154(&(0x7f0000000140)='nl802154\x00', r0) 04:38:53 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) accept$nfc_llcp(r0, 0x0, 0x0) 04:38:53 executing program 4: openat$sysctl(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/tcp_window_scaling\x00', 0x1, 0x0) 04:38:53 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100)='nl80211\x00', 0xffffffffffffffff) sendmsg$NL80211_CMD_TDLS_MGMT(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000004c0)={0x24, r1, 0x1, 0x0, 0x0, {{}, {@void, @void}}, [@NL80211_ATTR_IE={0xf, 0x2a, [@supported_rates={0x1, 0xe}, @mesh_config={0x71, 0x7}]}]}, 0x24}}, 0x0) 04:38:53 executing program 5: socket$can_raw(0x1d, 0x15, 0x1) 04:38:53 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x8915, &(0x7f0000001940)={'gre0\x00', 0x0}) 04:38:53 executing program 3: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/snd/seq\x00', 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x80045301, &(0x7f0000000200)) [ 617.569152][T24793] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.2'. 04:38:53 executing program 5: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, r0) keyctl$unlink(0x9, r1, r0) 04:38:53 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x9, 0x3, &(0x7f00000001c0)=@framed, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={0x0, r0}, 0x10) 04:38:53 executing program 1: socketpair(0x0, 0x6, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, 0x0) bpf$ITER_CREATE(0x21, 0x0, 0x0) socketpair(0x2c, 0x0, 0x2, 0x0) ioctl$sock_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002500)=@bpf_lsm={0x1d, 0x3, &(0x7f0000002400)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}, &(0x7f0000002440)='GPL\x00', 0x2, 0x0, 0x0, 0x0, 0x11, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 04:38:53 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) r3 = socket$kcm(0x29, 0x7, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xa, 0x2, 0x400, 0xc}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000140), &(0x7f00000000c0), 0x1081, r4}, 0x38) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000000480), 0x8) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000006c0)=@bpf_ext={0x1c, 0x6, &(0x7f0000000100)=@raw=[@initr0, @map={0x18, 0x3, 0x1, 0x0, r4}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}], 0x0, 0x1, 0xf8, &(0x7f0000000580)=""/248, 0x0, 0x18, [], 0x0, 0x0, r5, 0x8, &(0x7f0000000500)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000680)={0x0, 0x3, 0x32c96647, 0x9}, 0x10, 0x28c14, r2}, 0x78) sendmsg$kcm(r3, &(0x7f00000004c0)={&(0x7f00000003c0)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, 0x0, 0x0, &(0x7f0000000bc0)=[{0x58, 0x0, 0x3f, "3d036b2fe1c920e033fd51a7135bc633687035d4990a07405974e24f3e4f5bc747dd8cb833517dba325fb8357ec60f4b737260519cbec967f1e58025da9b5821975edd2eb5ce"}, {0x20, 0x116, 0x100, "e12e82da376bca8fa03c53062e627e"}, {0x10, 0x0, 0xa11}, {0x88, 0x109, 0x0, "48dcf8c1cb65b735b2d5007004b54696aa2a8d0eb98210cf2936121163b1c0584580900f864f0ebc03ba1675bbb924fa22af1c7933e3ea0fe010ebefceaa2fd20e15b805012fd2d7a3e171a57996dc09dc5df4ce65f0c01e583247522e22d559c831115bca323aa68746a2dd9dc875023459b72ec5"}, {0x40, 0x88, 0x39, "e91254173524b71a6cf4982e471433e79bae7c4a781a2a354e5dcee630a99252345f0fe48a629be09093e130c018"}], 0x150}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000002c0)='block_bio_queue\x00'}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r1, 0x12, 0x1, 0x0, 0x0}, 0x20) r6 = openat$cgroup_ro(r0, &(0x7f0000000300)='cpuset.effective_mems\x00', 0x0, 0x0) openat$cgroup_freezer_state(r6, &(0x7f0000000380)='freezer.state\x00', 0x2, 0x0) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) socket$kcm(0x2b, 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a80)={0xffffffffffffffff, 0x0, 0x67, 0x62, &(0x7f0000000840)="f99a133c46d257d5200f326d0a5562cd17685e886bf2f9b3f9a2790348e08bc05a864a96cf5d232acf4d9c795667017ab2c3fa3c298204bcf30edef2ac8db7cbfdf4deae19c3fb8efa11f5d49f040b0731924ad772daa2861563518e94c736d15a5ac7a9872008", &(0x7f00000008c0)=""/98, 0x51a, 0x0, 0x1b, 0x0, &(0x7f0000000940)="5a4fa68ec2c72f99361b9b501348d1d5bce04f26173ed66a605e0c", &(0x7f0000000980)}, 0x48) 04:38:53 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x9, 0x3, &(0x7f00000001c0)=@framed, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x3, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 04:38:53 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x18, 0x3, &(0x7f0000000200)=@framed, &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 04:38:53 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$SMC_PNETID_GET(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) 04:38:53 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_DEV(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000500)=ANY=[@ANYBLOB="880000007ec476"], 0x88}}, 0x0) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000)='nl802154\x00', 0xffffffffffffffff) syz_genetlink_get_family_id$nl802154(&(0x7f00000002c0)='nl802154\x00', r0) sendmsg$NL802154_CMD_SET_CCA_ED_LEVEL(r0, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000640)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="01b3677e6d352b00080001"], 0x24}}, 0x0) syz_genetlink_get_family_id$nl802154(&(0x7f0000000140)='nl802154\x00', r0) 04:38:53 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_opts(r0, 0x0, 0x8, 0x0, &(0x7f0000004640)) 04:38:54 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002340)={&(0x7f0000001240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0x0, 0x1}]}]}}, &(0x7f0000001340)=""/4096, 0x36, 0x1000, 0x1}, 0x20) 04:38:54 executing program 5: socketpair(0x23, 0x0, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$ALG_SET_AEAD_AUTHSIZE(r0, 0x117, 0x5, 0x0, 0x0) r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002340)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002500)=@bpf_lsm={0x1d, 0x6, &(0x7f0000002400)=@framed={{0x18, 0x0, 0x0, 0x0, 0x200}, [@jmp={0x5, 0x0, 0xc, 0x0, 0xa, 0x20}, @initr0={0x18, 0x0, 0x0, 0x0, 0x6}]}, &(0x7f0000002440)='GPL\x00', 0x2, 0x0, 0x0, 0x41000, 0x11, [], 0x0, 0x1b, r1, 0x8, &(0x7f0000002480)={0x1}, 0x8, 0x10, 0x0}, 0x78) 04:38:54 executing program 4: r0 = socket$l2tp6(0xa, 0x2, 0x73) sendmsg$inet6(r0, &(0x7f0000001b80)={&(0x7f00000004c0)={0xa, 0x0, 0x0, @local, 0x6}, 0x1c, &(0x7f0000001780)=[{&(0x7f00000005c0)="f02c99ed7f4fab6464c66133e293bc948e3b47b6ed2a0aa9d470066b13237040863e4949de2cf0f7dea29c4dafc7e19cfdb3730c1bb7baed84a472986e0adb9ae7859a97e0b190f1b5265b4356958f248484a0476335ebfc30813debee74071270b0893da4eebb4af1eeb9cb7ecebc87fafb38529807c74f83971852e5f7a711856650f271874415fbff0c7238198d2e4c71bc08ca418e260ef07dc085eb82ff5a80da8f73a0", 0xa6}, {&(0x7f0000000680)="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", 0x43f}], 0x2, &(0x7f0000001a80)=[@hopopts={{0xc8, 0x29, 0x36, {0x0, 0x16, [], [@calipso={0x7, 0x50, {0x0, 0x12, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, @padn={0x1, 0x3, [0x0, 0x0, 0x0]}, @hao={0xc9, 0x10, @mcast2}, @jumbo, @generic={0x0, 0x3f, "61790de3e2297539e5ba35f42b0193ec385d7045de034ded8f16c53c60d359655bf26fed6361a9f6a3dd09e642fb7d0a443e74addc3b34f0e2e4956b3e6f6f"}]}}}], 0xc8}, 0x0) [ 618.383227][T24825] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.2'. 04:38:54 executing program 3: r0 = socket$l2tp(0x2, 0x2, 0x73) getsockopt$inet_opts(r0, 0x0, 0x0, 0x0, 0x0) 04:38:54 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockname$inet(r0, 0x0, &(0x7f0000000180)) 04:38:54 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002340)={&(0x7f0000001240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x7, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x1}, {0x6, 0x1}]}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x10, 0x0, 0xffff0369}]}]}, {0x0, [0x0, 0x0, 0x5f, 0x0, 0x0]}}, &(0x7f0000001340)=""/4096, 0x53, 0x1000, 0x1}, 0x20) 04:38:54 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) r3 = socket$kcm(0x29, 0x7, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xa, 0x2, 0x400, 0xc}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000140), &(0x7f00000000c0), 0x1081, r4}, 0x38) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000000480), 0x8) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000006c0)=@bpf_ext={0x1c, 0x6, &(0x7f0000000100)=@raw=[@initr0, @map={0x18, 0x3, 0x1, 0x0, r4}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}], 0x0, 0x1, 0xf8, &(0x7f0000000580)=""/248, 0x0, 0x18, [], 0x0, 0x0, r5, 0x8, &(0x7f0000000500)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000680)={0x0, 0x3, 0x32c96647, 0x9}, 0x10, 0x28c14, r2}, 0x78) sendmsg$kcm(r3, &(0x7f00000004c0)={&(0x7f00000003c0)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, 0x0, 0x0, &(0x7f0000000bc0)=[{0x58, 0x0, 0x3f, "3d036b2fe1c920e033fd51a7135bc633687035d4990a07405974e24f3e4f5bc747dd8cb833517dba325fb8357ec60f4b737260519cbec967f1e58025da9b5821975edd2eb5ce0e"}, {0x20, 0x116, 0x100, "e12e82da376bca8fa03c53062e627e"}, {0x10, 0x0, 0xa11}, {0x88, 0x109, 0x0, "48dcf8c1cb65b735b2d5007004b54696aa2a8d0eb98210cf2936121163b1c0584580900f864f0ebc03ba1675bbb924fa22af1c7933e3ea0fe010ebefceaa2fd20e15b805012fd2d7a3e171a57996dc09dc5df4ce65f0c01e583247522e22d559c831115bca323aa68746a2dd9dc875023459b72ec5"}, {0x40, 0x88, 0x39, "e91254173524b71a6cf4982e471433e79bae7c4a781a2a354e5dcee630a99252345f0fe48a629be09093e130c018"}], 0x150}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r1, 0x12, 0x1, 0x0, 0x0}, 0x20) r6 = openat$cgroup_ro(r0, &(0x7f0000000300)='cpuset.effective_mems\x00', 0x0, 0x0) openat$cgroup_freezer_state(r6, &(0x7f0000000380)='freezer.state\x00', 0x2, 0x0) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) socket$kcm(0x2b, 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a80)={0xffffffffffffffff, 0x0, 0x67, 0x62, &(0x7f0000000840)="f99a133c46d257d5200f326d0a5562cd17685e886bf2f9b3f9a2790348e08bc05a864a96cf5d232acf4d9c795667017ab2c3fa3c298204bcf30edef2ac8db7cbfdf4deae19c3fb8efa11f5d49f040b0731924ad772daa2861563518e94c736d15a5ac7a9872008", &(0x7f00000008c0)=""/98, 0x51a, 0x0, 0x1b, 0x0, &(0x7f0000000940)="5a4fa68ec2c72f99361b9b501348d1d5bce04f26173ed66a605e0c", &(0x7f0000000980)}, 0x48) 04:38:54 executing program 4: r0 = socket$l2tp6(0xa, 0x2, 0x73) sendmsg$inet6(r0, &(0x7f0000001b80)={&(0x7f00000004c0)={0xa, 0x0, 0x0, @local, 0x6}, 0x1c, &(0x7f0000001780)=[{&(0x7f00000005c0)="f02c99ed7f4fab6464c66133e293bc948e3b47b6ed2a0aa9d470066b13237040863e4949de2cf0f7dea29c4dafc7e19cfdb3730c1bb7baed84a472986e0adb9ae7859a97e0b190f1b5265b4356958f248484a0476335ebfc30813debee74071270b0893da4eebb4af1eeb9cb7ecebc87fafb38529807c74f83971852e5f7a711856650f271874415fbff0c7238198d2e4c71bc08ca418e260ef07dc085eb82ff5a80da8f73a0", 0xa6}, {&(0x7f0000000680)="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", 0x43f}], 0x2, &(0x7f0000001a80)=[@hopopts={{0xc8, 0x29, 0x36, {0x0, 0x16, [], [@calipso={0x7, 0x50, {0x0, 0x12, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, @padn={0x1, 0x3, [0x0, 0x0, 0x0]}, @hao={0xc9, 0x10, @mcast2}, @jumbo, @generic={0x0, 0x3f, "61790de3e2297539e5ba35f42b0193ec385d7045de034ded8f16c53c60d359655bf26fed6361a9f6a3dd09e642fb7d0a443e74addc3b34f0e2e4956b3e6f6f"}]}}}], 0xc8}, 0x0) 04:38:54 executing program 3: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000000)={0x0, {{0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, 0x88) 04:38:54 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_NOOP(r0, 0x0, 0x0) 04:38:54 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f0000000080)={'filter\x00'}, &(0x7f0000000100)=0x78) 04:38:54 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_opts(r0, 0x0, 0x6, 0x0, &(0x7f0000004640)) 04:38:54 executing program 3: bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00'}, 0x10) 04:38:54 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @remote}, {0x2, 0x0, @remote}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x0, 0x0, 0x20, &(0x7f0000000000)='veth0\x00'}) 04:38:54 executing program 4: pipe(&(0x7f0000000100)={0xffffffffffffffff}) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, 0x0) 04:38:54 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_opts(r0, 0x0, 0x14, 0x0, &(0x7f0000004640)) 04:38:55 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002340)={&(0x7f0000001240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x3c, 0x3c, 0x2, [@func_proto, @func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0xf}, {}]}, @const={0x6}]}}, &(0x7f0000001340)=""/4096, 0x56, 0x1000, 0x1}, 0x20) 04:38:55 executing program 3: bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x8) 04:38:55 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) r3 = socket$kcm(0x29, 0x7, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xa, 0x2, 0x400, 0xc}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000140), &(0x7f00000000c0), 0x1081, r4}, 0x38) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000000480), 0x8) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000006c0)=@bpf_ext={0x1c, 0x6, &(0x7f0000000100)=@raw=[@initr0, @map={0x18, 0x3, 0x1, 0x0, r4}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}], 0x0, 0x1, 0xf8, &(0x7f0000000580)=""/248, 0x0, 0x18, [], 0x0, 0x0, r5, 0x8, &(0x7f0000000500)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000680)={0x0, 0x3, 0x32c96647, 0x9}, 0x10, 0x28c14, r2}, 0x78) sendmsg$kcm(r3, &(0x7f00000004c0)={&(0x7f00000003c0)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, 0x0, 0x0, &(0x7f0000000bc0)=[{0x58, 0x0, 0x3f, "3d036b2fe1c920e033fd51a7135bc633687035d4990a07405974e24f3e4f5bc747dd8cb833517dba325fb8357ec60f4b737260519cbec967f1e58025da9b5821975edd2eb5ce0e"}, {0x20, 0x116, 0x100, "e12e82da376bca8fa03c53062e627e"}, {0x10, 0x0, 0xa11}, {0x88, 0x109, 0x0, "48dcf8c1cb65b735b2d5007004b54696aa2a8d0eb98210cf2936121163b1c0584580900f864f0ebc03ba1675bbb924fa22af1c7933e3ea0fe010ebefceaa2fd20e15b805012fd2d7a3e171a57996dc09dc5df4ce65f0c01e583247522e22d559c831115bca323aa68746a2dd9dc875023459b72ec5"}, {0x40, 0x88, 0x39, "e91254173524b71a6cf4982e471433e79bae7c4a781a2a354e5dcee630a99252345f0fe48a629be09093e130c018"}], 0x150}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r1, 0x12, 0x1, 0x0, 0x0}, 0x20) r6 = openat$cgroup_ro(r0, &(0x7f0000000300)='cpuset.effective_mems\x00', 0x0, 0x0) openat$cgroup_freezer_state(r6, &(0x7f0000000380)='freezer.state\x00', 0x2, 0x0) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) socket$kcm(0x2b, 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a80)={0xffffffffffffffff, 0x0, 0x67, 0x62, &(0x7f0000000840)="f99a133c46d257d5200f326d0a5562cd17685e886bf2f9b3f9a2790348e08bc05a864a96cf5d232acf4d9c795667017ab2c3fa3c298204bcf30edef2ac8db7cbfdf4deae19c3fb8efa11f5d49f040b0731924ad772daa2861563518e94c736d15a5ac7a9872008", &(0x7f00000008c0)=""/98, 0x51a, 0x0, 0x1b, 0x0, &(0x7f0000000940)="5a4fa68ec2c72f99361b9b501348d1d5bce04f26173ed66a605e0c", &(0x7f0000000980)}, 0x48) 04:38:55 executing program 5: connect$rds(0xffffffffffffffff, 0x0, 0x0) 04:38:55 executing program 4: r0 = socket$pppl2tp(0x18, 0x1, 0x1) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(r0, 0x111, 0x4, 0x0, 0x4) ioctl$PPPIOCGL2TPSTATS(r0, 0x80487436, &(0x7f0000000000)="9daa5208f246093ebc9382a9312546d55d89075af16bbea6efe01483763f3f3d4e4954af5d114c24fed14822cbbd7a905971bf2e2cf335c97276d1f674beb3979384882fadad4c699497a6a83a7c58273a0636a87a829549259cf94a2899770b0afa313232bed605d478c470f41fc79b6677b3e692e45582fc4a9622223404e169ce59d991e6227dee44d1fbfc91b97f8c076730b84ac78001915654920c") getsockopt$netrom_NETROM_N2(0xffffffffffffffff, 0x103, 0x3, &(0x7f00000000c0)=0x2, &(0x7f0000000100)=0x4) ioctl$PPPIOCGL2TPSTATS(r0, 0x80487436, &(0x7f0000000140)="bab8666cfc77f4208406978fb19c16e8e5791d6b784bc7d66b228d142f0a7faff18e9bf65da64f01b7bb1aa6699265b1b0dd313ac5980f6727d6f75aba66825bb546f63f6fc49eb9a41d7ac7b249f2b2fa9df85f81b181c226277be9ef80a83316006436c92280b661bf97973f89e396c6dba559cd6b4928b9b456398e0923bfb51904b993fa662c9f3f262e169d") sendmsg$DEVLINK_CMD_TRAP_GET(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000400)={&(0x7f0000000240)={0x1a8, 0x0, 0x8, 0x70bd26, 0x25dfdbfc, {}, [{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x1c, 0x82, 'source_mac_is_multicast\x00'}}, {@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x1c, 0x82, 'source_mac_is_multicast\x00'}}, {@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x1c, 0x82, 'source_mac_is_multicast\x00'}}, {@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x1c, 0x82, 'source_mac_is_multicast\x00'}}, {@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x1c, 0x82, 'source_mac_is_multicast\x00'}}, {@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x1c, 0x82, 'source_mac_is_multicast\x00'}}, {@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x1c, 0x82, 'source_mac_is_multicast\x00'}}]}, 0x1a8}, 0x1, 0x0, 0x0, 0x82}, 0x4040000) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f00000004c0)='NLBL_CALIPSO\x00', 0xffffffffffffffff) sendmsg$NLBL_CALIPSO_C_LISTALL(r1, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x24, r2, 0x300, 0x70bd29, 0x25dfdbfc, {}, [@NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_DOI={0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x20000880}, 0x81) r3 = socket$pppl2tp(0x18, 0x1, 0x1) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(r3, 0x111, 0x4, 0x1, 0x4) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 04:38:55 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000002000)=[{{&(0x7f0000000000)={0xa, 0x4e22, 0x0, @dev}, 0x1c, 0x0}}, {{&(0x7f00000005c0)={0xa, 0x0, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x0) 04:38:55 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002340)={&(0x7f0000001240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x0, 0x3}]}]}}, &(0x7f0000001340)=""/4096, 0x2e, 0x1000, 0x1}, 0x20) 04:38:55 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockname$inet(r0, &(0x7f0000000040)={0x2, 0x0, @multicast2}, &(0x7f0000000180)=0x10) 04:38:55 executing program 5: select(0x40, &(0x7f0000000000), 0x0, &(0x7f0000000080)={0x2294}, &(0x7f0000000100)) 04:38:55 executing program 3: socketpair(0x28, 0x0, 0x71, &(0x7f0000000040)) 04:38:55 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000003c0)={0xa, 0x0, 0x0, @mcast2, 0x7}, 0x1c) write(r0, &(0x7f0000000280)="3c4b4c5f73d8", 0x37) 04:38:55 executing program 2: socketpair(0x22, 0x0, 0x0, &(0x7f0000000300)) 04:38:55 executing program 1: syz_genetlink_get_family_id$ethtool(&(0x7f0000000380)='ethtool\x00', 0xffffffffffffffff) 04:38:55 executing program 3: sendmsg$AUDIT_SET(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) socketpair(0x1e, 0x0, 0x0, &(0x7f0000000100)) syz_genetlink_get_family_id$nl80211(&(0x7f00000002c0)='nl80211\x00', 0xffffffffffffffff) syz_genetlink_get_family_id$ethtool(&(0x7f0000000380)='ethtool\x00', 0xffffffffffffffff) 04:38:56 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) r3 = socket$kcm(0x29, 0x7, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xa, 0x2, 0x400, 0xc}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000140), &(0x7f00000000c0), 0x1081, r4}, 0x38) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000000480), 0x8) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000006c0)=@bpf_ext={0x1c, 0x6, &(0x7f0000000100)=@raw=[@initr0, @map={0x18, 0x3, 0x1, 0x0, r4}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}], 0x0, 0x1, 0xf8, &(0x7f0000000580)=""/248, 0x0, 0x18, [], 0x0, 0x0, r5, 0x8, &(0x7f0000000500)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000680)={0x0, 0x3, 0x32c96647, 0x9}, 0x10, 0x28c14, r2}, 0x78) sendmsg$kcm(r3, &(0x7f00000004c0)={&(0x7f00000003c0)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, 0x0, 0x0, &(0x7f0000000bc0)=[{0x58, 0x0, 0x3f, "3d036b2fe1c920e033fd51a7135bc633687035d4990a07405974e24f3e4f5bc747dd8cb833517dba325fb8357ec60f4b737260519cbec967f1e58025da9b5821975edd2eb5ce0e"}, {0x20, 0x116, 0x100, "e12e82da376bca8fa03c53062e627e"}, {0x10, 0x0, 0xa11}, {0x88, 0x109, 0x0, "48dcf8c1cb65b735b2d5007004b54696aa2a8d0eb98210cf2936121163b1c0584580900f864f0ebc03ba1675bbb924fa22af1c7933e3ea0fe010ebefceaa2fd20e15b805012fd2d7a3e171a57996dc09dc5df4ce65f0c01e583247522e22d559c831115bca323aa68746a2dd9dc875023459b72ec5"}, {0x40, 0x88, 0x39, "e91254173524b71a6cf4982e471433e79bae7c4a781a2a354e5dcee630a99252345f0fe48a629be09093e130c018"}], 0x150}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r1, 0x12, 0x1, 0x0, 0x0}, 0x20) r6 = openat$cgroup_ro(r0, &(0x7f0000000300)='cpuset.effective_mems\x00', 0x0, 0x0) openat$cgroup_freezer_state(r6, &(0x7f0000000380)='freezer.state\x00', 0x2, 0x0) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) socket$kcm(0x2b, 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a80)={0xffffffffffffffff, 0x0, 0x67, 0x62, &(0x7f0000000840)="f99a133c46d257d5200f326d0a5562cd17685e886bf2f9b3f9a2790348e08bc05a864a96cf5d232acf4d9c795667017ab2c3fa3c298204bcf30edef2ac8db7cbfdf4deae19c3fb8efa11f5d49f040b0731924ad772daa2861563518e94c736d15a5ac7a9872008", &(0x7f00000008c0)=""/98, 0x51a, 0x0, 0x1b, 0x0, &(0x7f0000000940)="5a4fa68ec2c72f99361b9b501348d1d5bce04f26173ed66a605e0c", &(0x7f0000000980)}, 0x48) 04:38:56 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x9, 0x3, &(0x7f00000001c0)=@framed, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x18, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 04:38:56 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_opts(r0, 0x0, 0x29, 0x0, &(0x7f0000004640)) 04:38:56 executing program 3: socketpair(0x23, 0x0, 0x0, 0x0) setsockopt$ALG_SET_AEAD_AUTHSIZE(0xffffffffffffffff, 0x117, 0x5, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, 0x0) sendmsg$ETHTOOL_MSG_CHANNELS_SET(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002500)=@bpf_lsm={0x1d, 0x3, &(0x7f0000002400)=@framed, &(0x7f0000002440)='GPL\x00', 0x2, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 04:38:56 executing program 2: pipe(&(0x7f00000011c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000480)=@bpf_tracing={0x1a, 0x3, &(0x7f0000000280)=@framed, &(0x7f00000002c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r0}, 0x78) 04:38:56 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_opts(r0, 0x84, 0x0, 0x0, 0x0) 04:38:56 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002340)={&(0x7f0000001240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x7, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x1}, {0x6, 0x1}]}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x4, 0xffff0369}]}]}, {0x0, [0x0, 0x0, 0x5f, 0x0, 0x0]}}, &(0x7f0000001340)=""/4096, 0x53, 0x1000, 0x1}, 0x20) 04:38:56 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x54}}, 0x0) 04:38:56 executing program 3: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000000580)=[{{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="8224", 0x2}], 0x1}}], 0x1, 0x40008000) write(r0, &(0x7f0000000280)="3c4b4c5f73d8", 0x37) 04:38:56 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002340)={&(0x7f0000001240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x7, [@func_proto, @func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0xf}, {}]}, @const={0x6}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000001340)=""/4096, 0x53, 0x1000, 0x1}, 0x20) 04:38:56 executing program 2: pipe(&(0x7f00000011c0)) 04:38:56 executing program 5: pipe(&(0x7f00000011c0)={0xffffffffffffffff, 0xffffffffffffffff}) accept$inet(r0, 0x0, 0x0) 04:38:57 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) r3 = socket$kcm(0x29, 0x7, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xa, 0x2, 0x400, 0xc}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000140), &(0x7f00000000c0), 0x1081, r4}, 0x38) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000000480), 0x8) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000006c0)=@bpf_ext={0x1c, 0x6, &(0x7f0000000100)=@raw=[@initr0, @map={0x18, 0x3, 0x1, 0x0, r4}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}], 0x0, 0x1, 0xf8, &(0x7f0000000580)=""/248, 0x0, 0x18, [], 0x0, 0x0, r5, 0x8, &(0x7f0000000500)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000680)={0x0, 0x3, 0x32c96647, 0x9}, 0x10, 0x28c14, r2}, 0x78) sendmsg$kcm(r3, &(0x7f00000004c0)={&(0x7f00000003c0)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, 0x0, 0x0, &(0x7f0000000bc0)=[{0x58, 0x0, 0x3f, "3d036b2fe1c920e033fd51a7135bc633687035d4990a07405974e24f3e4f5bc747dd8cb833517dba325fb8357ec60f4b737260519cbec967f1e58025da9b5821975edd2eb5ce0e"}, {0x20, 0x116, 0x100, "e12e82da376bca8fa03c53062e627e"}, {0x10, 0x0, 0xa11}, {0x88, 0x109, 0x0, "48dcf8c1cb65b735b2d5007004b54696aa2a8d0eb98210cf2936121163b1c0584580900f864f0ebc03ba1675bbb924fa22af1c7933e3ea0fe010ebefceaa2fd20e15b805012fd2d7a3e171a57996dc09dc5df4ce65f0c01e583247522e22d559c831115bca323aa68746a2dd9dc875023459b72ec5"}, {0x40, 0x88, 0x39, "e91254173524b71a6cf4982e471433e79bae7c4a781a2a354e5dcee630a99252345f0fe48a629be09093e130c018"}], 0x150}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={0x0}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r1, 0x12, 0x1, 0x0, 0x0}, 0x20) r6 = openat$cgroup_ro(r0, &(0x7f0000000300)='cpuset.effective_mems\x00', 0x0, 0x0) openat$cgroup_freezer_state(r6, &(0x7f0000000380)='freezer.state\x00', 0x2, 0x0) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) socket$kcm(0x2b, 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a80)={0xffffffffffffffff, 0x0, 0x67, 0x62, &(0x7f0000000840)="f99a133c46d257d5200f326d0a5562cd17685e886bf2f9b3f9a2790348e08bc05a864a96cf5d232acf4d9c795667017ab2c3fa3c298204bcf30edef2ac8db7cbfdf4deae19c3fb8efa11f5d49f040b0731924ad772daa2861563518e94c736d15a5ac7a9872008", &(0x7f00000008c0)=""/98, 0x51a, 0x0, 0x1b, 0x0, &(0x7f0000000940)="5a4fa68ec2c72f99361b9b501348d1d5bce04f26173ed66a605e0c", &(0x7f0000000980)}, 0x48) 04:38:57 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002340)={&(0x7f0000001240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f0000001340)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 04:38:57 executing program 3: openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x1c0, 0x0) 04:38:57 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x18, 0x3, &(0x7f0000000200)=@framed, &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x2, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 04:38:57 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000000440)=[{{&(0x7f0000000280)={0xa, 0x4e24, 0x0, @mcast2}, 0x1c, 0x0, 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB="b002"], 0x2b0}}, {{&(0x7f00000000c0)={0xa, 0x4e24, 0x0, @private2, 0x5}, 0x1c, 0x0, 0x0, &(0x7f00000002c0)=[@dontfrag={{0x14, 0x29, 0x3e, 0x3}}], 0x18}}], 0x2, 0x0) 04:38:57 executing program 2: r0 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000)='nl802154\x00', 0xffffffffffffffff) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_CCA_ED_LEVEL(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)={0x1c, r0, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x8}]}, 0x1c}}, 0x0) 04:38:57 executing program 4: socketpair(0xa, 0x0, 0x0, &(0x7f0000000240)) 04:38:57 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002500)=@bpf_lsm={0x1d, 0x4, &(0x7f0000002400)=@framed={{}, [@jmp]}, &(0x7f0000002440)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 04:38:57 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002340)={&(0x7f0000001240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{}]}]}}, &(0x7f0000001340)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 04:38:57 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_opts(r0, 0x0, 0x84, 0x0, &(0x7f0000004640)) 04:38:57 executing program 1: syz_genetlink_get_family_id$smc(&(0x7f0000000040)='SMC_PNETID\x00', 0xffffffffffffffff) 04:38:57 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000000440)=[{{&(0x7f0000000280)={0xa, 0x4e24, 0x0, @mcast2}, 0x1c, 0x0, 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB="b002"], 0x2b0}}, {{&(0x7f00000000c0)={0xa, 0x0, 0x0, @private2}, 0x1c, 0x0}}], 0x2, 0x0) 04:38:58 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) r3 = socket$kcm(0x29, 0x7, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xa, 0x2, 0x400, 0xc}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000140), &(0x7f00000000c0), 0x1081, r4}, 0x38) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000000480), 0x8) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000006c0)=@bpf_ext={0x1c, 0x6, &(0x7f0000000100)=@raw=[@initr0, @map={0x18, 0x3, 0x1, 0x0, r4}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}], 0x0, 0x1, 0xf8, &(0x7f0000000580)=""/248, 0x0, 0x18, [], 0x0, 0x0, r5, 0x8, &(0x7f0000000500)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000680)={0x0, 0x3, 0x32c96647, 0x9}, 0x10, 0x28c14, r2}, 0x78) sendmsg$kcm(r3, &(0x7f00000004c0)={&(0x7f00000003c0)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, 0x0, 0x0, &(0x7f0000000bc0)=[{0x58, 0x0, 0x3f, "3d036b2fe1c920e033fd51a7135bc633687035d4990a07405974e24f3e4f5bc747dd8cb833517dba325fb8357ec60f4b737260519cbec967f1e58025da9b5821975edd2eb5ce0e"}, {0x20, 0x116, 0x100, "e12e82da376bca8fa03c53062e627e"}, {0x10, 0x0, 0xa11}, {0x88, 0x109, 0x0, "48dcf8c1cb65b735b2d5007004b54696aa2a8d0eb98210cf2936121163b1c0584580900f864f0ebc03ba1675bbb924fa22af1c7933e3ea0fe010ebefceaa2fd20e15b805012fd2d7a3e171a57996dc09dc5df4ce65f0c01e583247522e22d559c831115bca323aa68746a2dd9dc875023459b72ec5"}, {0x40, 0x88, 0x39, "e91254173524b71a6cf4982e471433e79bae7c4a781a2a354e5dcee630a99252345f0fe48a629be09093e130c018"}], 0x150}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={0x0}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r1, 0x12, 0x1, 0x0, 0x0}, 0x20) r6 = openat$cgroup_ro(r0, &(0x7f0000000300)='cpuset.effective_mems\x00', 0x0, 0x0) openat$cgroup_freezer_state(r6, &(0x7f0000000380)='freezer.state\x00', 0x2, 0x0) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) socket$kcm(0x2b, 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a80)={0xffffffffffffffff, 0x0, 0x67, 0x62, &(0x7f0000000840)="f99a133c46d257d5200f326d0a5562cd17685e886bf2f9b3f9a2790348e08bc05a864a96cf5d232acf4d9c795667017ab2c3fa3c298204bcf30edef2ac8db7cbfdf4deae19c3fb8efa11f5d49f040b0731924ad772daa2861563518e94c736d15a5ac7a9872008", &(0x7f00000008c0)=""/98, 0x51a, 0x0, 0x1b, 0x0, &(0x7f0000000940)="5a4fa68ec2c72f99361b9b501348d1d5bce04f26173ed66a605e0c", &(0x7f0000000980)}, 0x48) 04:38:58 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002340)={&(0x7f0000001240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x2c, 0x2c, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x0, 0x3}]}, @union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x4}]}]}}, &(0x7f0000001340)=""/4096, 0x46, 0x1000, 0x1}, 0x20) 04:38:58 executing program 3: pipe(&(0x7f00000011c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$ppp(r0, 0x0, 0x0) 04:38:58 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002340)={&(0x7f0000001240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@const]}}, &(0x7f0000001340)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 04:38:58 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @remote}, {0x2, 0x0, @remote}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x0, 0x0, 0x20}) 04:38:58 executing program 1: bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) 04:38:58 executing program 5: r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)=[{0x0}, {0x0}], 0x2}, 0x4) 04:38:58 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002340)={0x0, &(0x7f0000001340)=""/4096, 0x0, 0x1000}, 0x20) 04:38:58 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000000), &(0x7f0000000040)=0x4) 04:38:58 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x9, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 04:38:58 executing program 5: socket$can_bcm(0x1d, 0x2, 0x2) r0 = socket$phonet_pipe(0x23, 0x5, 0x2) recvmsg(r0, &(0x7f0000002900)={&(0x7f0000002700)=@un=@abs, 0x80, &(0x7f00000027c0)=[{0x0}], 0x1}, 0x0) pipe(&(0x7f0000002940)) syz_genetlink_get_family_id$ethtool(&(0x7f0000002c40)='ethtool\x00', 0xffffffffffffffff) 04:38:58 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_opts(r0, 0x0, 0xf, 0x0, &(0x7f0000004640)) 04:38:59 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) r3 = socket$kcm(0x29, 0x7, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xa, 0x2, 0x400, 0xc}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000140), &(0x7f00000000c0), 0x1081, r4}, 0x38) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000000480), 0x8) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000006c0)=@bpf_ext={0x1c, 0x6, &(0x7f0000000100)=@raw=[@initr0, @map={0x18, 0x3, 0x1, 0x0, r4}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}], 0x0, 0x1, 0xf8, &(0x7f0000000580)=""/248, 0x0, 0x18, [], 0x0, 0x0, r5, 0x8, &(0x7f0000000500)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000680)={0x0, 0x3, 0x32c96647, 0x9}, 0x10, 0x28c14, r2}, 0x78) sendmsg$kcm(r3, &(0x7f00000004c0)={&(0x7f00000003c0)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, 0x0, 0x0, &(0x7f0000000bc0)=[{0x58, 0x0, 0x3f, "3d036b2fe1c920e033fd51a7135bc633687035d4990a07405974e24f3e4f5bc747dd8cb833517dba325fb8357ec60f4b737260519cbec967f1e58025da9b5821975edd2eb5ce0e"}, {0x20, 0x116, 0x100, "e12e82da376bca8fa03c53062e627e"}, {0x10, 0x0, 0xa11}, {0x88, 0x109, 0x0, "48dcf8c1cb65b735b2d5007004b54696aa2a8d0eb98210cf2936121163b1c0584580900f864f0ebc03ba1675bbb924fa22af1c7933e3ea0fe010ebefceaa2fd20e15b805012fd2d7a3e171a57996dc09dc5df4ce65f0c01e583247522e22d559c831115bca323aa68746a2dd9dc875023459b72ec5"}, {0x40, 0x88, 0x39, "e91254173524b71a6cf4982e471433e79bae7c4a781a2a354e5dcee630a99252345f0fe48a629be09093e130c018"}], 0x150}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={0x0}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r1, 0x12, 0x1, 0x0, 0x0}, 0x20) r6 = openat$cgroup_ro(r0, &(0x7f0000000300)='cpuset.effective_mems\x00', 0x0, 0x0) openat$cgroup_freezer_state(r6, &(0x7f0000000380)='freezer.state\x00', 0x2, 0x0) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) socket$kcm(0x2b, 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a80)={0xffffffffffffffff, 0x0, 0x67, 0x62, &(0x7f0000000840)="f99a133c46d257d5200f326d0a5562cd17685e886bf2f9b3f9a2790348e08bc05a864a96cf5d232acf4d9c795667017ab2c3fa3c298204bcf30edef2ac8db7cbfdf4deae19c3fb8efa11f5d49f040b0731924ad772daa2861563518e94c736d15a5ac7a9872008", &(0x7f00000008c0)=""/98, 0x51a, 0x0, 0x1b, 0x0, &(0x7f0000000940)="5a4fa68ec2c72f99361b9b501348d1d5bce04f26173ed66a605e0c", &(0x7f0000000980)}, 0x48) 04:38:59 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000000800)=[{{&(0x7f0000000280)={0xa, 0x4e24, 0x0, @mcast2}, 0x1c, 0x0, 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB="b002"], 0x2b0}}], 0x1, 0x80fe) 04:38:59 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002340)={&(0x7f0000001240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@func_proto, @func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {}, {}]}]}}, &(0x7f0000001340)=""/4096, 0x4a, 0x1000, 0x1}, 0x20) 04:38:59 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x9, 0x5, &(0x7f0000000040)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, 0x1}]}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 04:38:59 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) ioctl$sock_SIOCADDRT(r0, 0x890b, 0x0) 04:38:59 executing program 2: socket$inet(0x2, 0x0, 0xffff8001) 04:38:59 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_opts(r0, 0x0, 0x2, 0x0, &(0x7f0000004640)) 04:38:59 executing program 5: socketpair(0x0, 0x0, 0x0, &(0x7f0000000280)) setsockopt$ALG_SET_AEAD_AUTHSIZE(0xffffffffffffffff, 0x117, 0x5, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)={'batadv0\x00'}) sendmsg$AUDIT_GET(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_CHANNELS_SET(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002500)=@bpf_lsm={0x1d, 0x4, &(0x7f0000002400)=@framed={{}, [@jmp={0x5, 0x0, 0x0, 0x0, 0xa, 0x0, 0xfffffffffffffff0}]}, &(0x7f0000002440)='GPL\x00', 0x2, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 04:38:59 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000002000)=[{{&(0x7f0000000000)={0xa, 0x4e22, 0x0, @dev}, 0x1c, 0x0}}, {{0x0, 0x0, &(0x7f0000000d40)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}}], 0x2, 0x0) 04:38:59 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002340)={&(0x7f0000001240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@const]}, {0x0, [0x2e, 0x30, 0x5f, 0x0, 0x0]}}, &(0x7f0000001340)=""/4096, 0x2b, 0x1000, 0x1}, 0x20) 04:38:59 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz1\x00', 0x200002, 0x0) 04:38:59 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) [ 623.900405][ T3269] ieee802154 phy0 wpan0: encryption failed: -22 [ 623.906761][ T3269] ieee802154 phy1 wpan1: encryption failed: -22 04:38:59 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) r3 = socket$kcm(0x29, 0x7, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xa, 0x2, 0x400, 0xc}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000140), &(0x7f00000000c0), 0x1081, r4}, 0x38) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000000480), 0x8) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000006c0)=@bpf_ext={0x1c, 0x6, &(0x7f0000000100)=@raw=[@initr0, @map={0x18, 0x3, 0x1, 0x0, r4}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}], 0x0, 0x1, 0xf8, &(0x7f0000000580)=""/248, 0x0, 0x18, [], 0x0, 0x0, r5, 0x8, &(0x7f0000000500)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000680)={0x0, 0x3, 0x32c96647, 0x9}, 0x10, 0x28c14, r2}, 0x78) sendmsg$kcm(r3, &(0x7f00000004c0)={&(0x7f00000003c0)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, 0x0, 0x0, &(0x7f0000000bc0)=[{0x58, 0x0, 0x3f, "3d036b2fe1c920e033fd51a7135bc633687035d4990a07405974e24f3e4f5bc747dd8cb833517dba325fb8357ec60f4b737260519cbec967f1e58025da9b5821975edd2eb5ce0e"}, {0x20, 0x116, 0x100, "e12e82da376bca8fa03c53062e627e"}, {0x10, 0x0, 0xa11}, {0x88, 0x109, 0x0, "48dcf8c1cb65b735b2d5007004b54696aa2a8d0eb98210cf2936121163b1c0584580900f864f0ebc03ba1675bbb924fa22af1c7933e3ea0fe010ebefceaa2fd20e15b805012fd2d7a3e171a57996dc09dc5df4ce65f0c01e583247522e22d559c831115bca323aa68746a2dd9dc875023459b72ec5"}, {0x40, 0x88, 0x39, "e91254173524b71a6cf4982e471433e79bae7c4a781a2a354e5dcee630a99252345f0fe48a629be09093e130c018"}], 0x150}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000002c0)='block_bio_queue\x00'}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r1, 0x12, 0x1, 0x0, 0x0}, 0x20) r6 = openat$cgroup_ro(r0, &(0x7f0000000300)='cpuset.effective_mems\x00', 0x0, 0x0) openat$cgroup_freezer_state(r6, &(0x7f0000000380)='freezer.state\x00', 0x2, 0x0) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) socket$kcm(0x2b, 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a80)={0xffffffffffffffff, 0x0, 0x67, 0x62, &(0x7f0000000840)="f99a133c46d257d5200f326d0a5562cd17685e886bf2f9b3f9a2790348e08bc05a864a96cf5d232acf4d9c795667017ab2c3fa3c298204bcf30edef2ac8db7cbfdf4deae19c3fb8efa11f5d49f040b0731924ad772daa2861563518e94c736d15a5ac7a9872008", &(0x7f00000008c0)=""/98, 0x51a, 0x0, 0x1b, 0x0, &(0x7f0000000940)="5a4fa68ec2c72f99361b9b501348d1d5bce04f26173ed66a605e0c", &(0x7f0000000980)}, 0x48) 04:38:59 executing program 4: select(0x0, 0x0, &(0x7f0000000040), &(0x7f0000000080), 0x0) 04:38:59 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) getsockopt$inet_opts(r0, 0x0, 0x4, 0x0, &(0x7f0000004640)=0x39) 04:38:59 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002340)={&(0x7f0000001240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0x6, 0x1}]}]}}, &(0x7f0000001340)=""/4096, 0x36, 0x1000, 0x1}, 0x20) 04:38:59 executing program 1: socketpair(0x2c, 0x0, 0x0, &(0x7f0000000700)) 04:38:59 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000340)='ethtool\x00', 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r0, &(0x7f0000000d80)={0x0, 0x0, &(0x7f0000000d40)={&(0x7f0000000c80)={0x18, r1, 0x721, 0x0, 0x0, {}, [@HEADER={0x4}]}, 0x18}}, 0x0) 04:38:59 executing program 3: socket$inet(0x2, 0xa, 0x8) 04:38:59 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=ANY=[@ANYBLOB="640000001d00135e845cff070000df2507"], 0x64}}, 0x0) 04:39:00 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002340)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) 04:39:00 executing program 1: setsockopt$ALG_SET_AEAD_AUTHSIZE(0xffffffffffffffff, 0x117, 0x5, 0x0, 0x0) 04:39:00 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) 04:39:00 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000002000)=[{{&(0x7f0000000000)={0xa, 0x0, 0x0, @dev}, 0x0, &(0x7f0000000380)=[{&(0x7f0000000040)="74c4823cefbff84d717b83d32096e87133eb27bec4ecb9535d51cdc7bfb012a93018d14191bcc2fd8a6b55c4f7a51128a067adc32518ba2d3e75d3b92720d77fa1da9f80b3f7a24cf0c86971ee4c792cef297d53a0ce9afec768e9369aa3a68e94eacab91e266ec0234b4d5de829b804e33245f2c76dcb3aefa2121fb65d647b00a764a986557e77af1140dd12e1c6998df68381f0211a1dc8320161c8ca3f5c8700faa25c19bf278af022aeca0e27748f15fec30a58c74a0e3e87556096fd260fc7637ccd69298a24ec83e7a97c96355b09d836ef13b379b5f77d623a43bd62c7823c9642"}, {&(0x7f0000000140)="66ee0566abe8243ad3d9a51caafff2b7ae7cb59927d2ea1fc96f4b6465ac24b5eb373557452ebb083f9d89fc9c4e61060affe293b572074fdc3a2565df5cef0ebd4b0733bd353f994807d601ad9b62c09dad4dd83e955c311d50bf21da1948c7cc691b9622f0959240ea7e697ba4dd4fe48acaf913dc8c96f75a514fb2b374d3ccfb22dce4e5d4e40454a864d79e6f9d9edf5f215ab2b5dd4a1804b13bea1b3eeabe56f59a32233ebcce09196e1f342e69faa794c43dc3398b40"}, {&(0x7f0000000200)="f801db9b5d2d5e5e1c7807c100c39de337d26a0a54accf9e219e31e145bea189fee154b14f2a6b6e1874686737e32d3d1fb607babc2c2c6132fac8623e65c04eff7874"}, {&(0x7f0000000280)="7720ded520613c298150328fc5b736115a5a3ebf1f5116067a169e2afe4a78d79ca411b4d8038f5ef6c92369226e192edd8213f9c7821e07b15d9d1c9f9762c999d43f48d2d43982125ccb8678a16128ed2cdb0b954ace18468aa982ea45d5ce6c644d966e3963f22c5282645525d4a01660f5d50957c3266d2973f24eca685deb8ffb4dbf81"}, {&(0x7f0000000340)="3b6c06d1259ac3e28df78f05fdd6963921999cf908f4"}]}}, {{&(0x7f0000000400)={0xa, 0x0, 0x0, @local}, 0x0, &(0x7f0000000540)=[{&(0x7f0000000440)="6c24f6d26b95e03d69b26308931fa0dd"}, {&(0x7f0000000480)="8593c80104ab0cf18bb9e1c451f8f6b657b295f8562581632637860e5438d0f6c36fe0c8d3947410cce16982bc976518fa993f0d27cb88bfe5bf55e2681c41a656134e"}, {&(0x7f0000000500)="5d205cdf869a0f5a19b5d9e5db6881b24e354fd910d3dee8393cd1cd3732a237c3a0670b2b60f2ae8e0ef100d859184854d15a55f7c51017d296"}], 0x0, &(0x7f0000000580)=[@tclass]}}, {{&(0x7f00000005c0)={0xa, 0x0, 0x0, @private1}, 0x0, &(0x7f0000000700)=[{&(0x7f0000000600)="85c757d87737508c5a2be5451bfe14a7e0bfc3bc8a7afc4eacfb125d974b2af9a785f8722b7ac31d2ccd8018cc90d70cd3d843d5835a39a756cce3ec239df8a60419b64312bee4c3cf549a6eaa04f2af97c5cb61ee5f50aec1cc7f716dd4610cb45845d215b1c4c4666178add6e9af6099f0908034ef97d515790c47ae34709a68d873712993228f4cb80913ec1250431ae54f89b6ea005fbf8e5e7cd06157c83eb8024ee343b79ed4b5716ab966fb5de3f9c2be6d7a646e62a983fd06b39493f4f1620eb4329a88673d3b50a70b9efb8394484b16f9684a3a1e620a54"}], 0x0, &(0x7f0000000740)=[@tclass, @hopopts={{0x0, 0x29, 0x36, {0x0, 0x0, [], [@padn={0x1, 0x0, [0x0]}, @ra, @ra, @hao={0xc9, 0x0, @private2}, @ra, @enc_lim, @padn={0x1, 0x0, [0x0]}, @generic={0x0, 0x0, "1c61d92a115f1846d052a6691f637cb9e2c4f8a41b244619f95c2362daa6251a63ed576da00f76c231308391d75c99306c38a867e3b863e6b48f43b45bb5d605ee3f533d29b90bad5c7bbf2d558125cb94b1d9e6d65e8748ef6f3ddbe786f6d3112a1d2ef88c796c4078220579687691a16a898347e106cace7ac5b22bac93d7f65ff5dbe1d3cb546f9be683c45f5c5d59e0"}]}}}]}}, {{&(0x7f0000000840)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000880)="5ef748060fe51c1b6added1604e27c1263e47a2b8ad6dda090518cfd0c127e2bc3976bcd441c0fd3"}, {&(0x7f00000008c0)='-/RO'}, {&(0x7f0000000900)="5369a4c5e3a6b6ce85"}, {&(0x7f0000000940)="a9b87e7775cab63db6c7d7fa67dc832ad0a8986a9392c54293b4db88a6572d78abc127241c2263f4b6be3133415f4d4ae50ac2ec1aef4a7202d1ca90e960e04f89d49b7e6b01809de36f"}, {&(0x7f00000009c0)="09e370f8f43ee4492bd08e575c3c7499c279b9508cd6b41e0bf3c6e927fd061e3dbf2c9d04022c0860bc0015e8ba5f3aa8958557d64f595c5863161bac7d822cd5b4286e461635a038797fb762c2725e38e4bf468aa39f4ac6dd6f479079b7a1306e910970ed9eab498c60c526f277a846f2034d3946352c3f500e94227f933fec294b69147517015bf221356035502c77cdefe2dcd1f242f6fceb2da6de4954dae150ca1dff7809d687ab176db659edc39aaab7bd48bf8c516f5759779ba73193f311e5321fbbb3c671c1dcb24b6c43b2f37d931ae3b6cd9ee7a6ed25eaf72c9c94b2e530deb409fdd415f7033dc353"}, {&(0x7f0000000ac0)="870882c20f2d84bbd8f74735914ad05bfb3412329272f4a70ed3abd8b56c4b7d1662af7691426ab30f8a0bce91fa9ba3cbb0a41d8570b15ce64da3b6e8e3366347c24b1c2564841fdabb0ed4c227000325664c128a8ddbf5ee7745aeef657d1b0c27aafcea307c2edb6c38c8619e8c22e9ff9650fbc5850ac5c8b5444c53"}, {&(0x7f0000000b40)="68f7368e1b8768474c1cc589d36420fcdab3b375a5625688fd991135a976ad924a1b40e67c21a54ce2f30c468c6ca9d1b5a72662dedc7fb08d023ca234208dd707509c2e80ec4d049f857c180179fedb73de40616775f76e144316a7e8da7939442968c1c2ab8e"}, {&(0x7f0000000bc0)="398248946f90f6ff5de15775c4477e7776f538ae13dea8c84a824e1ae4e8572e42f0838ce5649e11d62cb3f268628fc5cc737095791479ab88fc48b0ab6fe6cd13b439961b25aecd43085785fd68ea13b126be734765f3d4c03fe864681b1781e516362d1b6e0aaf650b70d686f0a54cf735a2778ad8c0e4b7130b2bbf654a9b36b7d3d676104a0bf328bbbed38a17"}, {&(0x7f0000000c80)="da58dcaec0b4b45bef8c6e31c2cfd4820b7fa75a6994ff964a1b9d5102ab566e1e58bbf64b33100cd9bb7d020680c6e6e9d2e5f4a980bb7860fbd8070f5552452b4cb3337455f2ec3f4e240f2945a46c11c529fec4a6fbe5bbe0b273f6172dc30a05c73722a90a80b276091aeea88203d033438eaf5b2bc4b4e4e1ef1297bcb05038774c61e94153de43"}], 0x0, &(0x7f0000000e00)=[@tclass]}}, {{&(0x7f0000000e40)={0xa, 0x0, 0x0, @loopback}, 0x0, &(0x7f0000001f80)=[{&(0x7f0000000e80)="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"}, {&(0x7f0000001e80)="96ddeb9f6dfcedd5c97a04f4d7bc5d150df87c89d1d43d0a4ce77d4d3b5f67b215e178e2f9fb80b76c28f74f7f1bcfae52fae60c390145c994e1a5fe46ea6d23556a2cee8ae130ad1da0ebd6db2865891969d39959bdd7f53c50e6855f0f0209d1f74c47a4609cc1145a501950ff4dabff4fed6469ad5e8ea6b75486890cd84850dea5f5c6ddc2644f4f6808b2b3f67654f7c9892590c0bf8e2cea935ff2a52c23fd91b0cec74a8c507de8fe0e9110e57476a3a3cd4bf9fb74491d9d2fbdf62099bcc70257708d7469d077d3389f767e4c6a1d8c19ba4fc56fa94d560d0244f4a7c73a86cd7e22ead51c05d9cf299d6fd764babd96b1f23543"}], 0x0, &(0x7f0000001fc0)=[@hoplimit]}}], 0x1, 0x20000840) [ 624.363861][T25043] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.5'. 04:39:00 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) r3 = socket$kcm(0x29, 0x7, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xa, 0x2, 0x400, 0xc}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000140), &(0x7f00000000c0), 0x1081, r4}, 0x38) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000000480), 0x8) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000006c0)=@bpf_ext={0x1c, 0x6, &(0x7f0000000100)=@raw=[@initr0, @map={0x18, 0x3, 0x1, 0x0, r4}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}], 0x0, 0x1, 0xf8, &(0x7f0000000580)=""/248, 0x0, 0x18, [], 0x0, 0x0, r5, 0x8, &(0x7f0000000500)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000680)={0x0, 0x3, 0x32c96647, 0x9}, 0x10, 0x28c14, r2}, 0x78) sendmsg$kcm(r3, &(0x7f00000004c0)={&(0x7f00000003c0)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, 0x0, 0x0, &(0x7f0000000bc0)=[{0x58, 0x0, 0x3f, "3d036b2fe1c920e033fd51a7135bc633687035d4990a07405974e24f3e4f5bc747dd8cb833517dba325fb8357ec60f4b737260519cbec967f1e58025da9b5821975edd2eb5ce0e"}, {0x20, 0x116, 0x100, "e12e82da376bca8fa03c53062e627e"}, {0x10, 0x0, 0xa11}, {0x88, 0x109, 0x0, "48dcf8c1cb65b735b2d5007004b54696aa2a8d0eb98210cf2936121163b1c0584580900f864f0ebc03ba1675bbb924fa22af1c7933e3ea0fe010ebefceaa2fd20e15b805012fd2d7a3e171a57996dc09dc5df4ce65f0c01e583247522e22d559c831115bca323aa68746a2dd9dc875023459b72ec5"}, {0x40, 0x88, 0x39, "e91254173524b71a6cf4982e471433e79bae7c4a781a2a354e5dcee630a99252345f0fe48a629be09093e130c018"}], 0x150}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000002c0)='block_bio_queue\x00'}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r1, 0x12, 0x1, 0x0, 0x0}, 0x20) r6 = openat$cgroup_ro(r0, &(0x7f0000000300)='cpuset.effective_mems\x00', 0x0, 0x0) openat$cgroup_freezer_state(r6, &(0x7f0000000380)='freezer.state\x00', 0x2, 0x0) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) socket$kcm(0x2b, 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a80)={0xffffffffffffffff, 0x0, 0x67, 0x62, &(0x7f0000000840)="f99a133c46d257d5200f326d0a5562cd17685e886bf2f9b3f9a2790348e08bc05a864a96cf5d232acf4d9c795667017ab2c3fa3c298204bcf30edef2ac8db7cbfdf4deae19c3fb8efa11f5d49f040b0731924ad772daa2861563518e94c736d15a5ac7a9872008", &(0x7f00000008c0)=""/98, 0x51a, 0x0, 0x1b, 0x0, &(0x7f0000000940)="5a4fa68ec2c72f99361b9b501348d1d5bce04f26173ed66a605e0c", &(0x7f0000000980)}, 0x48) 04:39:00 executing program 4: socketpair(0x2a, 0x0, 0x0, &(0x7f0000000200)) 04:39:00 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x40) 04:39:00 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$PPPIOCGFLAGS1(r0, 0x8004745a, 0x0) 04:39:00 executing program 1: socketpair(0x23, 0x0, 0x0, &(0x7f0000000280)) 04:39:00 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xb54, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x5}, 0x40) 04:39:00 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_int(r0, 0x29, 0x1, 0x0, &(0x7f0000000200)) 04:39:00 executing program 5: socketpair(0x23, 0x0, 0x10001, &(0x7f0000000280)) 04:39:00 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002340)={&(0x7f0000001240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x3c, 0x3c, 0x7, [@func_proto, @func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0xf}, {}]}, @const={0x6}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000001340)=""/4096, 0x5b, 0x1000, 0x1}, 0x20) 04:39:01 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_opts(r0, 0x0, 0x53, 0x0, &(0x7f0000004640)) 04:39:01 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[], 0x54}}, 0x0) 04:39:01 executing program 2: pipe(&(0x7f00000011c0)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$smc(&(0x7f0000000100)='SMC_PNETID\x00', r0) 04:39:01 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) r3 = socket$kcm(0x29, 0x7, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xa, 0x2, 0x400, 0xc}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000140), &(0x7f00000000c0), 0x1081, r4}, 0x38) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000000480), 0x8) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000006c0)=@bpf_ext={0x1c, 0x6, &(0x7f0000000100)=@raw=[@initr0, @map={0x18, 0x3, 0x1, 0x0, r4}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}], 0x0, 0x1, 0xf8, &(0x7f0000000580)=""/248, 0x0, 0x18, [], 0x0, 0x0, r5, 0x8, &(0x7f0000000500)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000680)={0x0, 0x3, 0x32c96647, 0x9}, 0x10, 0x28c14, r2}, 0x78) sendmsg$kcm(r3, &(0x7f00000004c0)={&(0x7f00000003c0)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, 0x0, 0x0, &(0x7f0000000bc0)=[{0x58, 0x0, 0x3f, "3d036b2fe1c920e033fd51a7135bc633687035d4990a07405974e24f3e4f5bc747dd8cb833517dba325fb8357ec60f4b737260519cbec967f1e58025da9b5821975edd2eb5ce0e"}, {0x20, 0x116, 0x100, "e12e82da376bca8fa03c53062e627e"}, {0x10, 0x0, 0xa11}, {0x88, 0x109, 0x0, "48dcf8c1cb65b735b2d5007004b54696aa2a8d0eb98210cf2936121163b1c0584580900f864f0ebc03ba1675bbb924fa22af1c7933e3ea0fe010ebefceaa2fd20e15b805012fd2d7a3e171a57996dc09dc5df4ce65f0c01e583247522e22d559c831115bca323aa68746a2dd9dc875023459b72ec5"}, {0x40, 0x88, 0x39, "e91254173524b71a6cf4982e471433e79bae7c4a781a2a354e5dcee630a99252345f0fe48a629be09093e130c018"}], 0x150}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000002c0)='block_bio_queue\x00'}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r1, 0x12, 0x1, 0x0, 0x0}, 0x20) r6 = openat$cgroup_ro(r0, &(0x7f0000000300)='cpuset.effective_mems\x00', 0x0, 0x0) openat$cgroup_freezer_state(r6, &(0x7f0000000380)='freezer.state\x00', 0x2, 0x0) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) socket$kcm(0x2b, 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a80)={0xffffffffffffffff, 0x0, 0x67, 0x62, &(0x7f0000000840)="f99a133c46d257d5200f326d0a5562cd17685e886bf2f9b3f9a2790348e08bc05a864a96cf5d232acf4d9c795667017ab2c3fa3c298204bcf30edef2ac8db7cbfdf4deae19c3fb8efa11f5d49f040b0731924ad772daa2861563518e94c736d15a5ac7a9872008", &(0x7f00000008c0)=""/98, 0x51a, 0x0, 0x1b, 0x0, &(0x7f0000000940)="5a4fa68ec2c72f99361b9b501348d1d5bce04f26173ed66a605e0c", &(0x7f0000000980)}, 0x48) 04:39:01 executing program 4: r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) 04:39:01 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_opts(r0, 0x0, 0x53, 0x0, &(0x7f0000004640)) 04:39:01 executing program 5: pipe(&(0x7f0000000000)={0xffffffffffffffff}) read$alg(r0, &(0x7f0000000040)=""/65, 0x41) 04:39:01 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002340)={&(0x7f0000001240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x1}]}]}}, &(0x7f0000001340)=""/4096, 0x2e, 0x1000, 0x1}, 0x20) 04:39:01 executing program 1: r0 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={r0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) 04:39:01 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_opts(r0, 0x0, 0x53, 0x0, &(0x7f0000004640)) 04:39:01 executing program 4: socketpair(0x28, 0x0, 0x0, &(0x7f0000000040)) 04:39:01 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_opts(r0, 0x0, 0x53, 0x0, &(0x7f0000004640)) 04:39:01 executing program 4: select(0x40, &(0x7f0000000000), 0x0, &(0x7f0000000080), &(0x7f0000000100)) 04:39:01 executing program 1: select(0x40, &(0x7f0000000000), &(0x7f0000000040), 0x0, &(0x7f0000000100)) 04:39:01 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f00000002c0)={'batadv_slave_1\x00'}) 04:39:02 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) r3 = socket$kcm(0x29, 0x7, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xa, 0x2, 0x400, 0xc}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000140), &(0x7f00000000c0), 0x1081, r4}, 0x38) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000000480), 0x8) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000006c0)=@bpf_ext={0x1c, 0x6, &(0x7f0000000100)=@raw=[@initr0, @map={0x18, 0x3, 0x1, 0x0, r4}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}], 0x0, 0x1, 0xf8, &(0x7f0000000580)=""/248, 0x0, 0x18, [], 0x0, 0x0, r5, 0x8, &(0x7f0000000500)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000680)={0x0, 0x3, 0x32c96647, 0x9}, 0x10, 0x28c14, r2}, 0x78) sendmsg$kcm(r3, &(0x7f00000004c0)={&(0x7f00000003c0)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, 0x0, 0x0, &(0x7f0000000bc0)=[{0x58, 0x0, 0x3f, "3d036b2fe1c920e033fd51a7135bc633687035d4990a07405974e24f3e4f5bc747dd8cb833517dba325fb8357ec60f4b737260519cbec967f1e58025da9b5821975edd2eb5ce0e"}, {0x20, 0x116, 0x100, "e12e82da376bca8fa03c53062e627e"}, {0x10, 0x0, 0xa11}, {0x88, 0x109, 0x0, "48dcf8c1cb65b735b2d5007004b54696aa2a8d0eb98210cf2936121163b1c0584580900f864f0ebc03ba1675bbb924fa22af1c7933e3ea0fe010ebefceaa2fd20e15b805012fd2d7a3e171a57996dc09dc5df4ce65f0c01e583247522e22d559c831115bca323aa68746a2dd9dc875023459b72ec5"}, {0x40, 0x88, 0x39, "e91254173524b71a6cf4982e471433e79bae7c4a781a2a354e5dcee630a99252345f0fe48a629be09093e130c018"}], 0x150}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000002c0)='block_bio_queue\x00'}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r1, 0x12, 0x1, 0x0, 0x0}, 0x20) r6 = openat$cgroup_ro(r0, &(0x7f0000000300)='cpuset.effective_mems\x00', 0x0, 0x0) openat$cgroup_freezer_state(r6, &(0x7f0000000380)='freezer.state\x00', 0x2, 0x0) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) socket$kcm(0x2b, 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a80)={0xffffffffffffffff, 0x0, 0x67, 0x62, &(0x7f0000000840)="f99a133c46d257d5200f326d0a5562cd17685e886bf2f9b3f9a2790348e08bc05a864a96cf5d232acf4d9c795667017ab2c3fa3c298204bcf30edef2ac8db7cbfdf4deae19c3fb8efa11f5d49f040b0731924ad772daa2861563518e94c736d15a5ac7a9872008", &(0x7f00000008c0)=""/98, 0x51a, 0x0, 0x1b, 0x0, &(0x7f0000000940)="5a4fa68ec2c72f99361b9b501348d1d5bce04f26173ed66a605e0c", &(0x7f0000000980)}, 0x48) 04:39:02 executing program 3: getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x53, 0x0, &(0x7f0000004640)) 04:39:02 executing program 4: sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, 0x0, 0x6c8a349ace5445e0) 04:39:02 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002340)={&(0x7f0000001240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x4}]}]}}, &(0x7f0000001340)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 04:39:02 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x9, 0x3, &(0x7f00000001c0)=@framed, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x90ffffff, 0x10, 0x0}, 0x78) 04:39:02 executing program 2: r0 = socket$rds(0x15, 0x5, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000380)={'batadv0\x00'}) 04:39:02 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002340)={&(0x7f0000001240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x0, 0x1}]}]}}, &(0x7f0000001340)=""/4096, 0x2e, 0x1000, 0x1}, 0x20) 04:39:02 executing program 3: getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x53, 0x0, &(0x7f0000004640)) 04:39:02 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_opts(r0, 0x0, 0x17, 0x0, &(0x7f0000004640)) 04:39:02 executing program 3: getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x53, 0x0, &(0x7f0000004640)) 04:39:02 executing program 5: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000380)='fscache_disable\x00'}, 0x68) 04:39:02 executing program 4: socketpair(0xa, 0x1, 0x8, &(0x7f0000000000)) 04:39:03 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) r3 = socket$kcm(0x29, 0x7, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xa, 0x2, 0x400, 0xc}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000140), &(0x7f00000000c0), 0x1081, r4}, 0x38) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000000480), 0x8) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000006c0)=@bpf_ext={0x1c, 0x6, &(0x7f0000000100)=@raw=[@initr0, @map={0x18, 0x3, 0x1, 0x0, r4}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}], 0x0, 0x1, 0xf8, &(0x7f0000000580)=""/248, 0x0, 0x18, [], 0x0, 0x0, r5, 0x8, &(0x7f0000000500)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000680)={0x0, 0x3, 0x32c96647, 0x9}, 0x10, 0x28c14, r2}, 0x78) sendmsg$kcm(r3, &(0x7f00000004c0)={&(0x7f00000003c0)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, 0x0, 0x0, &(0x7f0000000bc0)=[{0x58, 0x0, 0x3f, "3d036b2fe1c920e033fd51a7135bc633687035d4990a07405974e24f3e4f5bc747dd8cb833517dba325fb8357ec60f4b737260519cbec967f1e58025da9b5821975edd2eb5ce0e"}, {0x20, 0x116, 0x100, "e12e82da376bca8fa03c53062e627e"}, {0x10, 0x0, 0xa11}, {0x88, 0x109, 0x0, "48dcf8c1cb65b735b2d5007004b54696aa2a8d0eb98210cf2936121163b1c0584580900f864f0ebc03ba1675bbb924fa22af1c7933e3ea0fe010ebefceaa2fd20e15b805012fd2d7a3e171a57996dc09dc5df4ce65f0c01e583247522e22d559c831115bca323aa68746a2dd9dc875023459b72ec5"}, {0x40, 0x88, 0x39, "e91254173524b71a6cf4982e471433e79bae7c4a781a2a354e5dcee630a99252345f0fe48a629be09093e130c018"}], 0x150}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000002c0)='block_bio_queue\x00'}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r1, 0x12, 0x1, 0x0, 0x0}, 0x20) r6 = openat$cgroup_ro(r0, &(0x7f0000000300)='cpuset.effective_mems\x00', 0x0, 0x0) openat$cgroup_freezer_state(r6, &(0x7f0000000380)='freezer.state\x00', 0x2, 0x0) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) socket$kcm(0x2b, 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a80)={0xffffffffffffffff, 0x0, 0x67, 0x62, &(0x7f0000000840)="f99a133c46d257d5200f326d0a5562cd17685e886bf2f9b3f9a2790348e08bc05a864a96cf5d232acf4d9c795667017ab2c3fa3c298204bcf30edef2ac8db7cbfdf4deae19c3fb8efa11f5d49f040b0731924ad772daa2861563518e94c736d15a5ac7a9872008", &(0x7f00000008c0)=""/98, 0x51a, 0x0, 0x1b, 0x0, &(0x7f0000000940)="5a4fa68ec2c72f99361b9b501348d1d5bce04f26173ed66a605e0c", &(0x7f0000000980)}, 0x48) 04:39:03 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) r1 = socket$xdp(0x2c, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000018c0)={'team0\x00', 0x0}) bind$xdp(r1, &(0x7f0000001900)={0x2c, 0x0, r2}, 0x10) 04:39:03 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002340)={&(0x7f0000001240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x4, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0x6, 0x1}]}, @union={0x3}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000001340)=""/4096, 0x44, 0x1000, 0x1}, 0x20) 04:39:03 executing program 5: r0 = socket(0x2, 0x3, 0x9) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={0x0}}, 0x0) 04:39:03 executing program 3: r0 = socket$inet_sctp(0x2, 0x0, 0x84) getsockopt$inet_opts(r0, 0x0, 0x53, 0x0, &(0x7f0000004640)) 04:39:03 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @remote}, {0x2, 0x0, @remote}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x3f, 0x1}) 04:39:03 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000000440)=[{{&(0x7f0000000280)={0xa, 0x4e24, 0x0, @mcast2}, 0x1c, 0x0, 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB="b002"], 0x2b0}}, {{&(0x7f00000000c0)={0xa, 0x4e24, 0x0, @private2}, 0x1c, 0x0}}], 0x2, 0x0) 04:39:03 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @remote}, {0x2, 0x0, @remote}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x3f, 0x1}) 04:39:03 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f00000001c0)={'batadv0\x00'}) 04:39:03 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @remote}, {0x2, 0x0, @remote}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x3f, 0x1}) 04:39:03 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x6, 0x2, &(0x7f0000000000)=@raw=[@initr0], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 04:39:03 executing program 2: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_calipso(0x0, 0xffffffffffffffff) socket$pppl2tp(0x18, 0x1, 0x1) 04:39:04 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) r3 = socket$kcm(0x29, 0x7, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xa, 0x2, 0x400, 0xc}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000140), &(0x7f00000000c0), 0x1081, r4}, 0x38) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000000480), 0x8) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000006c0)=@bpf_ext={0x1c, 0x6, &(0x7f0000000100)=@raw=[@initr0, @map={0x18, 0x3, 0x1, 0x0, r4}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}], 0x0, 0x1, 0xf8, &(0x7f0000000580)=""/248, 0x0, 0x18, [], 0x0, 0x0, r5, 0x8, &(0x7f0000000500)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000680)={0x0, 0x3, 0x32c96647, 0x9}, 0x10, 0x28c14, r2}, 0x78) sendmsg$kcm(r3, &(0x7f00000004c0)={&(0x7f00000003c0)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, 0x0, 0x0, &(0x7f0000000bc0)=[{0x58, 0x0, 0x3f, "3d036b2fe1c920e033fd51a7135bc633687035d4990a07405974e24f3e4f5bc747dd8cb833517dba325fb8357ec60f4b737260519cbec967f1e58025da9b5821975edd2eb5ce0e"}, {0x20, 0x116, 0x100, "e12e82da376bca8fa03c53062e627e"}, {0x10, 0x0, 0xa11}, {0x88, 0x109, 0x0, "48dcf8c1cb65b735b2d5007004b54696aa2a8d0eb98210cf2936121163b1c0584580900f864f0ebc03ba1675bbb924fa22af1c7933e3ea0fe010ebefceaa2fd20e15b805012fd2d7a3e171a57996dc09dc5df4ce65f0c01e583247522e22d559c831115bca323aa68746a2dd9dc875023459b72ec5"}, {0x40, 0x88, 0x39, "e91254173524b71a6cf4982e471433e79bae7c4a781a2a354e5dcee630a99252345f0fe48a629be09093e130c018"}], 0x150}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000002c0)='block_bio_queue\x00'}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r1, 0x12, 0x1, 0x0, 0x0}, 0x20) r6 = openat$cgroup_ro(r0, &(0x7f0000000300)='cpuset.effective_mems\x00', 0x0, 0x0) openat$cgroup_freezer_state(r6, &(0x7f0000000380)='freezer.state\x00', 0x2, 0x0) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) socket$kcm(0x2b, 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a80)={0xffffffffffffffff, 0x0, 0x67, 0x62, &(0x7f0000000840)="f99a133c46d257d5200f326d0a5562cd17685e886bf2f9b3f9a2790348e08bc05a864a96cf5d232acf4d9c795667017ab2c3fa3c298204bcf30edef2ac8db7cbfdf4deae19c3fb8efa11f5d49f040b0731924ad772daa2861563518e94c736d15a5ac7a9872008", &(0x7f00000008c0)=""/98, 0x51a, 0x0, 0x1b, 0x0, &(0x7f0000000940)="5a4fa68ec2c72f99361b9b501348d1d5bce04f26173ed66a605e0c", &(0x7f0000000980)}, 0x48) 04:39:04 executing program 3: r0 = socket$inet_sctp(0x2, 0x0, 0x84) getsockopt$inet_opts(r0, 0x0, 0x53, 0x0, &(0x7f0000004640)) 04:39:04 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @remote}, {0x2, 0x0, @remote}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x3f, 0x1}) 04:39:04 executing program 5: select(0x40, &(0x7f0000000000), 0x0, &(0x7f0000000080)={0x2294}, 0x0) 04:39:04 executing program 1: socket$inet(0x2, 0x2, 0x7) 04:39:04 executing program 2: socket(0x2, 0xa, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000080)={'ip6tnl0\x00', &(0x7f0000000000)={'ip6_vti0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}) 04:39:04 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_opts(r0, 0x0, 0x31, 0x0, &(0x7f0000004640)) 04:39:04 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000001b80)=[{{&(0x7f0000000180)={0xa, 0x4e23, 0x0, @dev}, 0x1c, &(0x7f0000001500)=[{&(0x7f00000001c0)="29496d957ab478ba42048374e6faac8b9700fcd64bc5a66271effd3efe69044bf9f66c127fda813d", 0x28}, {&(0x7f0000000200)="39fd355a4b18d144637628e2d8f4d34da13e78b3aee0fb036c36056e995a598f3be71b0a8dc17ae316d3113816a1630d60758bbd9fb8e4728147b5516b4e54e3571c7add271b930af7d730874fcf31433786f8ba6a16d90c027e94bbd736b0a7fbbdb43540bc2882306f0a02319dc4370bcc7815b39ffd9e45085eeea8575912327f01a6c62e5b8720986feeb79b482c41789745294d1158223850f50231b1e00285c68cc3ef", 0xa6}, {&(0x7f00000002c0)="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", 0x4c7}], 0x3, &(0x7f0000001580)=[@dstopts_2292={{0x28, 0x29, 0x4, {0x0, 0x2, [], [@jumbo, @jumbo, @padn={0x1, 0x2, [0x0, 0x0]}]}}}], 0x28}}], 0x1, 0x0) 04:39:04 executing program 4: clock_gettime(0x0, &(0x7f00000000c0)={0x0}) select(0x0, 0x0, &(0x7f0000000040), &(0x7f0000000080), &(0x7f0000000100)={r0}) 04:39:04 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000000800)=[{{&(0x7f0000000280)={0xa, 0x4e24, 0x0, @mcast2}, 0x1c, 0x0, 0x0, &(0x7f0000000880)=ANY=[], 0xf}}], 0x1, 0x0) 04:39:04 executing program 3: r0 = socket$inet_sctp(0x2, 0x0, 0x84) getsockopt$inet_opts(r0, 0x0, 0x53, 0x0, &(0x7f0000004640)) 04:39:04 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002500)=@bpf_lsm={0x1d, 0x3, &(0x7f0000002400)=@framed, &(0x7f0000002440)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000002480), 0x8, 0x10, 0x0}, 0x78) 04:39:05 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) r3 = socket$kcm(0x29, 0x7, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xa, 0x2, 0x400, 0xc}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000140), &(0x7f00000000c0), 0x1081, r4}, 0x38) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000000480), 0x8) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000006c0)=@bpf_ext={0x1c, 0x6, &(0x7f0000000100)=@raw=[@initr0, @map={0x18, 0x3, 0x1, 0x0, r4}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}], 0x0, 0x1, 0xf8, &(0x7f0000000580)=""/248, 0x0, 0x18, [], 0x0, 0x0, r5, 0x8, &(0x7f0000000500)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000680)={0x0, 0x3, 0x32c96647, 0x9}, 0x10, 0x28c14, r2}, 0x78) sendmsg$kcm(r3, &(0x7f00000004c0)={&(0x7f00000003c0)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, 0x0, 0x0, &(0x7f0000000bc0)=[{0x58, 0x0, 0x3f, "3d036b2fe1c920e033fd51a7135bc633687035d4990a07405974e24f3e4f5bc747dd8cb833517dba325fb8357ec60f4b737260519cbec967f1e58025da9b5821975edd2eb5ce0e"}, {0x20, 0x116, 0x100, "e12e82da376bca8fa03c53062e627e"}, {0x10, 0x0, 0xa11}, {0x88, 0x109, 0x0, "48dcf8c1cb65b735b2d5007004b54696aa2a8d0eb98210cf2936121163b1c0584580900f864f0ebc03ba1675bbb924fa22af1c7933e3ea0fe010ebefceaa2fd20e15b805012fd2d7a3e171a57996dc09dc5df4ce65f0c01e583247522e22d559c831115bca323aa68746a2dd9dc875023459b72ec5"}, {0x40, 0x88, 0x39, "e91254173524b71a6cf4982e471433e79bae7c4a781a2a354e5dcee630a99252345f0fe48a629be09093e130c018"}], 0x150}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000002c0)='block_bio_queue\x00'}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x4) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) r6 = openat$cgroup_ro(r0, &(0x7f0000000300)='cpuset.effective_mems\x00', 0x0, 0x0) openat$cgroup_freezer_state(r6, &(0x7f0000000380)='freezer.state\x00', 0x2, 0x0) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) socket$kcm(0x2b, 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a80)={0xffffffffffffffff, 0x0, 0x67, 0x62, &(0x7f0000000840)="f99a133c46d257d5200f326d0a5562cd17685e886bf2f9b3f9a2790348e08bc05a864a96cf5d232acf4d9c795667017ab2c3fa3c298204bcf30edef2ac8db7cbfdf4deae19c3fb8efa11f5d49f040b0731924ad772daa2861563518e94c736d15a5ac7a9872008", &(0x7f00000008c0)=""/98, 0x51a, 0x0, 0x1b, 0x0, &(0x7f0000000940)="5a4fa68ec2c72f99361b9b501348d1d5bce04f26173ed66a605e0c", &(0x7f0000000980)}, 0x48) 04:39:05 executing program 2: openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000440)='freezer.state\x00', 0x2, 0x0) 04:39:05 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000000)={'security\x00', 0x4, "dcab6a8e"}, &(0x7f00000000c0)=0x28) 04:39:05 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000018c0)={'team0\x00'}) 04:39:05 executing program 3: socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x53, 0x0, &(0x7f0000004640)) 04:39:05 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(r0, 0x89fa, &(0x7f0000003040)={'ip6tnl0\x00', 0x0}) 04:39:05 executing program 3: socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x53, 0x0, &(0x7f0000004640)) 04:39:05 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_opts(r0, 0x0, 0x60, 0x0, &(0x7f0000004640)) 04:39:05 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_opts(r0, 0x0, 0x15, 0x0, &(0x7f0000004640)) 04:39:05 executing program 1: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_SET_FEATURE(r0, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x20}, 0x20}}, 0x0) 04:39:05 executing program 3: socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x53, 0x0, &(0x7f0000004640)) 04:39:05 executing program 5: syz_io_uring_setup(0x113e, &(0x7f0000000140)={0x0, 0x0, 0x2}, &(0x7f0000003000/0x3000)=nil, &(0x7f0000005000/0x2000)=nil, &(0x7f00000001c0), &(0x7f0000000200)) 04:39:05 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) r3 = socket$kcm(0x29, 0x7, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xa, 0x2, 0x400, 0xc}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000140), &(0x7f00000000c0), 0x1081, r4}, 0x38) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000000480), 0x8) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000006c0)=@bpf_ext={0x1c, 0x6, &(0x7f0000000100)=@raw=[@initr0, @map={0x18, 0x3, 0x1, 0x0, r4}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}], 0x0, 0x1, 0xf8, &(0x7f0000000580)=""/248, 0x0, 0x18, [], 0x0, 0x0, r5, 0x8, &(0x7f0000000500)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000680)={0x0, 0x3, 0x32c96647, 0x9}, 0x10, 0x28c14, r2}, 0x78) sendmsg$kcm(r3, &(0x7f00000004c0)={&(0x7f00000003c0)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, 0x0, 0x0, &(0x7f0000000bc0)=[{0x58, 0x0, 0x3f, "3d036b2fe1c920e033fd51a7135bc633687035d4990a07405974e24f3e4f5bc747dd8cb833517dba325fb8357ec60f4b737260519cbec967f1e58025da9b5821975edd2eb5ce0e"}, {0x20, 0x116, 0x100, "e12e82da376bca8fa03c53062e627e"}, {0x10, 0x0, 0xa11}, {0x88, 0x109, 0x0, "48dcf8c1cb65b735b2d5007004b54696aa2a8d0eb98210cf2936121163b1c0584580900f864f0ebc03ba1675bbb924fa22af1c7933e3ea0fe010ebefceaa2fd20e15b805012fd2d7a3e171a57996dc09dc5df4ce65f0c01e583247522e22d559c831115bca323aa68746a2dd9dc875023459b72ec5"}, {0x40, 0x88, 0x39, "e91254173524b71a6cf4982e471433e79bae7c4a781a2a354e5dcee630a99252345f0fe48a629be09093e130c018"}], 0x150}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000002c0)='block_bio_queue\x00'}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x4) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) r6 = openat$cgroup_ro(r0, &(0x7f0000000300)='cpuset.effective_mems\x00', 0x0, 0x0) openat$cgroup_freezer_state(r6, &(0x7f0000000380)='freezer.state\x00', 0x2, 0x0) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) socket$kcm(0x2b, 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a80)={0xffffffffffffffff, 0x0, 0x67, 0x62, &(0x7f0000000840)="f99a133c46d257d5200f326d0a5562cd17685e886bf2f9b3f9a2790348e08bc05a864a96cf5d232acf4d9c795667017ab2c3fa3c298204bcf30edef2ac8db7cbfdf4deae19c3fb8efa11f5d49f040b0731924ad772daa2861563518e94c736d15a5ac7a9872008", &(0x7f00000008c0)=""/98, 0x51a, 0x0, 0x1b, 0x0, &(0x7f0000000940)="5a4fa68ec2c72f99361b9b501348d1d5bce04f26173ed66a605e0c", &(0x7f0000000980)}, 0x48) 04:39:05 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_opts(r0, 0x0, 0x0, 0x0, &(0x7f0000004640)) 04:39:05 executing program 4: syz_io_uring_setup(0x0, 0x0, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffd000/0x3000)=nil, 0x0, 0x0) syz_io_uring_setup(0x72ad, &(0x7f0000000100), &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000180), &(0x7f00000001c0)) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) 04:39:05 executing program 5: syz_io_uring_setup(0x4f85, &(0x7f0000000000), &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000080), &(0x7f00000000c0)) syz_io_uring_setup(0x72ad, &(0x7f0000000100), &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000180), &(0x7f00000001c0)) 04:39:05 executing program 2: syz_io_uring_setup(0x0, 0x0, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffd000/0x3000)=nil, 0x0, 0x0) syz_io_uring_setup(0x72ad, &(0x7f0000000100), &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000180), &(0x7f00000001c0)) 04:39:05 executing program 1: pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write$FUSE_OPEN(r0, 0x0, 0x0) 04:39:06 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_opts(r0, 0x0, 0x0, 0x0, &(0x7f0000004640)) 04:39:06 executing program 4: syz_io_uring_setup(0x4f85, &(0x7f0000000000), &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffd000/0x3000)=nil, 0x0, 0x0) syz_io_uring_setup(0x72ad, &(0x7f0000000100), &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000180), &(0x7f00000001c0)) 04:39:06 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000002c0)='batadv\x00', 0xffffffffffffffff) 04:39:06 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_opts(r0, 0x0, 0x0, 0x0, &(0x7f0000004640)) 04:39:06 executing program 1: openat$autofs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/autofs\x00', 0x2881, 0x0) 04:39:06 executing program 2: syz_io_uring_setup(0x4f85, &(0x7f0000000000)={0x0, 0xa2d6, 0x0, 0x3}, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000080)=0x0, &(0x7f00000000c0)) syz_io_uring_setup(0x72ad, &(0x7f0000000100)={0x0, 0xae93, 0x0, 0x1, 0x3d4}, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000180), &(0x7f00000001c0)=0x0) syz_io_uring_submit(r0, r1, &(0x7f0000000400)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000003c0)={&(0x7f0000000200)=@pptp={0x18, 0x2, {0x0, @empty}}, 0x80, 0x0, 0x0, &(0x7f0000000300)=""/187, 0xbb}}, 0x5aaff5c9) 04:39:06 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) r3 = socket$kcm(0x29, 0x7, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xa, 0x2, 0x400, 0xc}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000140), &(0x7f00000000c0), 0x1081, r4}, 0x38) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000000480), 0x8) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000006c0)=@bpf_ext={0x1c, 0x6, &(0x7f0000000100)=@raw=[@initr0, @map={0x18, 0x3, 0x1, 0x0, r4}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}], 0x0, 0x1, 0xf8, &(0x7f0000000580)=""/248, 0x0, 0x18, [], 0x0, 0x0, r5, 0x8, &(0x7f0000000500)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000680)={0x0, 0x3, 0x32c96647, 0x9}, 0x10, 0x28c14, r2}, 0x78) sendmsg$kcm(r3, &(0x7f00000004c0)={&(0x7f00000003c0)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, 0x0, 0x0, &(0x7f0000000bc0)=[{0x58, 0x0, 0x3f, "3d036b2fe1c920e033fd51a7135bc633687035d4990a07405974e24f3e4f5bc747dd8cb833517dba325fb8357ec60f4b737260519cbec967f1e58025da9b5821975edd2eb5ce0e"}, {0x20, 0x116, 0x100, "e12e82da376bca8fa03c53062e627e"}, {0x10, 0x0, 0xa11}, {0x88, 0x109, 0x0, "48dcf8c1cb65b735b2d5007004b54696aa2a8d0eb98210cf2936121163b1c0584580900f864f0ebc03ba1675bbb924fa22af1c7933e3ea0fe010ebefceaa2fd20e15b805012fd2d7a3e171a57996dc09dc5df4ce65f0c01e583247522e22d559c831115bca323aa68746a2dd9dc875023459b72ec5"}, {0x40, 0x88, 0x39, "e91254173524b71a6cf4982e471433e79bae7c4a781a2a354e5dcee630a99252345f0fe48a629be09093e130c018"}], 0x150}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000002c0)='block_bio_queue\x00'}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x4) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) r6 = openat$cgroup_ro(r0, &(0x7f0000000300)='cpuset.effective_mems\x00', 0x0, 0x0) openat$cgroup_freezer_state(r6, &(0x7f0000000380)='freezer.state\x00', 0x2, 0x0) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) socket$kcm(0x2b, 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a80)={0xffffffffffffffff, 0x0, 0x67, 0x62, &(0x7f0000000840)="f99a133c46d257d5200f326d0a5562cd17685e886bf2f9b3f9a2790348e08bc05a864a96cf5d232acf4d9c795667017ab2c3fa3c298204bcf30edef2ac8db7cbfdf4deae19c3fb8efa11f5d49f040b0731924ad772daa2861563518e94c736d15a5ac7a9872008", &(0x7f00000008c0)=""/98, 0x51a, 0x0, 0x1b, 0x0, &(0x7f0000000940)="5a4fa68ec2c72f99361b9b501348d1d5bce04f26173ed66a605e0c", &(0x7f0000000980)}, 0x48) 04:39:06 executing program 5: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x0, 0x10, r0, 0x0) 04:39:06 executing program 4: mbind(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x4000, &(0x7f0000000000)=0x9, 0x4, 0x5) syz_io_uring_setup(0x113e, &(0x7f0000000140)={0x0, 0x0, 0x2, 0x0, 0xf5}, &(0x7f0000003000/0x3000)=nil, &(0x7f0000005000/0x2000)=nil, &(0x7f00000001c0), &(0x7f0000000200)) pipe(&(0x7f0000000600)) 04:39:06 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_opts(r0, 0x0, 0x53, 0x0, 0x0) 04:39:06 executing program 1: openat$drirender128(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dri/renderD128\x00', 0x0, 0x0) 04:39:06 executing program 2: syz_io_uring_setup(0x4f85, &(0x7f0000000000)={0x0, 0xa2d6, 0x0, 0x3}, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000080)=0x0, &(0x7f00000000c0)) syz_io_uring_setup(0x72ad, &(0x7f0000000100)={0x0, 0xae93, 0x0, 0x1, 0x3d4}, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000180), &(0x7f00000001c0)=0x0) syz_io_uring_submit(r0, r1, &(0x7f0000000400)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000003c0)={&(0x7f0000000200)=@pptp={0x18, 0x2, {0x0, @empty}}, 0x80, 0x0, 0x0, &(0x7f0000000300)=""/187, 0xbb}}, 0x5aaff5c9) 04:39:06 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_opts(r0, 0x0, 0x53, 0x0, 0x0) 04:39:06 executing program 5: mbind(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x4000, &(0x7f0000000000)=0x9, 0x4, 0x5) mmap$IORING_OFF_SQ_RING(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x113e, &(0x7f0000000140)={0x0, 0x2824, 0x2, 0x0, 0xf5}, &(0x7f0000003000/0x3000)=nil, &(0x7f0000005000/0x2000)=nil, &(0x7f00000001c0), &(0x7f0000000200)) pipe(0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) 04:39:06 executing program 4: syz_io_uring_setup(0x4f85, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x3, 0x1c5}, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000080), &(0x7f00000000c0)) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000400)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x5aaff5c9) 04:39:06 executing program 1: syz_genetlink_get_family_id$batadv(&(0x7f00000002c0)='batadv\x00', 0xffffffffffffffff) 04:39:07 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_opts(r0, 0x0, 0x53, 0x0, 0x0) 04:39:07 executing program 2: mbind(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, &(0x7f0000000000), 0x4, 0x0) 04:39:07 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) r3 = socket$kcm(0x29, 0x7, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xa, 0x2, 0x400, 0xc}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000140), &(0x7f00000000c0), 0x1081, r4}, 0x38) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000000480), 0x8) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000006c0)=@bpf_ext={0x1c, 0x6, &(0x7f0000000100)=@raw=[@initr0, @map={0x18, 0x3, 0x1, 0x0, r4}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}], 0x0, 0x1, 0xf8, &(0x7f0000000580)=""/248, 0x0, 0x18, [], 0x0, 0x0, r5, 0x8, &(0x7f0000000500)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000680)={0x0, 0x3, 0x32c96647, 0x9}, 0x10, 0x28c14, r2}, 0x78) sendmsg$kcm(r3, &(0x7f00000004c0)={&(0x7f00000003c0)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, 0x0, 0x0, &(0x7f0000000bc0)=[{0x58, 0x0, 0x3f, "3d036b2fe1c920e033fd51a7135bc633687035d4990a07405974e24f3e4f5bc747dd8cb833517dba325fb8357ec60f4b737260519cbec967f1e58025da9b5821975edd2eb5ce0e"}, {0x20, 0x116, 0x100, "e12e82da376bca8fa03c53062e627e"}, {0x10, 0x0, 0xa11}, {0x88, 0x109, 0x0, "48dcf8c1cb65b735b2d5007004b54696aa2a8d0eb98210cf2936121163b1c0584580900f864f0ebc03ba1675bbb924fa22af1c7933e3ea0fe010ebefceaa2fd20e15b805012fd2d7a3e171a57996dc09dc5df4ce65f0c01e583247522e22d559c831115bca323aa68746a2dd9dc875023459b72ec5"}, {0x40, 0x88, 0x39, "e91254173524b71a6cf4982e471433e79bae7c4a781a2a354e5dcee630a99252345f0fe48a629be09093e130c018"}], 0x150}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000002c0)='block_bio_queue\x00'}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={0xffffffffffffffff, 0x12, 0x1, 0x0, 0x0}, 0x20) r6 = openat$cgroup_ro(r0, &(0x7f0000000300)='cpuset.effective_mems\x00', 0x0, 0x0) openat$cgroup_freezer_state(r6, &(0x7f0000000380)='freezer.state\x00', 0x2, 0x0) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) socket$kcm(0x2b, 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a80)={0xffffffffffffffff, 0x0, 0x67, 0x62, &(0x7f0000000840)="f99a133c46d257d5200f326d0a5562cd17685e886bf2f9b3f9a2790348e08bc05a864a96cf5d232acf4d9c795667017ab2c3fa3c298204bcf30edef2ac8db7cbfdf4deae19c3fb8efa11f5d49f040b0731924ad772daa2861563518e94c736d15a5ac7a9872008", &(0x7f00000008c0)=""/98, 0x51a, 0x0, 0x1b, 0x0, &(0x7f0000000940)="5a4fa68ec2c72f99361b9b501348d1d5bce04f26173ed66a605e0c", &(0x7f0000000980)}, 0x48) 04:39:07 executing program 4: syz_io_uring_setup(0x4f85, &(0x7f0000000000), &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000080), &(0x7f00000000c0)) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) 04:39:07 executing program 5: mbind(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x4000, &(0x7f0000000000)=0x9, 0x4, 0x5) mmap$IORING_OFF_SQ_RING(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x113e, &(0x7f0000000140)={0x0, 0x2824, 0x2, 0x0, 0xf5}, &(0x7f0000003000/0x3000)=nil, &(0x7f0000005000/0x2000)=nil, &(0x7f00000001c0), &(0x7f0000000200)) pipe(0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) 04:39:07 executing program 3: mbind(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x4000, &(0x7f0000000000)=0x9, 0x4, 0x5) syz_io_uring_setup(0x113e, &(0x7f0000000140)={0x0, 0x2824, 0x2, 0x0, 0xf5}, &(0x7f0000003000/0x3000)=nil, &(0x7f0000005000/0x2000)=nil, &(0x7f00000001c0), &(0x7f0000000200)) 04:39:07 executing program 1: mbind(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x4000, &(0x7f0000000000)=0x9, 0x4, 0x0) syz_io_uring_setup(0x113e, &(0x7f0000000140)={0x0, 0x2824, 0x2, 0x0, 0xf5}, &(0x7f0000003000/0x3000)=nil, &(0x7f0000005000/0x2000)=nil, &(0x7f00000001c0), &(0x7f0000000200)) pipe(0x0) 04:39:07 executing program 2: mbind(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, &(0x7f0000000000)=0x9, 0x4, 0x0) 04:39:07 executing program 4: openat$nullb(0xffffffffffffff9c, 0x0, 0x0, 0x0) 04:39:07 executing program 5: syz_io_uring_setup(0x113e, &(0x7f0000000140)={0x0, 0x0, 0x2, 0x0, 0xf5}, &(0x7f0000003000/0x3000)=nil, &(0x7f0000005000/0x2000)=nil, &(0x7f00000001c0), &(0x7f0000000200)) [ 632.126047][T25355] ================================================================== [ 632.134779][T25355] BUG: KASAN: use-after-free in __mutex_unlock_slowpath+0x8e/0x610 [ 632.142730][T25355] Read of size 8 at addr ffff88801ca79008 by task iou-sqp-25347/25355 [ 632.151182][T25355] [ 632.153623][T25355] CPU: 0 PID: 25355 Comm: iou-sqp-25347 Not tainted 5.12.0-rc1-next-20210304-syzkaller #0 [ 632.163852][T25355] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 632.174064][T25355] Call Trace: [ 632.177348][T25355] dump_stack+0xfa/0x151 [ 632.181681][T25355] ? __mutex_unlock_slowpath+0x8e/0x610 [ 632.187231][T25355] print_address_description.constprop.0.cold+0x5b/0x2f8 [ 632.194284][T25355] ? __mutex_unlock_slowpath+0x8e/0x610 [ 632.199841][T25355] ? __mutex_unlock_slowpath+0x8e/0x610 [ 632.205392][T25355] kasan_report.cold+0x7c/0xd8 [ 632.210451][T25355] ? __mutex_unlock_slowpath+0x8e/0x610 [ 632.216104][T25355] kasan_check_range+0x13d/0x180 [ 632.221121][T25355] __mutex_unlock_slowpath+0x8e/0x610 [ 632.226609][T25355] ? preempt_schedule_common+0x59/0xc0 [ 632.232134][T25355] ? wait_for_completion_io+0x270/0x270 [ 632.237686][T25355] io_sq_thread+0x1292/0x1a50 [ 632.242587][T25355] ? io_submit_sqes+0x6320/0x6320 [ 632.247612][T25355] ? lock_release+0x3bb/0x710 [ 632.252444][T25355] ? ret_from_fork+0x8/0x30 [ 632.257081][T25355] ? finish_wait+0x260/0x260 [ 632.261703][T25355] ? rwlock_bug.part.0+0x90/0x90 [ 632.266643][T25355] ? _raw_spin_unlock_irq+0x1f/0x40 [ 632.271912][T25355] ? io_submit_sqes+0x6320/0x6320 [ 632.277023][T25355] ret_from_fork+0x1f/0x30 [ 632.281448][T25355] [ 632.283767][T25355] Allocated by task 25347: [ 632.288174][T25355] kasan_save_stack+0x1b/0x40 [ 632.292852][T25355] __kasan_kmalloc+0x99/0xc0 [ 632.297457][T25355] io_uring_setup+0x1621/0x2950 [ 632.302309][T25355] do_syscall_64+0x2d/0x70 [ 632.306724][T25355] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 632.312622][T25355] [ 632.314970][T25355] Freed by task 25347: [ 632.319027][T25355] kasan_save_stack+0x1b/0x40 [ 632.323699][T25355] kasan_set_track+0x1c/0x30 [ 632.328282][T25355] kasan_set_free_info+0x20/0x30 [ 632.333266][T25355] __kasan_slab_free+0xf5/0x130 [ 632.338163][T25355] slab_free_freelist_hook+0x72/0x1b0 [ 632.343951][T25355] kfree+0xe5/0x7b0 [ 632.347812][T25355] io_sq_thread_finish+0x3af/0x480 [ 632.352924][T25355] io_uring_setup+0x228f/0x2950 [ 632.357769][T25355] do_syscall_64+0x2d/0x70 [ 632.362186][T25355] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 632.368078][T25355] [ 632.370395][T25355] Last potentially related work creation: [ 632.376103][T25355] kasan_save_stack+0x1b/0x40 [ 632.380778][T25355] kasan_record_aux_stack+0xe5/0x110 [ 632.386211][T25355] call_rcu+0xb1/0x720 [ 632.390409][T25355] sctp_transport_put+0x11d/0x180 [ 632.395519][T25355] sctp_association_free+0x4d4/0x7d0 [ 632.400842][T25355] sctp_do_sm+0x38b8/0x5120 [ 632.405342][T25355] sctp_primitive_SHUTDOWN+0x9b/0xc0 [ 632.410675][T25355] sctp_shutdown+0x12b/0x170 [ 632.415261][T25355] inet_shutdown+0x1a8/0x430 [ 632.419859][T25355] __sys_shutdown+0xf1/0x1b0 [ 632.424484][T25355] __x64_sys_shutdown+0x50/0x70 [ 632.429330][T25355] do_syscall_64+0x2d/0x70 [ 632.433751][T25355] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 632.439681][T25355] [ 632.442025][T25355] The buggy address belongs to the object at ffff88801ca79000 [ 632.442025][T25355] which belongs to the cache kmalloc-1k of size 1024 [ 632.456218][T25355] The buggy address is located 8 bytes inside of [ 632.456218][T25355] 1024-byte region [ffff88801ca79000, ffff88801ca79400) [ 632.469521][T25355] The buggy address belongs to the page: [ 632.475166][T25355] page:000000004f3a80ac refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1ca78 [ 632.485509][T25355] head:000000004f3a80ac order:3 compound_mapcount:0 compound_pincount:0 [ 632.493891][T25355] flags: 0xfff00000010200(slab|head) [ 632.499180][T25355] raw: 00fff00000010200 dead000000000100 dead000000000122 ffff888010841dc0 [ 632.507928][T25355] raw: 0000000000000000 0000000000100010 00000001ffffffff 0000000000000000 [ 632.516506][T25355] page dumped because: kasan: bad access detected [ 632.523060][T25355] 04:39:08 executing program 3: syz_io_uring_setup(0x4f85, &(0x7f0000000000), &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000080), 0x0) syz_io_uring_setup(0x72ad, &(0x7f0000000100), &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000180), 0x0) [ 632.525505][T25355] Memory state around the buggy address: [ 632.531216][T25355] ffff88801ca78f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 632.539416][T25355] ffff88801ca78f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 632.547604][T25355] >ffff88801ca79000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 632.555773][T25355] ^ [ 632.560094][T25355] ffff88801ca79080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 632.568265][T25355] ffff88801ca79100: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb 04:39:08 executing program 2: openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000002c0)='batadv\x00', 0xffffffffffffffff) [ 632.576317][T25355] ================================================================== [ 632.584457][T25355] Disabling lock debugging due to kernel taint 04:39:08 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x380, 0xffffffff, 0x220, 0x220, 0x220, 0xffffffff, 0xffffffff, 0x2e8, 0x2e8, 0x2e8, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xc8, 0x128, 0x0, {}, [@common=@inet=@socket1={{0x28, 'socket\x00'}}, @common=@addrtype={{0x30, 'addrtype\x00'}}]}, @common=@SET={0x60, 'SET\x00'}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@icmp={{0x28, 'icmp\x00'}, {0x0, "1688"}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x0, 0x0, 0x0, 0x0, 0x3]}}}}, {{@ip={@loopback, @empty, 0x0, 0x0, 'team_slave_1\x00', 'veth1_vlan\x00'}, 0x0, 0xa0, 0xc8, 0x0, {}, [@common=@addrtype={{0x30, 'addrtype\x00'}}]}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e0) 04:39:08 executing program 3: syz_io_uring_setup(0x4f85, &(0x7f0000000000), &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000080), 0x0) syz_io_uring_setup(0x72ad, &(0x7f0000000100), &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000180), 0x0) [ 632.739330][T25372] x_tables: duplicate underflow at hook 2 04:39:08 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) r3 = socket$kcm(0x29, 0x7, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xa, 0x2, 0x400, 0xc}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000140), &(0x7f00000000c0), 0x1081, r4}, 0x38) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000000480), 0x8) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000006c0)=@bpf_ext={0x1c, 0x6, &(0x7f0000000100)=@raw=[@initr0, @map={0x18, 0x3, 0x1, 0x0, r4}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}], 0x0, 0x1, 0xf8, &(0x7f0000000580)=""/248, 0x0, 0x18, [], 0x0, 0x0, r5, 0x8, &(0x7f0000000500)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000680)={0x0, 0x3, 0x32c96647, 0x9}, 0x10, 0x28c14, r2}, 0x78) sendmsg$kcm(r3, &(0x7f00000004c0)={&(0x7f00000003c0)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, 0x0, 0x0, &(0x7f0000000bc0)=[{0x58, 0x0, 0x3f, "3d036b2fe1c920e033fd51a7135bc633687035d4990a07405974e24f3e4f5bc747dd8cb833517dba325fb8357ec60f4b737260519cbec967f1e58025da9b5821975edd2eb5ce0e"}, {0x20, 0x116, 0x100, "e12e82da376bca8fa03c53062e627e"}, {0x10, 0x0, 0xa11}, {0x88, 0x109, 0x0, "48dcf8c1cb65b735b2d5007004b54696aa2a8d0eb98210cf2936121163b1c0584580900f864f0ebc03ba1675bbb924fa22af1c7933e3ea0fe010ebefceaa2fd20e15b805012fd2d7a3e171a57996dc09dc5df4ce65f0c01e583247522e22d559c831115bca323aa68746a2dd9dc875023459b72ec5"}, {0x40, 0x88, 0x39, "e91254173524b71a6cf4982e471433e79bae7c4a781a2a354e5dcee630a99252345f0fe48a629be09093e130c018"}], 0x150}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000002c0)='block_bio_queue\x00'}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={0xffffffffffffffff, 0x12, 0x1, 0x0, 0x0}, 0x20) r6 = openat$cgroup_ro(r0, &(0x7f0000000300)='cpuset.effective_mems\x00', 0x0, 0x0) openat$cgroup_freezer_state(r6, &(0x7f0000000380)='freezer.state\x00', 0x2, 0x0) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) socket$kcm(0x2b, 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a80)={0xffffffffffffffff, 0x0, 0x67, 0x62, &(0x7f0000000840)="f99a133c46d257d5200f326d0a5562cd17685e886bf2f9b3f9a2790348e08bc05a864a96cf5d232acf4d9c795667017ab2c3fa3c298204bcf30edef2ac8db7cbfdf4deae19c3fb8efa11f5d49f040b0731924ad772daa2861563518e94c736d15a5ac7a9872008", &(0x7f00000008c0)=""/98, 0x51a, 0x0, 0x1b, 0x0, &(0x7f0000000940)="5a4fa68ec2c72f99361b9b501348d1d5bce04f26173ed66a605e0c", &(0x7f0000000980)}, 0x48) 04:39:08 executing program 5: syz_io_uring_setup(0x113e, &(0x7f0000000140)={0x0, 0x0, 0x2, 0x0, 0xf5}, &(0x7f0000003000/0x3000)=nil, &(0x7f0000005000/0x2000)=nil, &(0x7f00000001c0), &(0x7f0000000200)) 04:39:08 executing program 4: prlimit64(0x0, 0x0, &(0x7f0000000100)={0x5, 0x6}, 0x0) 04:39:08 executing program 3: syz_io_uring_setup(0x4f85, &(0x7f0000000000), &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000080), 0x0) syz_io_uring_setup(0x72ad, &(0x7f0000000100), &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000180), 0x0) [ 633.340533][T25355] Kernel panic - not syncing: panic_on_warn set ... [ 633.347397][T25355] CPU: 0 PID: 25355 Comm: iou-sqp-25347 Tainted: G B 5.12.0-rc1-next-20210304-syzkaller #0 [ 633.358802][T25355] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 633.368853][T25355] Call Trace: [ 633.372124][T25355] dump_stack+0xfa/0x151 [ 633.376364][T25355] panic+0x306/0x73d [ 633.380328][T25355] ? __warn_printk+0xf3/0xf3 [ 633.384911][T25355] ? preempt_schedule_common+0x59/0xc0 [ 633.390421][T25355] ? __mutex_unlock_slowpath+0x8e/0x610 [ 633.395960][T25355] ? preempt_schedule_thunk+0x16/0x18 [ 633.401323][T25355] ? trace_hardirqs_on+0x38/0x1c0 [ 633.406414][T25355] ? trace_hardirqs_on+0x51/0x1c0 [ 633.411429][T25355] ? __mutex_unlock_slowpath+0x8e/0x610 [ 633.417025][T25355] ? __mutex_unlock_slowpath+0x8e/0x610 [ 633.422580][T25355] end_report.cold+0x5a/0x5a [ 633.427168][T25355] kasan_report.cold+0x6a/0xd8 [ 633.431942][T25355] ? __mutex_unlock_slowpath+0x8e/0x610 [ 633.437487][T25355] kasan_check_range+0x13d/0x180 [ 633.442458][T25355] __mutex_unlock_slowpath+0x8e/0x610 [ 633.447826][T25355] ? preempt_schedule_common+0x59/0xc0 [ 633.453277][T25355] ? wait_for_completion_io+0x270/0x270 [ 633.458822][T25355] io_sq_thread+0x1292/0x1a50 [ 633.463500][T25355] ? io_submit_sqes+0x6320/0x6320 [ 633.468711][T25355] ? lock_release+0x3bb/0x710 [ 633.473503][T25355] ? ret_from_fork+0x8/0x30 [ 633.478190][T25355] ? finish_wait+0x260/0x260 [ 633.482927][T25355] ? rwlock_bug.part.0+0x90/0x90 [ 633.487861][T25355] ? _raw_spin_unlock_irq+0x1f/0x40 [ 633.493051][T25355] ? io_submit_sqes+0x6320/0x6320 [ 633.498311][T25355] ret_from_fork+0x1f/0x30 [ 633.503773][T25355] Kernel Offset: disabled [ 633.508196][T25355] Rebooting in 86400 seconds..