fs(0x0, &(0x7f0000000000)='cmdline\x00')
syz_io_uring_setup(0x7ab5, &(0x7f0000000180), &(0x7f0000000200), 0x0)
syz_io_uring_setup(0x3f91, &(0x7f0000000540), &(0x7f00000005c0), 0x0)
read$qrtrtun(r0, 0x0, 0x0)
03:50:22 executing program 3:
r0 = syz_open_procfs(0x0, &(0x7f0000000080)='oom_adj\x00')
write$P9_RWALK(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="640000000000800100000001000000000004000004000000060000000000000000030000000020020000"], 0x64)
03:50:22 executing program 4:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0xebe)
03:50:22 executing program 2:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst], &(0x7f0000001340)='GPL\x00', 0x0, 0x13, &(0x7f0000001380)=""/19}, 0x90)
03:50:22 executing program 1:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0xe37)
03:50:22 executing program 0:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0xe36)
03:50:22 executing program 2:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst], &(0x7f0000001340)='GPL\x00', 0x0, 0x13, &(0x7f0000001380)=""/19}, 0x90)
03:50:22 executing program 3:
r0 = syz_open_procfs(0x0, &(0x7f0000000080)='oom_adj\x00')
write$P9_RWALK(r0, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x64)
03:50:23 executing program 4:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0xec0)
03:50:23 executing program 1:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0xe38)
03:50:23 executing program 0:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0xe37)
03:50:23 executing program 2:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst], &(0x7f0000001340)='GPL\x00', 0x0, 0x13, &(0x7f0000001380)=""/19}, 0x90)
03:50:23 executing program 2:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:23 executing program 4:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0xece)
03:50:23 executing program 5:
r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/protocols\x00')
r1 = memfd_secret(0x80000)
ioctl$IMSETDEVNAME(r1, 0x80184947, &(0x7f00000001c0)={0x3f, 'syz0\x00'})
setsockopt$MRT_DEL_VIF(r0, 0x0, 0xcb, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x4, 0x7, @vifc_lcl_addr=@remote, @rand_addr=0x64010100}, 0x10)
read$qrtrtun(r0, &(0x7f0000000040)=""/85, 0x55)
read$qrtrtun(r0, &(0x7f00000000c0)=""/156, 0x9c)
03:50:23 executing program 3:
r0 = syz_open_procfs(0x0, &(0x7f0000000080)='oom_adj\x00')
write$P9_RWALK(r0, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x64)
03:50:23 executing program 1:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0xe39)
03:50:23 executing program 3:
r0 = syz_open_procfs(0x0, &(0x7f0000000080)='oom_adj\x00')
write$P9_RWALK(r0, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x64)
03:50:23 executing program 0:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0xe38)
03:50:23 executing program 4:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0xed6)
03:50:23 executing program 2:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:23 executing program 5:
r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/protocols\x00')
r1 = memfd_secret(0x80000)
ioctl$IMSETDEVNAME(r1, 0x80184947, &(0x7f00000001c0)={0x3f, 'syz0\x00'})
setsockopt$MRT_DEL_VIF(r0, 0x0, 0xcb, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x4, 0x7, @vifc_lcl_addr=@remote, @rand_addr=0x64010100}, 0x10)
read$qrtrtun(r0, &(0x7f0000000040)=""/85, 0x55)
read$qrtrtun(r0, &(0x7f00000000c0)=""/156, 0x9c)
03:50:23 executing program 4:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0xed8)
03:50:23 executing program 1:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0xe45)
03:50:23 executing program 3:
r0 = syz_open_procfs(0x0, &(0x7f0000000080)='oom_adj\x00')
write$P9_RWALK(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="640000000000800100000001000000000004000004"], 0x64)
03:50:23 executing program 0:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0xe39)
03:50:23 executing program 3:
r0 = syz_open_procfs(0x0, &(0x7f0000000080)='oom_adj\x00')
write$P9_RWALK(r0, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x64)
03:50:23 executing program 1:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0xe52)
03:50:23 executing program 5:
r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/protocols\x00')
r1 = memfd_secret(0x80000)
ioctl$IMSETDEVNAME(r1, 0x80184947, &(0x7f00000001c0)={0x3f, 'syz0\x00'})
setsockopt$MRT_DEL_VIF(r0, 0x0, 0xcb, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x4, 0x7, @vifc_lcl_addr=@remote, @rand_addr=0x64010100}, 0x10)
read$qrtrtun(r0, &(0x7f0000000040)=""/85, 0x55)
read$qrtrtun(r0, &(0x7f00000000c0)=""/156, 0x9c)
03:50:23 executing program 0:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0xe45)
03:50:23 executing program 2:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:23 executing program 1:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0xe53)
03:50:23 executing program 3:
r0 = syz_open_procfs(0x0, &(0x7f0000000080)='oom_adj\x00')
write$P9_RWALK(r0, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x64)
03:50:23 executing program 4:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0xeea)
03:50:23 executing program 0:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0xe52)
03:50:23 executing program 5:
r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/protocols\x00')
r1 = memfd_secret(0x80000)
ioctl$IMSETDEVNAME(r1, 0x80184947, &(0x7f00000001c0)={0x3f, 'syz0\x00'})
setsockopt$MRT_DEL_VIF(r0, 0x0, 0xcb, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x4, 0x7, @vifc_lcl_addr=@remote, @rand_addr=0x64010100}, 0x10)
read$qrtrtun(r0, &(0x7f00000000c0)=""/156, 0x9c)
03:50:23 executing program 3:
r0 = syz_open_procfs(0x0, &(0x7f0000000080)='oom_adj\x00')
write$P9_RWALK(r0, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x64)
03:50:23 executing program 1:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0xe54)
03:50:23 executing program 2:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:23 executing program 4:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0xef2)
03:50:23 executing program 0:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0xe53)
03:50:23 executing program 3:
r0 = syz_open_procfs(0x0, &(0x7f0000000080)='oom_adj\x00')
write$P9_RWALK(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="6400000000008001000000"], 0x64)
03:50:23 executing program 5:
r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/protocols\x00')
r1 = memfd_secret(0x80000)
ioctl$IMSETDEVNAME(r1, 0x80184947, &(0x7f00000001c0)={0x3f, 'syz0\x00'})
setsockopt$MRT_DEL_VIF(r0, 0x0, 0xcb, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x4, 0x7, @vifc_lcl_addr=@remote, @rand_addr=0x64010100}, 0x10)
read$qrtrtun(r0, &(0x7f00000000c0)=""/156, 0x9c)
03:50:23 executing program 2:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:23 executing program 1:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0xe55)
03:50:23 executing program 4:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0xef4)
03:50:23 executing program 3:
r0 = syz_open_procfs(0x0, &(0x7f0000000080)='oom_adj\x00')
write$P9_RWALK(r0, &(0x7f0000000000)=ANY=[@ANYBLOB='d'], 0x64)
03:50:23 executing program 5:
r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/protocols\x00')
r1 = memfd_secret(0x80000)
ioctl$IMSETDEVNAME(r1, 0x80184947, &(0x7f00000001c0)={0x3f, 'syz0\x00'})
setsockopt$MRT_DEL_VIF(r0, 0x0, 0xcb, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x4, 0x7, @vifc_lcl_addr=@remote, @rand_addr=0x64010100}, 0x10)
read$qrtrtun(r0, &(0x7f00000000c0)=""/156, 0x9c)
03:50:23 executing program 2:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:23 executing program 0:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0xe54)
03:50:23 executing program 4:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0xf06)
03:50:23 executing program 1:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0xe56)
03:50:23 executing program 3:
r0 = syz_open_procfs(0x0, &(0x7f0000000080)='oom_adj\x00')
write$P9_RWALK(r0, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x64)
03:50:23 executing program 0:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0xe55)
03:50:23 executing program 2:
bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0)
03:50:23 executing program 1:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0xe57)
03:50:23 executing program 3:
r0 = syz_open_procfs(0x0, &(0x7f0000000080)='oom_adj\x00')
write$P9_RWALK(r0, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x64)
03:50:23 executing program 5:
r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/protocols\x00')
r1 = memfd_secret(0x80000)
ioctl$IMSETDEVNAME(r1, 0x80184947, &(0x7f00000001c0)={0x3f, 'syz0\x00'})
read$qrtrtun(r0, &(0x7f0000000040)=""/85, 0x55)
read$qrtrtun(r0, &(0x7f00000000c0)=""/156, 0x9c)
03:50:23 executing program 4:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0xf0e)
03:50:23 executing program 2:
bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0)
03:50:23 executing program 0:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0xe56)
03:50:23 executing program 1:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0xe60)
03:50:23 executing program 5:
r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/protocols\x00')
memfd_secret(0x80000)
read$qrtrtun(r0, &(0x7f0000000040)=""/85, 0x55)
read$qrtrtun(r0, &(0x7f00000000c0)=""/156, 0x9c)
03:50:23 executing program 3:
r0 = syz_open_procfs(0x0, &(0x7f0000000080)='oom_adj\x00')
write$P9_RWALK(r0, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x64)
03:50:23 executing program 2:
bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0)
03:50:23 executing program 1:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0xe63)
03:50:23 executing program 0:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0xe57)
03:50:23 executing program 4:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0xf10)
03:50:23 executing program 5:
r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/protocols\x00')
read$qrtrtun(r0, &(0x7f0000000040)=""/85, 0x55)
read$qrtrtun(r0, &(0x7f00000000c0)=""/156, 0x9c)
03:50:23 executing program 3:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
epoll_ctl$EPOLL_CTL_DEL(r1, 0x2, r0)
setsockopt$MRT_ASSERT(r1, 0x0, 0xcf, 0x0, 0x0)
openat$autofs(0xffffffffffffff9c, &(0x7f0000000040), 0x101200, 0x0)
sendmsg$IPCTNL_MSG_EXP_DELETE(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0xb4}, 0x1, 0x0, 0x0, 0x1}, 0x40)
r2 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000), 0x2)
write$P9_RWSTAT(r1, &(0x7f0000000080)={0x7, 0x7f, 0x1}, 0x7)
read$qrtrtun(r2, &(0x7f0000002300)=""/4115, 0x1013)
read$qrtrtun(r0, &(0x7f00000010c0)=""/140, 0x8c)
03:50:23 executing program 2:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x0, 0x0, &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:23 executing program 0:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0xe60)
03:50:23 executing program 1:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0xe66)
03:50:23 executing program 4:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0xf22)
03:50:23 executing program 2:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x0, 0x0, &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:23 executing program 5:
read$qrtrtun(0xffffffffffffffff, &(0x7f0000000040)=""/85, 0x55)
read$qrtrtun(0xffffffffffffffff, &(0x7f00000000c0)=""/156, 0x9c)
03:50:23 executing program 4:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0xf2a)
03:50:23 executing program 5:
read$qrtrtun(0xffffffffffffffff, &(0x7f0000000040)=""/85, 0x55)
read$qrtrtun(0xffffffffffffffff, &(0x7f00000000c0)=""/156, 0x9c)
03:50:23 executing program 0:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0xe63)
03:50:23 executing program 1:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0xe68)
03:50:23 executing program 4:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0xf2c)
03:50:24 executing program 2:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x0, 0x0, &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:24 executing program 3:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
epoll_ctl$EPOLL_CTL_DEL(r1, 0x2, r0)
setsockopt$MRT_ASSERT(r1, 0x0, 0xcf, 0x0, 0x0)
openat$autofs(0xffffffffffffff9c, &(0x7f0000000040), 0x101200, 0x0)
sendmsg$IPCTNL_MSG_EXP_DELETE(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0xb4}, 0x1, 0x0, 0x0, 0x1}, 0x40)
r2 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000), 0x2)
write$P9_RWSTAT(r1, &(0x7f0000000080)={0x7, 0x7f, 0x1}, 0x7)
read$qrtrtun(r2, &(0x7f0000002300)=""/4115, 0x1013)
read$qrtrtun(r0, &(0x7f00000010c0)=""/140, 0x8c)
03:50:24 executing program 4:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0xf3e)
03:50:24 executing program 0:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0xe66)
03:50:24 executing program 1:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0xe69)
03:50:24 executing program 5:
read$qrtrtun(0xffffffffffffffff, &(0x7f0000000040)=""/85, 0x55)
read$qrtrtun(0xffffffffffffffff, &(0x7f00000000c0)=""/156, 0x9c)
03:50:24 executing program 5:
r0 = syz_open_procfs(0x0, 0x0)
read$qrtrtun(r0, &(0x7f0000000040)=""/85, 0x55)
read$qrtrtun(r0, &(0x7f00000000c0)=""/156, 0x9c)
03:50:24 executing program 0:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0xe68)
03:50:24 executing program 4:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0xf46)
03:50:24 executing program 1:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0xe6c)
03:50:24 executing program 2:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x0, &(0x7f0000001240), &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:24 executing program 5:
r0 = syz_open_procfs(0x0, 0x0)
read$qrtrtun(r0, &(0x7f0000000040)=""/85, 0x55)
read$qrtrtun(r0, &(0x7f00000000c0)=""/156, 0x9c)
03:50:24 executing program 1:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0xe7a)
03:50:25 executing program 3:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
epoll_ctl$EPOLL_CTL_DEL(r1, 0x2, r0)
setsockopt$MRT_ASSERT(r1, 0x0, 0xcf, 0x0, 0x0)
openat$autofs(0xffffffffffffff9c, &(0x7f0000000040), 0x101200, 0x0)
sendmsg$IPCTNL_MSG_EXP_DELETE(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0xb4}, 0x1, 0x0, 0x0, 0x1}, 0x40)
r2 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000), 0x2)
write$P9_RWSTAT(r1, &(0x7f0000000080)={0x7, 0x7f, 0x1}, 0x7)
read$qrtrtun(r2, &(0x7f0000002300)=""/4115, 0x1013)
read$qrtrtun(r0, &(0x7f00000010c0)=""/140, 0x8c)
03:50:25 executing program 4:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0xf48)
03:50:25 executing program 0:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0xe69)
03:50:25 executing program 5:
r0 = syz_open_procfs(0x0, 0x0)
read$qrtrtun(r0, &(0x7f0000000040)=""/85, 0x55)
read$qrtrtun(r0, &(0x7f00000000c0)=""/156, 0x9c)
03:50:25 executing program 2:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x0, &(0x7f0000001240), &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:25 executing program 1:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0xe82)
03:50:25 executing program 0:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0xe6c)
03:50:25 executing program 2:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x0, &(0x7f0000001240), &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:25 executing program 5:
r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/protocols\x00')
read$qrtrtun(0xffffffffffffffff, &(0x7f0000000040)=""/85, 0x55)
read$qrtrtun(r0, &(0x7f00000000c0)=""/156, 0x9c)
03:50:25 executing program 0:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0xe7a)
03:50:25 executing program 1:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0xe84)
03:50:25 executing program 4:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0xf5a)
03:50:26 executing program 5:
r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/protocols\x00')
read$qrtrtun(0xffffffffffffffff, &(0x7f0000000040)=""/85, 0x55)
read$qrtrtun(r0, &(0x7f00000000c0)=""/156, 0x9c)
03:50:26 executing program 3:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
epoll_ctl$EPOLL_CTL_DEL(r1, 0x2, r0)
setsockopt$MRT_ASSERT(r1, 0x0, 0xcf, 0x0, 0x0)
openat$autofs(0xffffffffffffff9c, &(0x7f0000000040), 0x101200, 0x0)
sendmsg$IPCTNL_MSG_EXP_DELETE(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0xb4}, 0x1, 0x0, 0x0, 0x1}, 0x40)
openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000), 0x2)
write$P9_RWSTAT(r1, &(0x7f0000000080)={0x7, 0x7f, 0x1}, 0x7)
read$qrtrtun(r0, &(0x7f00000010c0)=""/140, 0x8c)
03:50:26 executing program 4:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0xf62)
03:50:26 executing program 1:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0xe96)
03:50:26 executing program 2:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst], 0x0, 0xb}, 0x90)
03:50:26 executing program 0:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0xe82)
03:50:26 executing program 3:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
epoll_ctl$EPOLL_CTL_DEL(r1, 0x2, r0)
setsockopt$MRT_ASSERT(r1, 0x0, 0xcf, 0x0, 0x0)
openat$autofs(0xffffffffffffff9c, &(0x7f0000000040), 0x101200, 0x0)
sendmsg$IPCTNL_MSG_EXP_DELETE(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0xb4}, 0x1, 0x0, 0x0, 0x1}, 0x40)
openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000), 0x2)
write$P9_RWSTAT(r1, &(0x7f0000000080)={0x7, 0x7f, 0x1}, 0x7)
read$qrtrtun(r0, &(0x7f00000010c0)=""/140, 0x8c)
03:50:26 executing program 5:
r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/protocols\x00')
read$qrtrtun(0xffffffffffffffff, &(0x7f0000000040)=""/85, 0x55)
read$qrtrtun(r0, &(0x7f00000000c0)=""/156, 0x9c)
03:50:26 executing program 1:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0xe9e)
03:50:26 executing program 2:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst], 0x0, 0xb}, 0x90)
03:50:26 executing program 0:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0xe84)
03:50:26 executing program 4:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0xf64)
03:50:26 executing program 3:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
epoll_ctl$EPOLL_CTL_DEL(r1, 0x2, r0)
setsockopt$MRT_ASSERT(r1, 0x0, 0xcf, 0x0, 0x0)
openat$autofs(0xffffffffffffff9c, &(0x7f0000000040), 0x101200, 0x0)
sendmsg$IPCTNL_MSG_EXP_DELETE(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0xb4}, 0x1, 0x0, 0x0, 0x1}, 0x40)
openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000), 0x2)
write$P9_RWSTAT(r1, &(0x7f0000000080)={0x7, 0x7f, 0x1}, 0x7)
read$qrtrtun(r0, &(0x7f00000010c0)=""/140, 0x8c)
03:50:26 executing program 1:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0xea0)
03:50:26 executing program 0:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0xe96)
03:50:26 executing program 5:
r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/protocols\x00')
read$qrtrtun(r0, 0x0, 0x0)
read$qrtrtun(r0, &(0x7f00000000c0)=""/156, 0x9c)
03:50:26 executing program 4:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0xf76)
03:50:26 executing program 2:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst], 0x0, 0xb}, 0x90)
03:50:26 executing program 1:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0xeb2)
03:50:26 executing program 0:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0xe9e)
03:50:26 executing program 3:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
epoll_ctl$EPOLL_CTL_DEL(r1, 0x2, r0)
setsockopt$MRT_ASSERT(r1, 0x0, 0xcf, 0x0, 0x0)
openat$autofs(0xffffffffffffff9c, &(0x7f0000000040), 0x101200, 0x0)
sendmsg$IPCTNL_MSG_EXP_DELETE(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0xb4}, 0x1, 0x0, 0x0, 0x1}, 0x40)
r2 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000), 0x2)
read$qrtrtun(r2, &(0x7f0000002300)=""/4115, 0x1013)
read$qrtrtun(r0, &(0x7f00000010c0)=""/140, 0x8c)
03:50:26 executing program 4:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0xf7e)
03:50:26 executing program 2:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst], &(0x7f0000001340)='GPL\x00'}, 0x90)
03:50:26 executing program 1:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0xeba)
03:50:26 executing program 1:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0xebe)
03:50:26 executing program 0:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0xea0)
03:50:26 executing program 5:
r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/protocols\x00')
read$qrtrtun(r0, 0x0, 0x0)
read$qrtrtun(r0, &(0x7f00000000c0)=""/156, 0x9c)
03:50:26 executing program 2:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst], &(0x7f0000001340)='GPL\x00'}, 0x90)
03:50:26 executing program 1:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0xec0)
03:50:26 executing program 4:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0xf80)
03:50:26 executing program 0:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0xeb2)
03:50:26 executing program 5:
r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/protocols\x00')
read$qrtrtun(r0, 0x0, 0x0)
read$qrtrtun(r0, &(0x7f00000000c0)=""/156, 0x9c)
03:50:27 executing program 1:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0xece)
03:50:27 executing program 4:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0xf92)
03:50:27 executing program 5:
r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/protocols\x00')
read$qrtrtun(r0, &(0x7f0000000040)=""/85, 0x55)
read$qrtrtun(0xffffffffffffffff, &(0x7f00000000c0)=""/156, 0x9c)
03:50:27 executing program 2:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst], &(0x7f0000001340)='GPL\x00'}, 0x90)
03:50:27 executing program 0:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0xeba)
03:50:27 executing program 3:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
epoll_ctl$EPOLL_CTL_DEL(r1, 0x2, r0)
setsockopt$MRT_ASSERT(r1, 0x0, 0xcf, 0x0, 0x0)
openat$autofs(0xffffffffffffff9c, &(0x7f0000000040), 0x101200, 0x0)
sendmsg$IPCTNL_MSG_EXP_DELETE(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="b40000000202010400000000000000000b00000508000840000000006c00018006090040000000000c000280050001002f000000060003400004000006000340000400000c0002800500010021000000060003400000000006000340000300000c000280050001008800000006000340000300001400018008000100ac1e010108000200640101020800054000000a2b0800094000000007080008400000000108000840000000010900050070708a70000000106f7fa839d49d02d473cda2f9916e0b1ffcb97b346f0f6a0c7242e753af26d2b2c8a07d44d5fc1693fb1f14a9f8c0d24e7e1a3ad15f38ee66b7c21816f51894194436066ee85e65841308b5645475548d317a20d2a1a546bba8dbbf6983b4e3b68c6351a8a5b95511d30ba1db53d8f379f987554b6dbb64212828a59689b37b6ee17693c5a61ce47d52490df76907ddc30b8b92830850e731a144ce61e859d11e"], 0xb4}, 0x1, 0x0, 0x0, 0x1}, 0x40)
read$qrtrtun(0xffffffffffffffff, &(0x7f0000002300)=""/4115, 0x1013)
read$qrtrtun(r0, &(0x7f00000010c0)=""/140, 0x8c)
03:50:27 executing program 3:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
epoll_ctl$EPOLL_CTL_DEL(r1, 0x2, r0)
setsockopt$MRT_ASSERT(r1, 0x0, 0xcf, 0x0, 0x0)
openat$autofs(0xffffffffffffff9c, &(0x7f0000000040), 0x101200, 0x0)
sendmsg$IPCTNL_MSG_EXP_DELETE(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0xb4}, 0x1, 0x0, 0x0, 0x1}, 0x40)
read$qrtrtun(0xffffffffffffffff, &(0x7f0000002300)=""/4115, 0x1013)
read$qrtrtun(r0, &(0x7f00000010c0)=""/140, 0x8c)
03:50:27 executing program 1:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0xed6)
03:50:27 executing program 0:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0xebe)
03:50:27 executing program 4:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0xf9a)
03:50:27 executing program 5:
r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/protocols\x00')
read$qrtrtun(r0, &(0x7f0000000040)=""/85, 0x55)
read$qrtrtun(0xffffffffffffffff, &(0x7f00000000c0)=""/156, 0x9c)
03:50:27 executing program 2:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0xa9)
03:50:27 executing program 1:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0xed8)
03:50:27 executing program 0:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0xec0)
03:50:27 executing program 3:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
epoll_ctl$EPOLL_CTL_DEL(r1, 0x2, r0)
setsockopt$MRT_ASSERT(r1, 0x0, 0xcf, 0x0, 0x0)
openat$autofs(0xffffffffffffff9c, &(0x7f0000000040), 0x101200, 0x0)
sendmsg$IPCTNL_MSG_EXP_DELETE(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0xb4}, 0x1, 0x0, 0x0, 0x1}, 0x40)
read$qrtrtun(0xffffffffffffffff, &(0x7f0000002300)=""/4115, 0x1013)
read$qrtrtun(r0, &(0x7f00000010c0)=""/140, 0x8c)
03:50:27 executing program 2:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90) (fail_nth: 1)
03:50:27 executing program 5:
r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/protocols\x00')
read$qrtrtun(r0, &(0x7f0000000040)=""/85, 0x55)
read$qrtrtun(0xffffffffffffffff, &(0x7f00000000c0)=""/156, 0x9c)
03:50:27 executing program 4:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0xf9c)
03:50:27 executing program 4:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0xfae)
03:50:27 executing program 0:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0xece)
03:50:27 executing program 0:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0xed6)
[ 2592.452079][T17750] FAULT_INJECTION: forcing a failure.
[ 2592.452079][T17750] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 2592.465242][T17750] CPU: 0 PID: 17750 Comm: syz-executor.2 Not tainted 6.6.0-syzkaller-12401-g8f6f76a6a29f #0
[ 2592.475376][T17750] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/09/2023
[ 2592.485527][T17750] Call Trace:
[ 2592.488825][T17750]
[ 2592.491769][T17750] dump_stack_lvl+0xda/0x130
[ 2592.496402][T17750] dump_stack+0x15/0x20
03:50:27 executing program 3:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
epoll_ctl$EPOLL_CTL_DEL(r1, 0x2, r0)
setsockopt$MRT_ASSERT(r1, 0x0, 0xcf, 0x0, 0x0)
openat$autofs(0xffffffffffffff9c, &(0x7f0000000040), 0x101200, 0x0)
r2 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000), 0x2)
read$qrtrtun(r2, &(0x7f0000002300)=""/4115, 0x1013)
read$qrtrtun(r0, &(0x7f00000010c0)=""/140, 0x8c)
03:50:27 executing program 0:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0xed8)
03:50:27 executing program 0:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0xeea)
[ 2592.500594][T17750] should_fail_ex+0x21f/0x230
[ 2592.505342][T17750] should_fail+0xb/0x10
[ 2592.509608][T17750] should_fail_usercopy+0x1a/0x20
[ 2592.514674][T17750] _copy_from_user+0x1e/0xd0
[ 2592.519318][T17750] __sys_bpf+0x14e/0x780
[ 2592.523683][T17750] __x64_sys_bpf+0x43/0x50
[ 2592.528222][T17750] do_syscall_64+0x44/0x110
[ 2592.532746][T17750] entry_SYSCALL_64_after_hwframe+0x63/0x6b
[ 2592.538756][T17750] RIP: 0033:0x7f59098eeae9
03:50:27 executing program 1:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0xeea)
03:50:27 executing program 0:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0xef2)
03:50:27 executing program 1:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0xef2)
[ 2592.543299][T17750] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
[ 2592.562936][T17750] RSP: 002b:00007f5908c710c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000141
[ 2592.571436][T17750] RAX: ffffffffffffffda RBX: 00007f5909a0df80 RCX: 00007f59098eeae9
[ 2592.579445][T17750] RDX: 0000000000000090 RSI: 00000000200014c0 RDI: 0000000000000005
[ 2592.587441][T17750] RBP: 00007f5908c71120 R08: 0000000000000000 R09: 0000000000000000
03:50:27 executing program 2:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90) (fail_nth: 2)
03:50:27 executing program 1:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0xef4)
03:50:27 executing program 0:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0xef4)
03:50:27 executing program 4:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0xfb6)
03:50:27 executing program 5:
r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/protocols\x00')
read$qrtrtun(r0, &(0x7f0000000040)=""/85, 0x55)
read$qrtrtun(r0, 0x0, 0x0)
03:50:27 executing program 1:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0xf06)
[ 2592.595439][T17750] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[ 2592.603447][T17750] R13: 000000000000000b R14: 00007f5909a0df80 R15: 00007fff93fbee98
[ 2592.611463][T17750]
[ 2592.674609][T17786] FAULT_INJECTION: forcing a failure.
[ 2592.674609][T17786] name failslab, interval 1, probability 0, space 0, times 0
[ 2592.687365][T17786] CPU: 0 PID: 17786 Comm: syz-executor.2 Not tainted 6.6.0-syzkaller-12401-g8f6f76a6a29f #0
[ 2592.697444][T17786] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/09/2023
[ 2592.707524][T17786] Call Trace:
[ 2592.710798][T17786]
[ 2592.713802][T17786] dump_stack_lvl+0xda/0x130
[ 2592.718397][T17786] dump_stack+0x15/0x20
[ 2592.722563][T17786] should_fail_ex+0x21f/0x230
[ 2592.727290][T17786] ? __get_vm_area_node+0x10e/0x230
[ 2592.732633][T17786] __should_failslab+0x92/0xa0
[ 2592.737408][T17786] should_failslab+0x9/0x20
[ 2592.741978][T17786] __kmem_cache_alloc_node+0x4e/0x210
[ 2592.747367][T17786] ? __get_vm_area_node+0x10e/0x230
[ 2592.752587][T17786] kmalloc_node_trace+0x27/0xa0
[ 2592.757440][T17786] __get_vm_area_node+0x10e/0x230
[ 2592.762482][T17786] __vmalloc_node_range+0x2fb/0xea0
[ 2592.767685][T17786] ? bpf_prog_alloc_no_stats+0x49/0x290
[ 2592.773271][T17786] ? __rcu_read_unlock+0x4d/0x70
[ 2592.778299][T17786] ? bpf_prog_alloc_no_stats+0x49/0x290
[ 2592.783868][T17786] __vmalloc+0x5e/0x70
[ 2592.788056][T17786] ? bpf_prog_alloc_no_stats+0x49/0x290
[ 2592.793662][T17786] bpf_prog_alloc_no_stats+0x49/0x290
[ 2592.799107][T17786] ? bpf_prog_alloc+0x29/0x160
[ 2592.803911][T17786] bpf_prog_alloc+0x3b/0x160
[ 2592.808522][T17786] bpf_prog_load+0x4e6/0xf50
[ 2592.813314][T17786] __sys_bpf+0x41c/0x780
[ 2592.817581][T17786] __x64_sys_bpf+0x43/0x50
[ 2592.822120][T17786] do_syscall_64+0x44/0x110
[ 2592.826645][T17786] entry_SYSCALL_64_after_hwframe+0x63/0x6b
[ 2592.832625][T17786] RIP: 0033:0x7f59098eeae9
[ 2592.837037][T17786] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
[ 2592.856654][T17786] RSP: 002b:00007f5908c710c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000141
[ 2592.865173][T17786] RAX: ffffffffffffffda RBX: 00007f5909a0df80 RCX: 00007f59098eeae9
[ 2592.873185][T17786] RDX: 0000000000000090 RSI: 00000000200014c0 RDI: 0000000000000005
[ 2592.881195][T17786] RBP: 00007f5908c71120 R08: 0000000000000000 R09: 0000000000000000
[ 2592.889174][T17786] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[ 2592.897257][T17786] R13: 000000000000000b R14: 00007f5909a0df80 R15: 00007fff93fbee98
[ 2592.905398][T17786]
[ 2592.908565][T17786] warn_alloc: 2 callbacks suppressed
[ 2592.908579][T17786] syz-executor.2: vmalloc error: size 4096, vm_struct allocation failed, mode:0x500dc0(GFP_USER|__GFP_ZERO|__GFP_ACCOUNT), nodemask=(null),cpuset=syz2,mems_allowed=0
[ 2592.930476][T17786] CPU: 0 PID: 17786 Comm: syz-executor.2 Not tainted 6.6.0-syzkaller-12401-g8f6f76a6a29f #0
[ 2592.940594][T17786] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/09/2023
[ 2592.950709][T17786] Call Trace:
[ 2592.953991][T17786]
[ 2592.956944][T17786] dump_stack_lvl+0xda/0x130
[ 2592.961537][T17786] dump_stack+0x15/0x20
[ 2592.965777][T17786] warn_alloc+0x140/0x1b0
[ 2592.970199][T17786] ? kmalloc_node_trace+0x27/0xa0
[ 2592.975321][T17786] __vmalloc_node_range+0x31f/0xea0
[ 2592.980561][T17786] ? __rcu_read_unlock+0x4d/0x70
[ 2592.985532][T17786] ? bpf_prog_alloc_no_stats+0x49/0x290
[ 2592.991177][T17786] __vmalloc+0x5e/0x70
[ 2592.995255][T17786] ? bpf_prog_alloc_no_stats+0x49/0x290
[ 2593.000815][T17786] bpf_prog_alloc_no_stats+0x49/0x290
[ 2593.006309][T17786] ? bpf_prog_alloc+0x29/0x160
[ 2593.011185][T17786] bpf_prog_alloc+0x3b/0x160
[ 2593.015789][T17786] bpf_prog_load+0x4e6/0xf50
[ 2593.020483][T17786] __sys_bpf+0x41c/0x780
[ 2593.024778][T17786] __x64_sys_bpf+0x43/0x50
[ 2593.029228][T17786] do_syscall_64+0x44/0x110
[ 2593.033743][T17786] entry_SYSCALL_64_after_hwframe+0x63/0x6b
[ 2593.039676][T17786] RIP: 0033:0x7f59098eeae9
[ 2593.044221][T17786] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
[ 2593.063834][T17786] RSP: 002b:00007f5908c710c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000141
[ 2593.072288][T17786] RAX: ffffffffffffffda RBX: 00007f5909a0df80 RCX: 00007f59098eeae9
[ 2593.080259][T17786] RDX: 0000000000000090 RSI: 00000000200014c0 RDI: 0000000000000005
[ 2593.088283][T17786] RBP: 00007f5908c71120 R08: 0000000000000000 R09: 0000000000000000
[ 2593.096256][T17786] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[ 2593.104225][T17786] R13: 000000000000000b R14: 00007f5909a0df80 R15: 00007fff93fbee98
[ 2593.112214][T17786]
[ 2593.115322][T17786] Mem-Info:
[ 2593.118499][T17786] active_anon:560 inactive_anon:17250 isolated_anon:0
[ 2593.118499][T17786] active_file:5386 inactive_file:8884 isolated_file:0
[ 2593.118499][T17786] unevictable:0 dirty:0 writeback:0
[ 2593.118499][T17786] slab_reclaimable:10955 slab_unreclaimable:16817
[ 2593.118499][T17786] mapped:19646 shmem:813 pagetables:651
[ 2593.118499][T17786] sec_pagetables:0 bounce:0
[ 2593.118499][T17786] kernel_misc_reclaimable:0
[ 2593.118499][T17786] free:1904139 free_pcp:2464 free_cma:0
[ 2593.163330][T17786] Node 0 active_anon:2240kB inactive_anon:69000kB active_file:21544kB inactive_file:35536kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:78584kB dirty:0kB writeback:0kB shmem:3252kB writeback_tmp:0kB kernel_stack:3824kB pagetables:2604kB sec_pagetables:0kB all_unreclaimable? no
[ 2593.191134][T17786] Node 0 DMA free:15360kB boost:0kB min:20kB low:32kB high:44kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15360kB mlocked:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB
[ 2593.218106][T17786] lowmem_reserve[]: 0 2896 7874 7874
[ 2593.223890][T17786] Node 0 DMA32 free:2965464kB boost:0kB min:4172kB low:7136kB high:10100kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3129332kB managed:2968920kB mlocked:0kB bounce:0kB free_pcp:3456kB local_pcp:96kB free_cma:0kB
[ 2593.252500][T17786] lowmem_reserve[]: 0 0 4978 4978
[ 2593.257630][T17786] Node 0 Normal free:4635732kB boost:0kB min:7172kB low:12268kB high:17364kB reserved_highatomic:0KB active_anon:2240kB inactive_anon:69000kB active_file:21544kB inactive_file:35536kB unevictable:0kB writepending:0kB present:5242880kB managed:5098224kB mlocked:0kB bounce:0kB free_pcp:6432kB local_pcp:4444kB free_cma:0kB
[ 2593.287825][T17786] lowmem_reserve[]: 0 0 0 0
[ 2593.292361][T17786] Node 0 DMA: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15360kB
[ 2593.305083][T17786] Node 0 DMA32: 2*4kB (M) 0*8kB 1*16kB (M) 2*32kB (M) 2*64kB (M) 2*128kB (M) 2*256kB (M) 2*512kB (M) 2*1024kB (M) 2*2048kB (M) 722*4096kB (M) = 2965464kB
[ 2593.320826][T17786] Node 0 Normal: 141*4kB (UM) 368*8kB (UM) 602*16kB (UM) 560*32kB (UM) 270*64kB (UME) 121*128kB (UM) 37*256kB (UM) 23*512kB (UME) 18*1024kB (UM) 13*2048kB (U) 1100*4096kB (UM) = 4635732kB
[ 2593.339873][T17786] Node 0 hugepages_total=4 hugepages_free=4 hugepages_surp=0 hugepages_size=2048kB
[ 2593.349181][T17786] 15084 total pagecache pages
[ 2593.353874][T17786] 1 pages in swap cache
[ 2593.358028][T17786] Free swap = 124476kB
[ 2593.362239][T17786] Total swap = 124996kB
[ 2593.366534][T17786] 2097051 pages RAM
[ 2593.370344][T17786] 0 pages HighMem/MovableOnly
03:50:28 executing program 3:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
epoll_ctl$EPOLL_CTL_DEL(r1, 0x2, r0)
setsockopt$MRT_ASSERT(r1, 0x0, 0xcf, 0x0, 0x0)
r2 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000), 0x2)
read$qrtrtun(r2, &(0x7f0000002300)=""/4115, 0x1013)
read$qrtrtun(r0, &(0x7f00000010c0)=""/140, 0x8c)
03:50:28 executing program 4:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0xfb8)
03:50:28 executing program 1:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0xf0e)
03:50:28 executing program 0:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0xf06)
03:50:28 executing program 5:
r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/protocols\x00')
read$qrtrtun(r0, &(0x7f0000000040)=""/85, 0x55)
read$qrtrtun(r0, 0x0, 0x0)
03:50:28 executing program 1:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0xf10)
03:50:28 executing program 2:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90) (fail_nth: 3)
03:50:28 executing program 5:
r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/protocols\x00')
read$qrtrtun(r0, &(0x7f0000000040)=""/85, 0x55)
read$qrtrtun(r0, 0x0, 0x0)
03:50:28 executing program 1:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0xf22)
[ 2593.375074][T17786] 76425 pages reserved
03:50:28 executing program 4:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0xfca)
03:50:28 executing program 0:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0xf0e)
03:50:28 executing program 0:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0xf10)
[ 2593.430911][T17803] FAULT_INJECTION: forcing a failure.
[ 2593.430911][T17803] name failslab, interval 1, probability 0, space 0, times 0
[ 2593.443615][T17803] CPU: 0 PID: 17803 Comm: syz-executor.2 Not tainted 6.6.0-syzkaller-12401-g8f6f76a6a29f #0
[ 2593.453818][T17803] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/09/2023
[ 2593.463963][T17803] Call Trace:
[ 2593.467289][T17803]
[ 2593.470240][T17803] dump_stack_lvl+0xda/0x130
[ 2593.474866][T17803] dump_stack+0x15/0x20
[ 2593.479057][T17803] should_fail_ex+0x21f/0x230
[ 2593.483837][T17803] ? alloc_vmap_area+0x14e/0x1250
[ 2593.489172][T17803] __should_failslab+0x92/0xa0
[ 2593.493966][T17803] should_failslab+0x9/0x20
[ 2593.498509][T17803] kmem_cache_alloc_node+0x52/0x280
[ 2593.503880][T17803] alloc_vmap_area+0x14e/0x1250
[ 2593.508766][T17803] ? slab_post_alloc_hook+0x82/0x2f0
[ 2593.514147][T17803] ? __get_vm_area_node+0x10e/0x230
[ 2593.519876][T17803] ? __kmem_cache_alloc_node+0x17f/0x210
[ 2593.525544][T17803] __get_vm_area_node+0x154/0x230
[ 2593.530642][T17803] __vmalloc_node_range+0x2fb/0xea0
[ 2593.535899][T17803] ? bpf_prog_alloc_no_stats+0x49/0x290
[ 2593.541464][T17803] ? __rcu_read_unlock+0x4d/0x70
[ 2593.546417][T17803] ? bpf_prog_alloc_no_stats+0x49/0x290
[ 2593.551985][T17803] __vmalloc+0x5e/0x70
[ 2593.556061][T17803] ? bpf_prog_alloc_no_stats+0x49/0x290
[ 2593.561688][T17803] bpf_prog_alloc_no_stats+0x49/0x290
[ 2593.567192][T17803] ? bpf_prog_alloc+0x29/0x160
[ 2593.571975][T17803] bpf_prog_alloc+0x3b/0x160
[ 2593.576651][T17803] bpf_prog_load+0x4e6/0xf50
[ 2593.581257][T17803] __sys_bpf+0x41c/0x780
[ 2593.585563][T17803] __x64_sys_bpf+0x43/0x50
[ 2593.590089][T17803] do_syscall_64+0x44/0x110
[ 2593.594803][T17803] entry_SYSCALL_64_after_hwframe+0x63/0x6b
[ 2593.600728][T17803] RIP: 0033:0x7f59098eeae9
[ 2593.605152][T17803] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
[ 2593.624938][T17803] RSP: 002b:00007f5908c710c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000141
[ 2593.633367][T17803] RAX: ffffffffffffffda RBX: 00007f5909a0df80 RCX: 00007f59098eeae9
[ 2593.641357][T17803] RDX: 0000000000000090 RSI: 00000000200014c0 RDI: 0000000000000005
[ 2593.649389][T17803] RBP: 00007f5908c71120 R08: 0000000000000000 R09: 0000000000000000
[ 2593.657437][T17803] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[ 2593.665492][T17803] R13: 000000000000000b R14: 00007f5909a0df80 R15: 00007fff93fbee98
[ 2593.673469][T17803]
03:50:28 executing program 0:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0xf22)
03:50:28 executing program 1:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0xf2a)
03:50:28 executing program 4:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0xfd2)
03:50:28 executing program 5:
r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/protocols\x00')
read$qrtrtun(r0, &(0x7f0000000040)=""/85, 0x55)
read$qrtrtun(r0, &(0x7f00000000c0)=""/156, 0x9c) (fail_nth: 1)
03:50:28 executing program 2:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90) (fail_nth: 4)
03:50:28 executing program 3:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
epoll_ctl$EPOLL_CTL_DEL(r1, 0x2, r0)
r2 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000), 0x2)
read$qrtrtun(r2, &(0x7f0000002300)=""/4115, 0x1013)
read$qrtrtun(r0, &(0x7f00000010c0)=""/140, 0x8c)
03:50:28 executing program 0:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0xf2a)
03:50:28 executing program 1:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0xf2c)
03:50:28 executing program 1:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0xf3e)
[ 2594.241588][T17816] FAULT_INJECTION: forcing a failure.
[ 2594.241588][T17816] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 2594.254794][T17816] CPU: 0 PID: 17816 Comm: syz-executor.5 Not tainted 6.6.0-syzkaller-12401-g8f6f76a6a29f #0
[ 2594.264999][T17816] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/09/2023
[ 2594.275069][T17816] Call Trace:
[ 2594.278362][T17816]
[ 2594.281358][T17816] dump_stack_lvl+0xda/0x130
[ 2594.285979][T17816] dump_stack+0x15/0x20
03:50:28 executing program 0:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0xf2c)
03:50:29 executing program 1:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0xf46)
[ 2594.290167][T17816] should_fail_ex+0x21f/0x230
[ 2594.295011][T17816] should_fail+0xb/0x10
[ 2594.299225][T17816] should_fail_usercopy+0x1a/0x20
[ 2594.304359][T17816] _copy_to_iter+0x23e/0xb20
[ 2594.308992][T17816] ? __virt_addr_valid+0x16a/0x1b0
[ 2594.314153][T17816] ? __check_object_size+0x364/0x510
[ 2594.319494][T17816] seq_read_iter+0x1e1/0x8f0
[ 2594.324183][T17816] seq_read+0xd8/0x120
[ 2594.328291][T17816] ? seq_open+0xf0/0xf0
[ 2594.332537][T17816] proc_reg_read+0x13b/0x1d0
03:50:29 executing program 1:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0xf48)
03:50:29 executing program 1:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0xf5a)
[ 2594.337165][T17816] ? proc_reg_get_unmapped_area+0x240/0x240
[ 2594.343154][T17816] vfs_read+0x1a4/0x590
[ 2594.347353][T17816] ? mutex_lock+0xd/0x30
[ 2594.351668][T17816] ksys_read+0xeb/0x1a0
[ 2594.355961][T17816] __x64_sys_read+0x42/0x50
[ 2594.360503][T17816] do_syscall_64+0x44/0x110
[ 2594.365039][T17816] entry_SYSCALL_64_after_hwframe+0x63/0x6b
[ 2594.370980][T17816] RIP: 0033:0x7f7b9a93eae9
[ 2594.374278][T17837] FAULT_INJECTION: forcing a failure.
[ 2594.374278][T17837] name failslab, interval 1, probability 0, space 0, times 0
[ 2594.375440][T17816] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
[ 2594.407667][T17816] RSP: 002b:00007f7b99cc10c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000
[ 2594.416305][T17816] RAX: ffffffffffffffda RBX: 00007f7b9aa5df80 RCX: 00007f7b9a93eae9
[ 2594.424283][T17816] RDX: 000000000000009c RSI: 00000000200000c0 RDI: 0000000000000003
[ 2594.432263][T17816] RBP: 00007f7b99cc1120 R08: 0000000000000000 R09: 0000000000000000
[ 2594.440244][T17816] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[ 2594.448237][T17816] R13: 000000000000000b R14: 00007f7b9aa5df80 R15: 00007ffd07cad088
[ 2594.456281][T17816]
[ 2594.459299][T17837] CPU: 1 PID: 17837 Comm: syz-executor.2 Not tainted 6.6.0-syzkaller-12401-g8f6f76a6a29f #0
[ 2594.469480][T17837] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/09/2023
[ 2594.479565][T17837] Call Trace:
[ 2594.482865][T17837]
[ 2594.485818][T17837] dump_stack_lvl+0xda/0x130
[ 2594.490493][T17837] dump_stack+0x15/0x20
[ 2594.494687][T17837] should_fail_ex+0x21f/0x230
[ 2594.499424][T17837] ? alloc_vmap_area+0x4be/0x1250
[ 2594.504491][T17837] __should_failslab+0x92/0xa0
[ 2594.509339][T17837] should_failslab+0x9/0x20
[ 2594.513886][T17837] kmem_cache_alloc_node+0x52/0x280
[ 2594.519116][T17837] ? alloc_vmap_area+0x14e/0x1250
[ 2594.524226][T17837] alloc_vmap_area+0x4be/0x1250
[ 2594.526735][T17843] FAULT_INJECTION: forcing a failure.
[ 2594.526735][T17843] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 2594.529092][T17837] ? __get_vm_area_node+0x10e/0x230
[ 2594.547433][T17837] __get_vm_area_node+0x154/0x230
[ 2594.552520][T17837] __vmalloc_node_range+0x2fb/0xea0
[ 2594.557761][T17837] ? bpf_prog_alloc_no_stats+0x49/0x290
[ 2594.563330][T17837] ? __rcu_read_unlock+0x4d/0x70
[ 2594.568372][T17837] ? bpf_prog_alloc_no_stats+0x49/0x290
[ 2594.573980][T17837] __vmalloc+0x5e/0x70
[ 2594.578088][T17837] ? bpf_prog_alloc_no_stats+0x49/0x290
[ 2594.583653][T17837] bpf_prog_alloc_no_stats+0x49/0x290
[ 2594.589049][T17837] ? bpf_prog_alloc+0x29/0x160
[ 2594.593831][T17837] bpf_prog_alloc+0x3b/0x160
[ 2594.598674][T17837] bpf_prog_load+0x4e6/0xf50
[ 2594.603318][T17837] __sys_bpf+0x41c/0x780
[ 2594.607608][T17837] __x64_sys_bpf+0x43/0x50
[ 2594.612044][T17837] do_syscall_64+0x44/0x110
[ 2594.616605][T17837] entry_SYSCALL_64_after_hwframe+0x63/0x6b
[ 2594.623047][T17837] RIP: 0033:0x7f59098eeae9
[ 2594.627478][T17837] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
[ 2594.647329][T17837] RSP: 002b:00007f5908c710c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000141
[ 2594.655748][T17837] RAX: ffffffffffffffda RBX: 00007f5909a0df80 RCX: 00007f59098eeae9
[ 2594.663729][T17837] RDX: 0000000000000090 RSI: 00000000200014c0 RDI: 0000000000000005
[ 2594.671764][T17837] RBP: 00007f5908c71120 R08: 0000000000000000 R09: 0000000000000000
[ 2594.679759][T17837] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
03:50:29 executing program 0:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0xf3e)
03:50:29 executing program 4:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0xfd4)
03:50:29 executing program 5:
r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/protocols\x00')
read$qrtrtun(r0, &(0x7f0000000040)=""/85, 0x55)
read$qrtrtun(r0, &(0x7f00000000c0)=""/156, 0x9c) (fail_nth: 2)
[ 2594.687788][T17837] R13: 000000000000000b R14: 00007f5909a0df80 R15: 00007fff93fbee98
[ 2594.695779][T17837]
[ 2594.698804][T17843] CPU: 0 PID: 17843 Comm: syz-executor.5 Not tainted 6.6.0-syzkaller-12401-g8f6f76a6a29f #0
[ 2594.708997][T17843] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/09/2023
[ 2594.719198][T17843] Call Trace:
[ 2594.722515][T17843]
[ 2594.725467][T17843] dump_stack_lvl+0xda/0x130
[ 2594.730105][T17843] dump_stack+0x15/0x20
[ 2594.734292][T17843] should_fail_ex+0x21f/0x230
[ 2594.739051][T17843] should_fail+0xb/0x10
03:50:29 executing program 2:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90) (fail_nth: 5)
[ 2594.743290][T17843] should_fail_usercopy+0x1a/0x20
[ 2594.748395][T17843] _copy_to_iter+0x23e/0xb20
[ 2594.753038][T17843] ? __virt_addr_valid+0x16a/0x1b0
[ 2594.758216][T17843] ? __check_object_size+0x364/0x510
[ 2594.763653][T17843] seq_read_iter+0x754/0x8f0
[ 2594.768286][T17843] seq_read+0xd8/0x120
[ 2594.772383][T17843] ? seq_open+0xf0/0xf0
[ 2594.776645][T17843] proc_reg_read+0x13b/0x1d0
[ 2594.781384][T17843] ? proc_reg_get_unmapped_area+0x240/0x240
[ 2594.787291][T17843] vfs_read+0x1a4/0x590
[ 2594.791530][T17843] ? mutex_lock+0xd/0x30
[ 2594.795774][T17843] ksys_read+0xeb/0x1a0
[ 2594.799960][T17843] __x64_sys_read+0x42/0x50
[ 2594.804497][T17843] do_syscall_64+0x44/0x110
[ 2594.809004][T17843] entry_SYSCALL_64_after_hwframe+0x63/0x6b
[ 2594.814908][T17843] RIP: 0033:0x7f7b9a93eae9
[ 2594.819333][T17843] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
[ 2594.838977][T17843] RSP: 002b:00007f7b99cc10c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000
[ 2594.847417][T17843] RAX: ffffffffffffffda RBX: 00007f7b9aa5df80 RCX: 00007f7b9a93eae9
[ 2594.855509][T17843] RDX: 000000000000009c RSI: 00000000200000c0 RDI: 0000000000000003
[ 2594.863508][T17843] RBP: 00007f7b99cc1120 R08: 0000000000000000 R09: 0000000000000000
[ 2594.871583][T17843] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[ 2594.879627][T17843] R13: 000000000000000b R14: 00007f7b9aa5df80 R15: 00007ffd07cad088
[ 2594.887647][T17843]
03:50:29 executing program 4:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0xfe6)
03:50:29 executing program 3:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
r1 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000), 0x2)
read$qrtrtun(r1, &(0x7f0000002300)=""/4115, 0x1013)
read$qrtrtun(r0, &(0x7f00000010c0)=""/140, 0x8c)
03:50:29 executing program 5:
r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/protocols\x00')
read$qrtrtun(r0, &(0x7f0000000040)=""/85, 0x55)
read$qrtrtun(r0, &(0x7f00000000c0)=""/156, 0x9c) (fail_nth: 3)
03:50:29 executing program 0:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0xf46)
03:50:29 executing program 2:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90) (fail_nth: 6)
03:50:29 executing program 1:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0xf62)
03:50:29 executing program 2:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90) (fail_nth: 7)
03:50:29 executing program 0:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0xf48)
[ 2595.195013][T17857] FAULT_INJECTION: forcing a failure.
[ 2595.195013][T17857] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 2595.208194][T17857] CPU: 1 PID: 17857 Comm: syz-executor.5 Not tainted 6.6.0-syzkaller-12401-g8f6f76a6a29f #0
[ 2595.218290][T17857] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/09/2023
[ 2595.228431][T17857] Call Trace:
[ 2595.231736][T17857]
[ 2595.234690][T17857] dump_stack_lvl+0xda/0x130
[ 2595.239369][T17857] dump_stack+0x15/0x20
[ 2595.243655][T17857] should_fail_ex+0x21f/0x230
[ 2595.247971][T17865] FAULT_INJECTION: forcing a failure.
[ 2595.247971][T17865] name failslab, interval 1, probability 0, space 0, times 0
[ 2595.248429][T17857] should_fail+0xb/0x10
[ 2595.265220][T17857] should_fail_usercopy+0x1a/0x20
[ 2595.270353][T17857] _copy_to_user+0x1e/0x90
[ 2595.274905][T17857] simple_read_from_buffer+0xa0/0x110
[ 2595.280429][T17857] proc_fail_nth_read+0xfc/0x140
[ 2595.285424][T17857] ? proc_fault_inject_write+0x210/0x210
[ 2595.291136][T17857] vfs_read+0x1a4/0x590
[ 2595.295348][T17857] ? mutex_lock+0xd/0x30
[ 2595.299713][T17857] ksys_read+0xeb/0x1a0
[ 2595.303891][T17857] __x64_sys_read+0x42/0x50
[ 2595.308448][T17857] do_syscall_64+0x44/0x110
[ 2595.312966][T17857] entry_SYSCALL_64_after_hwframe+0x63/0x6b
[ 2595.318963][T17857] RIP: 0033:0x7f7b9a93d78c
[ 2595.323383][T17857] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 59 81 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 af 81 02 00 48
[ 2595.343004][T17857] RSP: 002b:00007f7b99cc10c0 EFLAGS: 00000246 ORIG_RAX: 0000000000000000
[ 2595.351424][T17857] RAX: ffffffffffffffda RBX: 00007f7b9aa5df80 RCX: 00007f7b9a93d78c
[ 2595.359416][T17857] RDX: 000000000000000f RSI: 00007f7b99cc1130 RDI: 0000000000000004
[ 2595.367407][T17857] RBP: 00007f7b99cc1120 R08: 0000000000000000 R09: 0000000000000000
[ 2595.375385][T17857] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[ 2595.383364][T17857] R13: 000000000000000b R14: 00007f7b9aa5df80 R15: 00007ffd07cad088
[ 2595.391385][T17857]
03:50:29 executing program 4:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0xfee)
03:50:30 executing program 4:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0xff0)
03:50:30 executing program 1:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0xf64)
03:50:30 executing program 0:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0xf5a)
03:50:30 executing program 5:
r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/protocols\x00')
read$qrtrtun(r0, &(0x7f0000000040)=""/85, 0x55)
read$qrtrtun(r0, &(0x7f00000000c0)=""/156, 0x9c)
[ 2595.394406][T17865] CPU: 0 PID: 17865 Comm: syz-executor.2 Not tainted 6.6.0-syzkaller-12401-g8f6f76a6a29f #0
[ 2595.404588][T17865] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/09/2023
[ 2595.414669][T17865] Call Trace:
[ 2595.417986][T17865]
[ 2595.421292][T17865] dump_stack_lvl+0xda/0x130
[ 2595.425924][T17865] dump_stack+0x15/0x20
[ 2595.430148][T17865] should_fail_ex+0x21f/0x230
[ 2595.434907][T17865] ? bpf_prog_alloc_no_stats+0xc3/0x290
[ 2595.440592][T17865] __should_failslab+0x92/0xa0
[ 2595.445455][T17865] should_failslab+0x9/0x20
[ 2595.450027][T17865] __kmem_cache_alloc_node+0x4e/0x210
[ 2595.455435][T17865] ? bpf_prog_alloc_no_stats+0xc3/0x290
[ 2595.461038][T17865] kmalloc_trace+0x2a/0xa0
[ 2595.465480][T17865] bpf_prog_alloc_no_stats+0xc3/0x290
[ 2595.471017][T17865] bpf_prog_alloc+0x3b/0x160
[ 2595.475660][T17865] bpf_prog_load+0x4e6/0xf50
[ 2595.480314][T17865] __sys_bpf+0x41c/0x780
[ 2595.484691][T17865] __x64_sys_bpf+0x43/0x50
[ 2595.489165][T17865] do_syscall_64+0x44/0x110
[ 2595.493681][T17865] entry_SYSCALL_64_after_hwframe+0x63/0x6b
[ 2595.499606][T17865] RIP: 0033:0x7f59098eeae9
[ 2595.504030][T17865] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
[ 2595.523705][T17865] RSP: 002b:00007f5908c710c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000141
[ 2595.532118][T17865] RAX: ffffffffffffffda RBX: 00007f5909a0df80 RCX: 00007f59098eeae9
[ 2595.540253][T17865] RDX: 0000000000000090 RSI: 00000000200014c0 RDI: 0000000000000005
[ 2595.548265][T17865] RBP: 00007f5908c71120 R08: 0000000000000000 R09: 0000000000000000
[ 2595.556263][T17865] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[ 2595.564234][T17865] R13: 000000000000000b R14: 00007f5909a0df80 R15: 00007fff93fbee98
[ 2595.572267][T17865]
03:50:30 executing program 0:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0xf62)
03:50:30 executing program 1:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0xf76)
03:50:30 executing program 2:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90) (fail_nth: 8)
03:50:30 executing program 5:
r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/protocols\x00')
read$qrtrtun(r0, &(0x7f0000000040)=""/85, 0x55)
read$qrtrtun(r0, &(0x7f00000000c0)=""/156, 0x1e)
03:50:30 executing program 4:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1001)
03:50:30 executing program 3:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
r1 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000), 0x2)
read$qrtrtun(r1, &(0x7f0000002300)=""/4115, 0x1013)
read$qrtrtun(r0, &(0x7f00000010c0)=""/140, 0x8c)
03:50:30 executing program 0:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0xf64)
03:50:30 executing program 4:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1002)
03:50:30 executing program 5:
r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/protocols\x00')
read$qrtrtun(r0, &(0x7f0000000040)=""/85, 0x55)
read$qrtrtun(r0, &(0x7f00000000c0)=""/156, 0x9c)
sendmsg$NFNL_MSG_COMPAT_GET(r0, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x48, 0x0, 0xb, 0x101, 0x0, 0x0, {0x7, 0x0, 0x9}, [@NFTA_COMPAT_TYPE={0x8}, @NFTA_COMPAT_REV={0x8, 0x2, 0x1, 0x0, 0x3}, @NFTA_COMPAT_TYPE={0x8}, @NFTA_COMPAT_NAME={0x8, 0x1, ':#&\x00'}, @NFTA_COMPAT_NAME={0x12, 0x1, 'net/protocols\x00'}]}, 0x48}, 0x1, 0x0, 0x0, 0x4080000}, 0x4090)
03:50:30 executing program 1:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0xf7e)
03:50:30 executing program 0:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0xf76)
03:50:30 executing program 4:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1003)
03:50:30 executing program 1:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0xf80)
[ 2596.114296][T17886] FAULT_INJECTION: forcing a failure.
[ 2596.114296][T17886] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 2596.127469][T17886] CPU: 0 PID: 17886 Comm: syz-executor.2 Not tainted 6.6.0-syzkaller-12401-g8f6f76a6a29f #0
[ 2596.137650][T17886] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/09/2023
[ 2596.147730][T17886] Call Trace:
[ 2596.151032][T17886]
[ 2596.153976][T17886] dump_stack_lvl+0xda/0x130
[ 2596.158679][T17886] dump_stack+0x15/0x20
03:50:30 executing program 1:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0xf92)
[ 2596.162908][T17886] should_fail_ex+0x21f/0x230
[ 2596.167672][T17886] should_fail+0xb/0x10
[ 2596.171957][T17886] should_fail_usercopy+0x1a/0x20
[ 2596.177029][T17886] _copy_from_user+0x1e/0xd0
[ 2596.181654][T17886] copy_from_bpfptr+0x5e/0x90
[ 2596.186407][T17886] bpf_prog_load+0x763/0xf50
[ 2596.191035][T17886] __sys_bpf+0x41c/0x780
[ 2596.195397][T17886] __x64_sys_bpf+0x43/0x50
[ 2596.199857][T17886] do_syscall_64+0x44/0x110
[ 2596.204404][T17886] entry_SYSCALL_64_after_hwframe+0x63/0x6b
[ 2596.210458][T17886] RIP: 0033:0x7f59098eeae9
[ 2596.215022][T17886] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
[ 2596.234660][T17886] RSP: 002b:00007f5908c710c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000141
[ 2596.243136][T17886] RAX: ffffffffffffffda RBX: 00007f5909a0df80 RCX: 00007f59098eeae9
[ 2596.251129][T17886] RDX: 0000000000000090 RSI: 00000000200014c0 RDI: 0000000000000005
03:50:30 executing program 2:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90) (fail_nth: 9)
03:50:30 executing program 1:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0xf9a)
03:50:30 executing program 4:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1004)
[ 2596.259182][T17886] RBP: 00007f5908c71120 R08: 0000000000000000 R09: 0000000000000000
[ 2596.267245][T17886] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[ 2596.275322][T17886] R13: 000000000000000b R14: 00007f5909a0df80 R15: 00007fff93fbee98
[ 2596.283479][T17886]
[ 2596.307999][T17909] FAULT_INJECTION: forcing a failure.
[ 2596.307999][T17909] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 2596.321560][T17909] CPU: 0 PID: 17909 Comm: syz-executor.2 Not tainted 6.6.0-syzkaller-12401-g8f6f76a6a29f #0
[ 2596.331691][T17909] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/09/2023
[ 2596.341748][T17909] Call Trace:
[ 2596.345025][T17909]
[ 2596.347956][T17909] dump_stack_lvl+0xda/0x130
[ 2596.353526][T17909] dump_stack+0x15/0x20
[ 2596.357790][T17909] should_fail_ex+0x21f/0x230
[ 2596.362487][T17909] should_fail+0xb/0x10
[ 2596.366750][T17909] should_fail_usercopy+0x1a/0x20
[ 2596.371789][T17909] strncpy_from_user+0x25/0x270
[ 2596.376686][T17909] strncpy_from_bpfptr+0x38/0x60
[ 2596.381642][T17909] bpf_prog_load+0x971/0xf50
[ 2596.386293][T17909] __sys_bpf+0x41c/0x780
[ 2596.390576][T17909] __x64_sys_bpf+0x43/0x50
[ 2596.395003][T17909] do_syscall_64+0x44/0x110
[ 2596.399542][T17909] entry_SYSCALL_64_after_hwframe+0x63/0x6b
[ 2596.405507][T17909] RIP: 0033:0x7f59098eeae9
[ 2596.409940][T17909] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
[ 2596.429586][T17909] RSP: 002b:00007f5908c710c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000141
[ 2596.438030][T17909] RAX: ffffffffffffffda RBX: 00007f5909a0df80 RCX: 00007f59098eeae9
[ 2596.446012][T17909] RDX: 0000000000000090 RSI: 00000000200014c0 RDI: 0000000000000005
[ 2596.454031][T17909] RBP: 00007f5908c71120 R08: 0000000000000000 R09: 0000000000000000
[ 2596.462010][T17909] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[ 2596.470009][T17909] R13: 000000000000000b R14: 00007f5909a0df80 R15: 00007fff93fbee98
[ 2596.477987][T17909]
03:50:31 executing program 3:
r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000), 0x2)
read$qrtrtun(r0, &(0x7f0000002300)=""/4115, 0x1013)
read$qrtrtun(0xffffffffffffffff, &(0x7f00000010c0)=""/140, 0x8c)
03:50:31 executing program 5:
r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/protocols\x00')
read$qrtrtun(r0, &(0x7f0000000040)=""/85, 0x55) (async)
read$qrtrtun(r0, &(0x7f00000000c0)=""/156, 0x9c) (async)
sendmsg$NFNL_MSG_COMPAT_GET(r0, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x48, 0x0, 0xb, 0x101, 0x0, 0x0, {0x7, 0x0, 0x9}, [@NFTA_COMPAT_TYPE={0x8}, @NFTA_COMPAT_REV={0x8, 0x2, 0x1, 0x0, 0x3}, @NFTA_COMPAT_TYPE={0x8}, @NFTA_COMPAT_NAME={0x8, 0x1, ':#&\x00'}, @NFTA_COMPAT_NAME={0x12, 0x1, 'net/protocols\x00'}]}, 0x48}, 0x1, 0x0, 0x0, 0x4080000}, 0x4090)
03:50:31 executing program 0:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0xf7e)
03:50:31 executing program 1:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0xf9c)
03:50:31 executing program 4:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1005)
03:50:31 executing program 2:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90) (fail_nth: 10)
[ 2596.964745][T17917] FAULT_INJECTION: forcing a failure.
[ 2596.964745][T17917] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 2596.977897][T17917] CPU: 1 PID: 17917 Comm: syz-executor.2 Not tainted 6.6.0-syzkaller-12401-g8f6f76a6a29f #0
[ 2596.988192][T17917] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/09/2023
[ 2596.998277][T17917] Call Trace:
[ 2597.001576][T17917]
[ 2597.004612][T17917] dump_stack_lvl+0xda/0x130
[ 2597.009231][T17917] dump_stack+0x15/0x20
03:50:31 executing program 0:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0xf80)
03:50:31 executing program 1:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0xfae)
03:50:31 executing program 0:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0xf92)
03:50:31 executing program 1:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0xfb6)
03:50:31 executing program 0:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0xf9a)
03:50:31 executing program 4:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1006)
[ 2597.013477][T17917] should_fail_ex+0x21f/0x230
[ 2597.018313][T17917] should_fail+0xb/0x10
[ 2597.022503][T17917] should_fail_usercopy+0x1a/0x20
[ 2597.027613][T17917] strncpy_from_user+0x25/0x270
[ 2597.032495][T17917] strncpy_from_bpfptr+0x38/0x60
[ 2597.037519][T17917] bpf_prog_load+0x971/0xf50
[ 2597.042160][T17917] __sys_bpf+0x41c/0x780
[ 2597.046456][T17917] __x64_sys_bpf+0x43/0x50
[ 2597.050917][T17917] do_syscall_64+0x44/0x110
[ 2597.055550][T17917] entry_SYSCALL_64_after_hwframe+0x63/0x6b
[ 2597.061492][T17917] RIP: 0033:0x7f59098eeae9
[ 2597.066002][T17917] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
[ 2597.085703][T17917] RSP: 002b:00007f5908c710c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000141
[ 2597.094146][T17917] RAX: ffffffffffffffda RBX: 00007f5909a0df80 RCX: 00007f59098eeae9
[ 2597.102156][T17917] RDX: 0000000000000090 RSI: 00000000200014c0 RDI: 0000000000000005
[ 2597.110156][T17917] RBP: 00007f5908c71120 R08: 0000000000000000 R09: 0000000000000000
[ 2597.118585][T17917] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 2597.126557][T17917] R13: 000000000000000b R14: 00007f5909a0df80 R15: 00007fff93fbee98
[ 2597.134546][T17917]
03:50:32 executing program 5:
r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/protocols\x00')
read$qrtrtun(r0, &(0x7f0000000040)=""/85, 0x55)
read$qrtrtun(r0, &(0x7f00000000c0)=""/156, 0x9c)
sendmsg$NFNL_MSG_COMPAT_GET(r0, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x48, 0x0, 0xb, 0x101, 0x0, 0x0, {0x7, 0x0, 0x9}, [@NFTA_COMPAT_TYPE={0x8}, @NFTA_COMPAT_REV={0x8, 0x2, 0x1, 0x0, 0x3}, @NFTA_COMPAT_TYPE={0x8}, @NFTA_COMPAT_NAME={0x8, 0x1, ':#&\x00'}, @NFTA_COMPAT_NAME={0x12, 0x1, 'net/protocols\x00'}]}, 0x48}, 0x1, 0x0, 0x0, 0x4080000}, 0x4090)
syz_open_procfs(0x0, &(0x7f0000000200)='net/protocols\x00') (async)
read$qrtrtun(r0, &(0x7f0000000040)=""/85, 0x55) (async)
read$qrtrtun(r0, &(0x7f00000000c0)=""/156, 0x9c) (async)
sendmsg$NFNL_MSG_COMPAT_GET(r0, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x48, 0x0, 0xb, 0x101, 0x0, 0x0, {0x7, 0x0, 0x9}, [@NFTA_COMPAT_TYPE={0x8}, @NFTA_COMPAT_REV={0x8, 0x2, 0x1, 0x0, 0x3}, @NFTA_COMPAT_TYPE={0x8}, @NFTA_COMPAT_NAME={0x8, 0x1, ':#&\x00'}, @NFTA_COMPAT_NAME={0x12, 0x1, 'net/protocols\x00'}]}, 0x48}, 0x1, 0x0, 0x0, 0x4080000}, 0x4090) (async)
03:50:32 executing program 0:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0xf9c)
03:50:32 executing program 4:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1007)
03:50:32 executing program 1:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0xfb8)
03:50:32 executing program 2:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90) (fail_nth: 11)
03:50:32 executing program 3:
r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000), 0x2)
read$qrtrtun(r0, &(0x7f0000002300)=""/4115, 0x1013)
read$qrtrtun(0xffffffffffffffff, &(0x7f00000010c0)=""/140, 0x8c)
[ 2597.820553][T17943] FAULT_INJECTION: forcing a failure.
[ 2597.820553][T17943] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[ 2597.833881][T17943] CPU: 0 PID: 17943 Comm: syz-executor.2 Not tainted 6.6.0-syzkaller-12401-g8f6f76a6a29f #0
[ 2597.844052][T17943] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/09/2023
[ 2597.854290][T17943] Call Trace:
[ 2597.857636][T17943]
[ 2597.860586][T17943] dump_stack_lvl+0xda/0x130
[ 2597.865223][T17943] dump_stack+0x15/0x20
03:50:32 executing program 5:
r0 = memfd_secret(0x80000)
bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000000)={r0, 0x0, 0x25, 0x2, @void}, 0x10)
sendmsg$IPSET_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000240)={0xe8, 0xa, 0x6, 0x801, 0x0, 0x0, {0x5, 0x0, 0x6}, [@IPSET_ATTR_DATA={0x74, 0x7, 0x0, 0x1, [@IPSET_ATTR_ETHER={0xa, 0x11, @remote}, @IPSET_ATTR_IP2_TO={0xc, 0x16, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @broadcast}}, @IPSET_ATTR_TIMEOUT={0x8, 0x6, 0x1, 0x0, 0xfffffffd}, @IPSET_ATTR_IFACE={0x14, 0x17, 'pimreg\x00'}, @IPSET_ATTR_MARKMASK={0x8, 0xb, 0x1, 0x0, 0x1000}, @IPSET_ATTR_CADT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x20}, @IPSET_ATTR_COMMENT={0xa, 0x1a, '@.:]{\x00'}, @IPSET_ATTR_IP2={0xc, 0x14, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @remote}}, @IPSET_ATTR_ETHER={0xa, 0x11, @remote}, @IPSET_ATTR_PORT={0x6, 0x4, 0x1, 0x0, 0x4e24}]}, @IPSET_ATTR_ADT={0x3c, 0x8, 0x0, 0x1, [{0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_NAME={0x9, 0x12, 'syz2\x00'}}, {0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_SKBQUEUE={0x6, 0x1d, 0x1, 0x0, 0x1}}, {0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_PORT_TO={0x6, 0x5, 0x1, 0x0, 0x4e20}}, {0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_ETHER={0xa}}]}, @IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x7}, @IPSET_ATTR_LINENO={0x8}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0xe8}, 0x1, 0x0, 0x0, 0x20080055}, 0x2)
r1 = syz_open_procfs(0x0, &(0x7f0000000200)='net/protocols\x00')
read$qrtrtun(r1, &(0x7f0000000040)=""/85, 0x55)
read$qrtrtun(r1, &(0x7f00000000c0)=""/156, 0x9c)
03:50:32 executing program 0:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0xfae)
03:50:32 executing program 4:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1008)
03:50:32 executing program 1:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0xfca)
03:50:32 executing program 1:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0xfd2)
03:50:32 executing program 1:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0xfd4)
[ 2597.869435][T17943] should_fail_ex+0x21f/0x230
[ 2597.874244][T17943] __should_fail_alloc_page+0xfd/0x110
[ 2597.879817][T17943] __alloc_pages+0x108/0x340
[ 2597.884441][T17943] __kmalloc_large_node+0x80/0x120
[ 2597.889659][T17943] kmalloc_large+0x20/0xb0
[ 2597.894116][T17943] bpf_check+0x73/0x90a0
[ 2597.898426][T17943] ? pcpu_chunk_relocate+0x18d/0x290
[ 2597.903749][T17943] ? cgroup_rstat_updated+0x8c/0x1c0
[ 2597.909075][T17943] ? pcpu_alloc_area+0x4ab/0x4d0
[ 2597.914047][T17943] ? __rcu_read_unlock+0x4d/0x70
03:50:32 executing program 1:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0xfe6)
03:50:32 executing program 1:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0xfee)
[ 2597.919030][T17943] ? pcpu_memcg_post_alloc_hook+0x158/0x1c0
[ 2597.924979][T17943] ? __alloc_percpu_gfp+0x26/0x30
[ 2597.930101][T17943] ? pcpu_alloc+0xbb2/0x10b0
[ 2597.934776][T17943] ? slab_post_alloc_hook+0x82/0x2f0
[ 2597.940220][T17943] ? selinux_bpf_prog_alloc+0x35/0xc0
[ 2597.945761][T17943] ? __check_object_size+0x8b/0x510
[ 2597.951349][T17943] ? strncpy_from_user+0x173/0x270
[ 2597.956491][T17943] ? read_tsc+0x9/0x20
[ 2597.960632][T17943] ? ktime_get_with_offset+0x1a8/0x1e0
[ 2597.966157][T17943] ? bpf_obj_name_cpy+0xdd/0x120
03:50:32 executing program 4:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1009)
03:50:32 executing program 5:
r0 = memfd_secret(0x80000)
bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000000)={r0, 0x0, 0x25, 0x2, @void}, 0x10)
sendmsg$IPSET_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000240)={0xe8, 0xa, 0x6, 0x801, 0x0, 0x0, {0x5, 0x0, 0x6}, [@IPSET_ATTR_DATA={0x74, 0x7, 0x0, 0x1, [@IPSET_ATTR_ETHER={0xa, 0x11, @remote}, @IPSET_ATTR_IP2_TO={0xc, 0x16, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @broadcast}}, @IPSET_ATTR_TIMEOUT={0x8, 0x6, 0x1, 0x0, 0xfffffffd}, @IPSET_ATTR_IFACE={0x14, 0x17, 'pimreg\x00'}, @IPSET_ATTR_MARKMASK={0x8, 0xb, 0x1, 0x0, 0x1000}, @IPSET_ATTR_CADT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x20}, @IPSET_ATTR_COMMENT={0xa, 0x1a, '@.:]{\x00'}, @IPSET_ATTR_IP2={0xc, 0x14, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @remote}}, @IPSET_ATTR_ETHER={0xa, 0x11, @remote}, @IPSET_ATTR_PORT={0x6, 0x4, 0x1, 0x0, 0x4e24}]}, @IPSET_ATTR_ADT={0x3c, 0x8, 0x0, 0x1, [{0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_NAME={0x9, 0x12, 'syz2\x00'}}, {0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_SKBQUEUE={0x6, 0x1d, 0x1, 0x0, 0x1}}, {0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_PORT_TO={0x6, 0x5, 0x1, 0x0, 0x4e20}}, {0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_ETHER={0xa}}]}, @IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x7}, @IPSET_ATTR_LINENO={0x8}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0xe8}, 0x1, 0x0, 0x0, 0x20080055}, 0x2)
r1 = syz_open_procfs(0x0, &(0x7f0000000200)='net/protocols\x00')
read$qrtrtun(r1, &(0x7f0000000040)=""/85, 0x55) (async)
read$qrtrtun(r1, &(0x7f0000000040)=""/85, 0x55)
read$qrtrtun(r1, &(0x7f00000000c0)=""/156, 0x9c) (async)
read$qrtrtun(r1, &(0x7f00000000c0)=""/156, 0x9c)
[ 2597.971174][T17943] bpf_prog_load+0xda6/0xf50
[ 2597.975819][T17943] __sys_bpf+0x41c/0x780
[ 2597.980268][T17943] __x64_sys_bpf+0x43/0x50
[ 2597.984847][T17943] do_syscall_64+0x44/0x110
[ 2597.989384][T17943] entry_SYSCALL_64_after_hwframe+0x63/0x6b
[ 2597.995397][T17943] RIP: 0033:0x7f59098eeae9
[ 2597.999840][T17943] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
03:50:32 executing program 2:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90) (fail_nth: 12)
[ 2598.019526][T17943] RSP: 002b:00007f5908c710c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000141
[ 2598.027978][T17943] RAX: ffffffffffffffda RBX: 00007f5909a0df80 RCX: 00007f59098eeae9
[ 2598.036049][T17943] RDX: 0000000000000090 RSI: 00000000200014c0 RDI: 0000000000000005
[ 2598.044162][T17943] RBP: 00007f5908c71120 R08: 0000000000000000 R09: 0000000000000000
[ 2598.052155][T17943] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 2598.060172][T17943] R13: 000000000000000b R14: 00007f5909a0df80 R15: 00007fff93fbee98
[ 2598.068232][T17943]
[ 2598.086770][T17975] FAULT_INJECTION: forcing a failure.
[ 2598.086770][T17975] name failslab, interval 1, probability 0, space 0, times 0
[ 2598.099500][T17975] CPU: 1 PID: 17975 Comm: syz-executor.2 Not tainted 6.6.0-syzkaller-12401-g8f6f76a6a29f #0
[ 2598.109565][T17975] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/09/2023
[ 2598.119621][T17975] Call Trace:
[ 2598.122953][T17975]
[ 2598.125888][T17975] dump_stack_lvl+0xda/0x130
[ 2598.130486][T17975] dump_stack+0x15/0x20
[ 2598.134729][T17975] should_fail_ex+0x21f/0x230
[ 2598.139427][T17975] ? alloc_vmap_area+0x14e/0x1250
[ 2598.144458][T17975] __should_failslab+0x92/0xa0
[ 2598.149234][T17975] should_failslab+0x9/0x20
[ 2598.153963][T17975] kmem_cache_alloc_node+0x52/0x280
[ 2598.159232][T17975] ? __list_del_entry_valid_or_report+0x5f/0xe0
[ 2598.165578][T17975] alloc_vmap_area+0x14e/0x1250
[ 2598.170451][T17975] ? slab_post_alloc_hook+0x82/0x2f0
[ 2598.175778][T17975] ? __get_vm_area_node+0x10e/0x230
[ 2598.181040][T17975] ? __kmem_cache_alloc_node+0x17f/0x210
[ 2598.186749][T17975] __get_vm_area_node+0x154/0x230
[ 2598.191885][T17975] ? __rcu_read_unlock+0x4d/0x70
[ 2598.196882][T17975] __vmalloc_node_range+0x2fb/0xea0
[ 2598.202091][T17975] ? bpf_check+0xe2/0x90a0
[ 2598.206506][T17975] ? __alloc_pages+0x1bb/0x340
[ 2598.211326][T17975] ? __rcu_read_unlock+0x4d/0x70
[ 2598.216308][T17975] ? __mod_node_page_state+0x1c/0x80
[ 2598.221651][T17975] ? __mod_lruvec_page_state+0x127/0x1e0
[ 2598.227287][T17975] ? __kmalloc_large_node+0xc3/0x120
[ 2598.232617][T17975] ? bpf_check+0xe2/0x90a0
[ 2598.237034][T17975] vzalloc+0x5e/0x70
[ 2598.240955][T17975] ? bpf_check+0xe2/0x90a0
[ 2598.245378][T17975] bpf_check+0xe2/0x90a0
[ 2598.249624][T17975] ? pcpu_chunk_relocate+0x18d/0x290
[ 2598.254979][T17975] ? cgroup_rstat_updated+0x8c/0x1c0
[ 2598.260374][T17975] ? pcpu_alloc_area+0x4ab/0x4d0
[ 2598.265339][T17975] ? __rcu_read_unlock+0x4d/0x70
[ 2598.270279][T17975] ? pcpu_memcg_post_alloc_hook+0x158/0x1c0
[ 2598.276188][T17975] ? pcpu_alloc+0xbb2/0x10b0
[ 2598.280789][T17975] ? slab_post_alloc_hook+0x82/0x2f0
[ 2598.286150][T17975] ? selinux_bpf_prog_alloc+0x35/0xc0
[ 2598.291593][T17975] ? __check_object_size+0x8b/0x510
[ 2598.296790][T17975] ? strncpy_from_user+0x173/0x270
[ 2598.301939][T17975] ? read_tsc+0x9/0x20
[ 2598.306082][T17975] ? ktime_get_with_offset+0x1a8/0x1e0
[ 2598.311585][T17975] ? bpf_obj_name_cpy+0xdd/0x120
[ 2598.316534][T17975] bpf_prog_load+0xda6/0xf50
[ 2598.321278][T17975] __sys_bpf+0x41c/0x780
[ 2598.325653][T17975] __x64_sys_bpf+0x43/0x50
[ 2598.330154][T17975] do_syscall_64+0x44/0x110
[ 2598.334689][T17975] entry_SYSCALL_64_after_hwframe+0x63/0x6b
[ 2598.340713][T17975] RIP: 0033:0x7f59098eeae9
[ 2598.345124][T17975] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
[ 2598.364770][T17975] RSP: 002b:00007f5908c710c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000141
[ 2598.373261][T17975] RAX: ffffffffffffffda RBX: 00007f5909a0df80 RCX: 00007f59098eeae9
[ 2598.381232][T17975] RDX: 0000000000000090 RSI: 00000000200014c0 RDI: 0000000000000005
[ 2598.389205][T17975] RBP: 00007f5908c71120 R08: 0000000000000000 R09: 0000000000000000
[ 2598.397275][T17975] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 2598.405254][T17975] R13: 000000000000000b R14: 00007f5909a0df80 R15: 00007fff93fbee98
[ 2598.413269][T17975]
03:50:33 executing program 1:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0xff0)
03:50:33 executing program 4:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x100a)
03:50:33 executing program 2:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90) (fail_nth: 13)
03:50:33 executing program 5:
r0 = memfd_secret(0x80000)
bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000000)={r0, 0x0, 0x25, 0x2, @void}, 0x10)
sendmsg$IPSET_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000240)={0xe8, 0xa, 0x6, 0x801, 0x0, 0x0, {0x5, 0x0, 0x6}, [@IPSET_ATTR_DATA={0x74, 0x7, 0x0, 0x1, [@IPSET_ATTR_ETHER={0xa, 0x11, @remote}, @IPSET_ATTR_IP2_TO={0xc, 0x16, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @broadcast}}, @IPSET_ATTR_TIMEOUT={0x8, 0x6, 0x1, 0x0, 0xfffffffd}, @IPSET_ATTR_IFACE={0x14, 0x17, 'pimreg\x00'}, @IPSET_ATTR_MARKMASK={0x8, 0xb, 0x1, 0x0, 0x1000}, @IPSET_ATTR_CADT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x20}, @IPSET_ATTR_COMMENT={0xa, 0x1a, '@.:]{\x00'}, @IPSET_ATTR_IP2={0xc, 0x14, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @remote}}, @IPSET_ATTR_ETHER={0xa, 0x11, @remote}, @IPSET_ATTR_PORT={0x6, 0x4, 0x1, 0x0, 0x4e24}]}, @IPSET_ATTR_ADT={0x3c, 0x8, 0x0, 0x1, [{0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_NAME={0x9, 0x12, 'syz2\x00'}}, {0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_SKBQUEUE={0x6, 0x1d, 0x1, 0x0, 0x1}}, {0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_PORT_TO={0x6, 0x5, 0x1, 0x0, 0x4e20}}, {0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_ETHER={0xa}}]}, @IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x7}, @IPSET_ATTR_LINENO={0x8}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0xe8}, 0x1, 0x0, 0x0, 0x20080055}, 0x2)
r1 = syz_open_procfs(0x0, &(0x7f0000000200)='net/protocols\x00')
read$qrtrtun(r1, &(0x7f0000000040)=""/85, 0x55)
read$qrtrtun(r1, &(0x7f00000000c0)=""/156, 0x9c)
memfd_secret(0x80000) (async)
bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000000)={r0, 0x0, 0x25, 0x2, @void}, 0x10) (async)
sendmsg$IPSET_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000240)={0xe8, 0xa, 0x6, 0x801, 0x0, 0x0, {0x5, 0x0, 0x6}, [@IPSET_ATTR_DATA={0x74, 0x7, 0x0, 0x1, [@IPSET_ATTR_ETHER={0xa, 0x11, @remote}, @IPSET_ATTR_IP2_TO={0xc, 0x16, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @broadcast}}, @IPSET_ATTR_TIMEOUT={0x8, 0x6, 0x1, 0x0, 0xfffffffd}, @IPSET_ATTR_IFACE={0x14, 0x17, 'pimreg\x00'}, @IPSET_ATTR_MARKMASK={0x8, 0xb, 0x1, 0x0, 0x1000}, @IPSET_ATTR_CADT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x20}, @IPSET_ATTR_COMMENT={0xa, 0x1a, '@.:]{\x00'}, @IPSET_ATTR_IP2={0xc, 0x14, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @remote}}, @IPSET_ATTR_ETHER={0xa, 0x11, @remote}, @IPSET_ATTR_PORT={0x6, 0x4, 0x1, 0x0, 0x4e24}]}, @IPSET_ATTR_ADT={0x3c, 0x8, 0x0, 0x1, [{0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_NAME={0x9, 0x12, 'syz2\x00'}}, {0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_SKBQUEUE={0x6, 0x1d, 0x1, 0x0, 0x1}}, {0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_PORT_TO={0x6, 0x5, 0x1, 0x0, 0x4e20}}, {0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_ETHER={0xa}}]}, @IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x7}, @IPSET_ATTR_LINENO={0x8}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0xe8}, 0x1, 0x0, 0x0, 0x20080055}, 0x2) (async)
syz_open_procfs(0x0, &(0x7f0000000200)='net/protocols\x00') (async)
read$qrtrtun(r1, &(0x7f0000000040)=""/85, 0x55) (async)
read$qrtrtun(r1, &(0x7f00000000c0)=""/156, 0x9c) (async)
03:50:33 executing program 0:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0xfb6)
03:50:33 executing program 3:
r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000), 0x2)
read$qrtrtun(r0, &(0x7f0000002300)=""/4115, 0x1013)
read$qrtrtun(0xffffffffffffffff, &(0x7f00000010c0)=""/140, 0x8c)
03:50:33 executing program 0:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0xfb8)
03:50:33 executing program 1:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1001)
03:50:33 executing program 4:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x100b)
03:50:33 executing program 1:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1002)
[ 2598.693165][T17980] FAULT_INJECTION: forcing a failure.
[ 2598.693165][T17980] name failslab, interval 1, probability 0, space 0, times 0
[ 2598.705901][T17980] CPU: 0 PID: 17980 Comm: syz-executor.2 Not tainted 6.6.0-syzkaller-12401-g8f6f76a6a29f #0
[ 2598.716038][T17980] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/09/2023
[ 2598.726569][T17980] Call Trace:
[ 2598.729872][T17980]
[ 2598.732822][T17980] dump_stack_lvl+0xda/0x130
[ 2598.737456][T17980] dump_stack+0x15/0x20
03:50:33 executing program 4:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x100c)
03:50:33 executing program 4:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x100d)
03:50:33 executing program 1:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1003)
[ 2598.741719][T17980] should_fail_ex+0x21f/0x230
[ 2598.746432][T17980] ? __vmalloc_node_range+0x448/0xea0
[ 2598.751914][T17980] __should_failslab+0x92/0xa0
[ 2598.756739][T17980] should_failslab+0x9/0x20
[ 2598.761274][T17980] __kmem_cache_alloc_node+0x4e/0x210
[ 2598.766716][T17980] ? __vmalloc_node_range+0x448/0xea0
[ 2598.772184][T17980] __kmalloc_node+0x98/0x1a0
[ 2598.776811][T17980] __vmalloc_node_range+0x448/0xea0
[ 2598.782089][T17980] ? __rcu_read_unlock+0x4d/0x70
[ 2598.787062][T17980] ? __mod_lruvec_page_state+0x127/0x1e0
03:50:33 executing program 1:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1004)
[ 2598.792811][T17980] ? __kmalloc_large_node+0xc3/0x120
[ 2598.798140][T17980] ? bpf_check+0xe2/0x90a0
[ 2598.802633][T17980] vzalloc+0x5e/0x70
[ 2598.806572][T17980] ? bpf_check+0xe2/0x90a0
[ 2598.811017][T17980] bpf_check+0xe2/0x90a0
[ 2598.815335][T17980] ? pcpu_chunk_relocate+0x18d/0x290
[ 2598.820741][T17980] ? cgroup_rstat_updated+0x8c/0x1c0
[ 2598.826067][T17980] ? pcpu_alloc_area+0x4ab/0x4d0
[ 2598.831035][T17980] ? __rcu_read_unlock+0x4d/0x70
[ 2598.836003][T17980] ? pcpu_memcg_post_alloc_hook+0x158/0x1c0
[ 2598.842010][T17980] ? pcpu_alloc+0xbb2/0x10b0
[ 2598.846730][T17980] ? slab_post_alloc_hook+0x82/0x2f0
[ 2598.852106][T17980] ? selinux_bpf_prog_alloc+0x35/0xc0
[ 2598.857554][T17980] ? __check_object_size+0x8b/0x510
[ 2598.862787][T17980] ? strncpy_from_user+0x173/0x270
[ 2598.868082][T17980] ? read_tsc+0x9/0x20
[ 2598.872173][T17980] ? ktime_get_with_offset+0x1a8/0x1e0
[ 2598.877658][T17980] ? bpf_obj_name_cpy+0xdd/0x120
[ 2598.882651][T17980] bpf_prog_load+0xda6/0xf50
[ 2598.887279][T17980] __sys_bpf+0x41c/0x780
[ 2598.891550][T17980] __x64_sys_bpf+0x43/0x50
[ 2598.896293][T17980] do_syscall_64+0x44/0x110
[ 2598.900833][T17980] entry_SYSCALL_64_after_hwframe+0x63/0x6b
[ 2598.906789][T17980] RIP: 0033:0x7f59098eeae9
[ 2598.911223][T17980] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
[ 2598.930900][T17980] RSP: 002b:00007f5908c710c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000141
03:50:33 executing program 1:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1005)
03:50:33 executing program 4:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x100e)
03:50:33 executing program 5:
r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/protocols\x00')
read$qrtrtun(r0, &(0x7f0000000040)=""/85, 0x55)
read$qrtrtun(r0, &(0x7f00000000c0)=""/156, 0x9c)
syz_io_uring_setup(0x1dad, &(0x7f0000000180)={0x0, 0x1, 0x2000, 0x0, 0x1de, 0x0, r0}, &(0x7f0000000000), &(0x7f0000000240))
[ 2598.939341][T17980] RAX: ffffffffffffffda RBX: 00007f5909a0df80 RCX: 00007f59098eeae9
[ 2598.947340][T17980] RDX: 0000000000000090 RSI: 00000000200014c0 RDI: 0000000000000005
[ 2598.955335][T17980] RBP: 00007f5908c71120 R08: 0000000000000000 R09: 0000000000000000
[ 2598.963310][T17980] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 2598.971404][T17980] R13: 000000000000000b R14: 00007f5909a0df80 R15: 00007fff93fbee98
[ 2598.979480][T17980]
03:50:34 executing program 3:
r0 = syz_open_procfs(0xffffffffffffffff, 0x0)
r1 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000), 0x2)
read$qrtrtun(r1, &(0x7f0000002300)=""/4115, 0x1013)
read$qrtrtun(r0, &(0x7f00000010c0)=""/140, 0x8c)
03:50:34 executing program 2:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90) (fail_nth: 14)
03:50:34 executing program 0:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0xfca)
03:50:34 executing program 1:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1006)
03:50:34 executing program 5:
r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/protocols\x00')
read$qrtrtun(r0, &(0x7f0000000040)=""/85, 0x55)
read$qrtrtun(r0, &(0x7f00000000c0)=""/156, 0x9c)
syz_io_uring_setup(0x1dad, &(0x7f0000000180)={0x0, 0x1, 0x2000, 0x0, 0x1de, 0x0, r0}, &(0x7f0000000000), &(0x7f0000000240))
03:50:34 executing program 4:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1010)
03:50:34 executing program 4:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1011)
03:50:34 executing program 4:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1012)
03:50:34 executing program 0:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0xfd2)
03:50:34 executing program 4:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1025)
[ 2599.688869][T18021] FAULT_INJECTION: forcing a failure.
[ 2599.688869][T18021] name failslab, interval 1, probability 0, space 0, times 0
[ 2599.701564][T18021] CPU: 1 PID: 18021 Comm: syz-executor.2 Not tainted 6.6.0-syzkaller-12401-g8f6f76a6a29f #0
[ 2599.711738][T18021] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/09/2023
[ 2599.721870][T18021] Call Trace:
[ 2599.725164][T18021]
[ 2599.728106][T18021] dump_stack_lvl+0xda/0x130
[ 2599.732749][T18021] dump_stack+0x15/0x20
03:50:34 executing program 1:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1007)
03:50:34 executing program 5:
r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/protocols\x00')
read$qrtrtun(r0, &(0x7f0000000040)=""/85, 0x55)
read$qrtrtun(r0, &(0x7f00000000c0)=""/156, 0x9c) (async)
syz_io_uring_setup(0x1dad, &(0x7f0000000180)={0x0, 0x1, 0x2000, 0x0, 0x1de, 0x0, r0}, &(0x7f0000000000), &(0x7f0000000240))
[ 2599.736978][T18021] should_fail_ex+0x21f/0x230
[ 2599.741693][T18021] ? __vmalloc_node_range+0x448/0xea0
[ 2599.747191][T18021] __should_failslab+0x92/0xa0
[ 2599.752132][T18021] should_failslab+0x9/0x20
[ 2599.756681][T18021] __kmem_cache_alloc_node+0x4e/0x210
[ 2599.762085][T18021] ? __vmalloc_node_range+0x448/0xea0
[ 2599.767483][T18021] __kmalloc_node+0x98/0x1a0
[ 2599.772093][T18021] __vmalloc_node_range+0x448/0xea0
[ 2599.777405][T18021] ? __rcu_read_unlock+0x4d/0x70
[ 2599.782344][T18021] ? __mod_lruvec_page_state+0x127/0x1e0
[ 2599.788055][T18021] ? __kmalloc_large_node+0xc3/0x120
[ 2599.793344][T18021] ? bpf_check+0xe2/0x90a0
[ 2599.797798][T18021] vzalloc+0x5e/0x70
[ 2599.801701][T18021] ? bpf_check+0xe2/0x90a0
[ 2599.806124][T18021] bpf_check+0xe2/0x90a0
[ 2599.810370][T18021] ? pcpu_chunk_relocate+0x18d/0x290
[ 2599.815678][T18021] ? cgroup_rstat_updated+0x8c/0x1c0
[ 2599.821091][T18021] ? pcpu_alloc_area+0x4ab/0x4d0
[ 2599.826137][T18021] ? __rcu_read_unlock+0x4d/0x70
[ 2599.831072][T18021] ? pcpu_memcg_post_alloc_hook+0x158/0x1c0
[ 2599.836998][T18021] ? pcpu_alloc+0xbb2/0x10b0
[ 2599.841722][T18021] ? slab_post_alloc_hook+0x82/0x2f0
[ 2599.847044][T18021] ? selinux_bpf_prog_alloc+0x35/0xc0
[ 2599.852480][T18021] ? __check_object_size+0x8b/0x510
[ 2599.857799][T18021] ? strncpy_from_user+0x173/0x270
[ 2599.862972][T18021] ? read_tsc+0x9/0x20
[ 2599.867047][T18021] ? ktime_get_with_offset+0x1a8/0x1e0
[ 2599.872523][T18021] ? bpf_obj_name_cpy+0xdd/0x120
[ 2599.877463][T18021] bpf_prog_load+0xda6/0xf50
[ 2599.882082][T18021] __sys_bpf+0x41c/0x780
[ 2599.886458][T18021] __x64_sys_bpf+0x43/0x50
[ 2599.890880][T18021] do_syscall_64+0x44/0x110
[ 2599.895461][T18021] entry_SYSCALL_64_after_hwframe+0x63/0x6b
[ 2599.901417][T18021] RIP: 0033:0x7f59098eeae9
[ 2599.905892][T18021] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
[ 2599.925502][T18021] RSP: 002b:00007f5908c710c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000141
[ 2599.933994][T18021] RAX: ffffffffffffffda RBX: 00007f5909a0df80 RCX: 00007f59098eeae9
[ 2599.941959][T18021] RDX: 0000000000000090 RSI: 00000000200014c0 RDI: 0000000000000005
[ 2599.949946][T18021] RBP: 00007f5908c71120 R08: 0000000000000000 R09: 0000000000000000
[ 2599.957922][T18021] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 2599.965889][T18021] R13: 000000000000000b R14: 00007f5909a0df80 R15: 00007fff93fbee98
[ 2599.973870][T18021]
03:50:35 executing program 3:
r0 = syz_open_procfs(0xffffffffffffffff, 0x0)
r1 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000), 0x2)
read$qrtrtun(r1, &(0x7f0000002300)=""/4115, 0x1013)
read$qrtrtun(r0, &(0x7f00000010c0)=""/140, 0x8c)
03:50:35 executing program 0:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0xfd4)
03:50:35 executing program 2:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90) (fail_nth: 15)
03:50:35 executing program 5:
r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00')
read$qrtrtun(r0, &(0x7f0000000040)=""/72, 0x48)
read$qrtrtun(r0, &(0x7f00000000c0)=""/156, 0x9c)
03:50:35 executing program 4:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1048)
03:50:35 executing program 1:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1008)
03:50:35 executing program 1:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1009)
03:50:35 executing program 0:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0xfe6)
03:50:35 executing program 2:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90) (fail_nth: 16)
03:50:35 executing program 4:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x104c)
03:50:35 executing program 0:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0xfee)
03:50:35 executing program 1:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x100a)
[ 2600.583184][T18056] FAULT_INJECTION: forcing a failure.
[ 2600.583184][T18056] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 2600.596420][T18056] CPU: 1 PID: 18056 Comm: syz-executor.2 Not tainted 6.6.0-syzkaller-12401-g8f6f76a6a29f #0
[ 2600.606540][T18056] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/09/2023
[ 2600.616614][T18056] Call Trace:
[ 2600.620432][T18056]
[ 2600.623384][T18056] dump_stack_lvl+0xda/0x130
[ 2600.628008][T18056] dump_stack+0x15/0x20
[ 2600.632211][T18056] should_fail_ex+0x21f/0x230
[ 2600.637011][T18056] should_fail+0xb/0x10
[ 2600.641206][T18056] should_fail_usercopy+0x1a/0x20
[ 2600.646305][T18056] _copy_to_user+0x1e/0x90
[ 2600.650752][T18056] bpf_check+0x6793/0x90a0
[ 2600.655285][T18056] ? pcpu_alloc_area+0x4ab/0x4d0
[ 2600.660292][T18056] ? pcpu_alloc+0xbb2/0x10b0
[ 2600.664925][T18056] ? slab_post_alloc_hook+0x82/0x2f0
[ 2600.670286][T18056] ? selinux_bpf_prog_alloc+0x35/0xc0
[ 2600.675760][T18056] ? __check_object_size+0x8b/0x510
[ 2600.681059][T18056] ? strncpy_from_user+0x173/0x270
[ 2600.686209][T18056] ? read_tsc+0x9/0x20
[ 2600.690347][T18056] ? ktime_get_with_offset+0x1a8/0x1e0
[ 2600.695829][T18056] ? bpf_obj_name_cpy+0xdd/0x120
[ 2600.700810][T18056] bpf_prog_load+0xda6/0xf50
[ 2600.705437][T18056] __sys_bpf+0x41c/0x780
[ 2600.709773][T18056] __x64_sys_bpf+0x43/0x50
[ 2600.714221][T18056] do_syscall_64+0x44/0x110
[ 2600.719224][T18056] entry_SYSCALL_64_after_hwframe+0x63/0x6b
[ 2600.725201][T18056] RIP: 0033:0x7f59098eeae9
[ 2600.729706][T18056] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
[ 2600.749349][T18056] RSP: 002b:00007f5908c710c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000141
[ 2600.757763][T18056] RAX: ffffffffffffffda RBX: 00007f5909a0df80 RCX: 00007f59098eeae9
[ 2600.765735][T18056] RDX: 0000000000000090 RSI: 00000000200014c0 RDI: 0000000000000005
[ 2600.773738][T18056] RBP: 00007f5908c71120 R08: 0000000000000000 R09: 0000000000000000
[ 2600.781726][T18056] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 2600.789698][T18056] R13: 000000000000000b R14: 00007f5909a0df80 R15: 00007fff93fbee98
[ 2600.797699][T18056]
03:50:36 executing program 3:
r0 = syz_open_procfs(0xffffffffffffffff, 0x0)
r1 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000), 0x2)
read$qrtrtun(r1, &(0x7f0000002300)=""/4115, 0x1013)
read$qrtrtun(r0, &(0x7f00000010c0)=""/140, 0x8c)
03:50:36 executing program 4:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1068)
03:50:36 executing program 5:
r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00')
read$qrtrtun(r0, &(0x7f0000000040)=""/72, 0x48) (async)
read$qrtrtun(r0, &(0x7f00000000c0)=""/156, 0x9c)
03:50:36 executing program 1:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x100b)
03:50:36 executing program 0:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0xff0)
03:50:36 executing program 2:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90) (fail_nth: 17)
03:50:36 executing program 0:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1001)
03:50:36 executing program 0:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1002)
[ 2601.432385][T18076] FAULT_INJECTION: forcing a failure.
[ 2601.432385][T18076] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 2601.445511][T18076] CPU: 1 PID: 18076 Comm: syz-executor.2 Not tainted 6.6.0-syzkaller-12401-g8f6f76a6a29f #0
[ 2601.455635][T18076] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/09/2023
[ 2601.465715][T18076] Call Trace:
[ 2601.469014][T18076]
[ 2601.471950][T18076] dump_stack_lvl+0xda/0x130
[ 2601.476640][T18076] dump_stack+0x15/0x20
03:50:36 executing program 0:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1003)
03:50:36 executing program 5:
syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') (async)
r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00')
read$qrtrtun(r0, &(0x7f0000000040)=""/72, 0x48)
read$qrtrtun(r0, &(0x7f00000000c0)=""/156, 0x9c)
[ 2601.480938][T18076] should_fail_ex+0x21f/0x230
[ 2601.485690][T18076] should_fail+0xb/0x10
[ 2601.489961][T18076] should_fail_usercopy+0x1a/0x20
[ 2601.495085][T18076] _copy_to_user+0x1e/0x90
[ 2601.499626][T18076] bpf_check+0x6793/0x90a0
[ 2601.504077][T18076] ? pcpu_alloc_area+0x4ab/0x4d0
[ 2601.509050][T18076] ? pcpu_alloc+0xbb2/0x10b0
[ 2601.513722][T18076] ? slab_post_alloc_hook+0x82/0x2f0
[ 2601.519170][T18076] ? selinux_bpf_prog_alloc+0x35/0xc0
[ 2601.524871][T18076] ? __check_object_size+0x8b/0x510
03:50:36 executing program 0:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1004)
03:50:36 executing program 0:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1005)
[ 2601.530100][T18076] ? strncpy_from_user+0x173/0x270
[ 2601.535245][T18076] ? read_tsc+0x9/0x20
[ 2601.539410][T18076] ? ktime_get_with_offset+0x1a8/0x1e0
[ 2601.544911][T18076] ? bpf_obj_name_cpy+0xdd/0x120
[ 2601.549883][T18076] bpf_prog_load+0xda6/0xf50
[ 2601.554665][T18076] __sys_bpf+0x41c/0x780
[ 2601.559018][T18076] __x64_sys_bpf+0x43/0x50
[ 2601.563468][T18076] do_syscall_64+0x44/0x110
[ 2601.568009][T18076] entry_SYSCALL_64_after_hwframe+0x63/0x6b
[ 2601.573958][T18076] RIP: 0033:0x7f59098eeae9
[ 2601.578389][T18076] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
[ 2601.598035][T18076] RSP: 002b:00007f5908c710c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000141
[ 2601.606485][T18076] RAX: ffffffffffffffda RBX: 00007f5909a0df80 RCX: 00007f59098eeae9
[ 2601.614482][T18076] RDX: 0000000000000090 RSI: 00000000200014c0 RDI: 0000000000000005
[ 2601.622572][T18076] RBP: 00007f5908c71120 R08: 0000000000000000 R09: 0000000000000000
[ 2601.630661][T18076] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 2601.638825][T18076] R13: 000000000000000b R14: 00007f5909a0df80 R15: 00007fff93fbee98
[ 2601.646833][T18076]
03:50:37 executing program 1:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x100c)
03:50:37 executing program 5:
r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/protocols\x00')
read$qrtrtun(r0, &(0x7f0000000040)=""/85, 0x55)
read$qrtrtun(r0, &(0x7f00000000c0)=""/156, 0x9c)
03:50:37 executing program 4:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x106c)
03:50:37 executing program 0:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1006)
03:50:37 executing program 2:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90) (fail_nth: 18)
03:50:37 executing program 3:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
r1 = openat$qrtrtun(0xffffffffffffff9c, 0x0, 0x2)
read$qrtrtun(r1, &(0x7f0000002300)=""/4115, 0x1013)
read$qrtrtun(r0, &(0x7f00000010c0)=""/140, 0x8c)
03:50:37 executing program 4:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1074)
03:50:37 executing program 5:
r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/protocols\x00')
read$qrtrtun(r0, &(0x7f0000000040)=""/85, 0x55) (async, rerun: 64)
read$qrtrtun(r0, &(0x7f00000000c0)=""/156, 0x9c) (rerun: 64)
03:50:37 executing program 1:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x100d)
03:50:37 executing program 5:
r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/protocols\x00')
read$qrtrtun(r0, &(0x7f0000000040)=""/85, 0x55)
read$qrtrtun(r0, &(0x7f00000000c0)=""/156, 0x9c)
[ 2602.461702][T18102] FAULT_INJECTION: forcing a failure.
[ 2602.461702][T18102] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 2602.474820][T18102] CPU: 1 PID: 18102 Comm: syz-executor.2 Not tainted 6.6.0-syzkaller-12401-g8f6f76a6a29f #0
[ 2602.484912][T18102] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/09/2023
[ 2602.495000][T18102] Call Trace:
[ 2602.498295][T18102]
[ 2602.501247][T18102] dump_stack_lvl+0xda/0x130
[ 2602.505879][T18102] dump_stack+0x15/0x20
03:50:37 executing program 4:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x107a)
03:50:37 executing program 1:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x100e)
03:50:37 executing program 0:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1007)
[ 2602.510160][T18102] should_fail_ex+0x21f/0x230
[ 2602.514885][T18102] should_fail+0xb/0x10
[ 2602.519145][T18102] should_fail_usercopy+0x1a/0x20
[ 2602.524259][T18102] _copy_to_user+0x1e/0x90
[ 2602.528740][T18102] simple_read_from_buffer+0xa0/0x110
[ 2602.534277][T18102] proc_fail_nth_read+0xfc/0x140
[ 2602.539297][T18102] ? proc_fault_inject_write+0x210/0x210
[ 2602.544961][T18102] vfs_read+0x1a4/0x590
[ 2602.549187][T18102] ? mutex_lock+0xd/0x30
[ 2602.553521][T18102] ksys_read+0xeb/0x1a0
[ 2602.557712][T18102] __x64_sys_read+0x42/0x50
03:50:37 executing program 0:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1008)
03:50:37 executing program 4:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x10fe)
03:50:37 executing program 5:
r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/protocols\x00')
read$qrtrtun(r0, &(0x7f0000000040)=""/85, 0x55)
read$qrtrtun(r0, &(0x7f00000000c0)=""/156, 0x9c)
socket$inet6_sctp(0xa, 0x1, 0x84)
[ 2602.562287][T18102] do_syscall_64+0x44/0x110
[ 2602.566915][T18102] entry_SYSCALL_64_after_hwframe+0x63/0x6b
[ 2602.572920][T18102] RIP: 0033:0x7f59098ed78c
[ 2602.577456][T18102] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 59 81 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 af 81 02 00 48
[ 2602.597225][T18102] RSP: 002b:00007f5908c710c0 EFLAGS: 00000246 ORIG_RAX: 0000000000000000
03:50:37 executing program 2:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:37 executing program 0:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1009)
03:50:37 executing program 5:
r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/protocols\x00')
read$qrtrtun(r0, &(0x7f0000000040)=""/85, 0x55)
read$qrtrtun(r0, &(0x7f00000000c0)=""/156, 0x9c) (async)
read$qrtrtun(r0, &(0x7f00000000c0)=""/156, 0x9c)
socket$inet6_sctp(0xa, 0x1, 0x84)
03:50:37 executing program 1:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1010)
03:50:37 executing program 4:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x2900)
03:50:37 executing program 3:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
r1 = openat$qrtrtun(0xffffffffffffff9c, 0x0, 0x2)
read$qrtrtun(r1, &(0x7f0000002300)=""/4115, 0x1013)
read$qrtrtun(r0, &(0x7f00000010c0)=""/140, 0x8c)
03:50:37 executing program 1:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1011)
[ 2602.605679][T18102] RAX: ffffffffffffffda RBX: 00007f5909a0df80 RCX: 00007f59098ed78c
[ 2602.613733][T18102] RDX: 000000000000000f RSI: 00007f5908c71130 RDI: 0000000000000003
[ 2602.621722][T18102] RBP: 00007f5908c71120 R08: 0000000000000000 R09: 0000000000000000
[ 2602.629722][T18102] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 2602.637792][T18102] R13: 000000000000000b R14: 00007f5909a0df80 R15: 00007fff93fbee98
[ 2602.645809][T18102]
03:50:37 executing program 5:
r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/protocols\x00')
read$qrtrtun(r0, &(0x7f0000000040)=""/85, 0x55) (async)
read$qrtrtun(r0, &(0x7f00000000c0)=""/156, 0x9c) (async)
socket$inet6_sctp(0xa, 0x1, 0x84)
03:50:37 executing program 3:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
r1 = openat$qrtrtun(0xffffffffffffff9c, 0x0, 0x2)
read$qrtrtun(r1, &(0x7f0000002300)=""/4115, 0x1013)
read$qrtrtun(r0, &(0x7f00000010c0)=""/140, 0x8c)
03:50:37 executing program 4:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x3f00)
03:50:37 executing program 0:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x100a)
03:50:37 executing program 2:
bpf$PROG_LOAD_XDP(0x2, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:37 executing program 3:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
r1 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000), 0x0)
read$qrtrtun(r1, &(0x7f0000002300)=""/4115, 0x1013)
read$qrtrtun(r0, &(0x7f00000010c0)=""/140, 0x8c)
03:50:37 executing program 5:
r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/protocols\x00')
read$qrtrtun(r0, &(0x7f0000000040)=""/70, 0x46)
read$qrtrtun(r0, &(0x7f00000000c0)=""/156, 0x9c)
socket$phonet(0x23, 0x2, 0x1)
03:50:37 executing program 2:
bpf$PROG_LOAD_XDP(0x3, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:37 executing program 1:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1012)
03:50:37 executing program 0:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x100b)
03:50:37 executing program 4:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x6f0d)
03:50:37 executing program 1:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1025)
03:50:37 executing program 5:
r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/protocols\x00')
read$qrtrtun(r0, &(0x7f0000000040)=""/70, 0x46)
read$qrtrtun(r0, &(0x7f00000000c0)=""/156, 0x9c)
socket$phonet(0x23, 0x2, 0x1)
syz_open_procfs(0x0, &(0x7f0000000200)='net/protocols\x00') (async)
read$qrtrtun(r0, &(0x7f0000000040)=""/70, 0x46) (async)
read$qrtrtun(r0, &(0x7f00000000c0)=""/156, 0x9c) (async)
socket$phonet(0x23, 0x2, 0x1) (async)
03:50:37 executing program 2:
bpf$PROG_LOAD_XDP(0x4, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:37 executing program 0:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x100c)
03:50:37 executing program 4:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0xb20a)
03:50:37 executing program 1:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1048)
03:50:38 executing program 3:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000), 0x0)
read$qrtrtun(0xffffffffffffffff, &(0x7f0000002300)=""/4115, 0x1013)
read$qrtrtun(r0, &(0x7f00000010c0)=""/140, 0x8c)
03:50:38 executing program 0:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x100d)
03:50:38 executing program 5:
r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/protocols\x00')
read$qrtrtun(r0, &(0x7f0000000040)=""/70, 0x46) (async, rerun: 32)
read$qrtrtun(r0, &(0x7f00000000c0)=""/156, 0x9c) (async, rerun: 32)
socket$phonet(0x23, 0x2, 0x1)
03:50:38 executing program 2:
bpf$PROG_LOAD_XDP(0x6, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:38 executing program 1:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x104c)
03:50:38 executing program 4:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0xe907)
03:50:38 executing program 1:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1068)
03:50:38 executing program 4:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0xec04)
03:50:38 executing program 0:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x100e)
03:50:38 executing program 3:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000), 0x0)
read$qrtrtun(0xffffffffffffffff, &(0x7f0000002300)=""/4115, 0x1013)
read$qrtrtun(r0, &(0x7f00000010c0)=""/140, 0x8c)
03:50:38 executing program 5:
r0 = syz_open_procfs(0x0, &(0x7f0000000200)='map_files\x00')
read$qrtrtun(r0, &(0x7f0000000040)=""/85, 0x55)
read$qrtrtun(r0, &(0x7f00000000c0)=""/156, 0x9c)
03:50:38 executing program 2:
bpf$PROG_LOAD_XDP(0x7, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:38 executing program 1:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x106c)
03:50:38 executing program 3:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000), 0x0)
read$qrtrtun(0xffffffffffffffff, &(0x7f0000002300)=""/4115, 0x1013)
read$qrtrtun(r0, &(0x7f00000010c0)=""/140, 0x8c)
03:50:38 executing program 5:
r0 = syz_open_procfs(0x0, &(0x7f0000000200)='map_files\x00')
read$qrtrtun(r0, &(0x7f0000000040)=""/85, 0x55) (async)
read$qrtrtun(r0, &(0x7f00000000c0)=""/156, 0x9c)
03:50:38 executing program 0:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1010)
03:50:38 executing program 4:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0xfc01)
03:50:38 executing program 2:
bpf$PROG_LOAD_XDP(0x8, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:38 executing program 3:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
r1 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000), 0x0)
read$qrtrtun(r1, 0x0, 0x0)
read$qrtrtun(r0, &(0x7f00000010c0)=""/140, 0x8c)
03:50:38 executing program 5:
r0 = syz_open_procfs(0x0, &(0x7f0000000200)='map_files\x00')
read$qrtrtun(r0, &(0x7f0000000040)=""/85, 0x55) (async)
read$qrtrtun(r0, &(0x7f00000000c0)=""/156, 0x9c)
03:50:38 executing program 1:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1074)
03:50:38 executing program 2:
bpf$PROG_LOAD_XDP(0x9, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:38 executing program 4:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0xff0d)
03:50:38 executing program 0:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1011)
03:50:38 executing program 2:
bpf$PROG_LOAD_XDP(0xa, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:38 executing program 4:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
r2 = socket$pppoe(0x18, 0x1, 0x0)
connect$pppoe(r2, &(0x7f00000010c0)={0x18, 0x0, {0x3, @local, 'ip6erspan0\x00'}}, 0x1e)
setsockopt$MRT_ASSERT(r1, 0x0, 0xcf, 0x0, 0x0)
pipe2$watch_queue(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000001140)={{0x1, 0x1, 0x18, r3}, './file0\x00'})
ioctl$BLKGETSIZE64(r5, 0x80081272, &(0x7f0000001180))
r6 = memfd_secret(0x0)
unlinkat(r6, &(0x7f0000001100)='./file0\x00', 0x200)
bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@bloom_filter={0x1e, 0x7fff, 0x80000001, 0x30, 0x1, r1, 0x9, '\x00', 0x0, r4, 0x2, 0x5, 0x5, 0x2}, 0x48)
03:50:38 executing program 5:
r0 = getpid()
r1 = getpid()
kcmp$KCMP_EPOLL_TFD(r1, r0, 0x7, 0xffffffffffffffff, &(0x7f0000001840))
r2 = getpid()
r3 = getpid()
kcmp$KCMP_EPOLL_TFD(r3, r2, 0x7, 0xffffffffffffffff, &(0x7f0000001840))
r4 = syz_open_procfs(r3, &(0x7f0000000200)='net\x00')
read$qrtrtun(r4, &(0x7f0000000040)=""/85, 0x55)
read$qrtrtun(r4, &(0x7f00000000c0)=""/156, 0x9c)
03:50:38 executing program 1:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x107a)
03:50:38 executing program 0:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1012)
03:50:38 executing program 2:
bpf$PROG_LOAD_XDP(0xb, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:39 executing program 4:
syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00') (async)
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
r2 = socket$pppoe(0x18, 0x1, 0x0)
connect$pppoe(r2, &(0x7f00000010c0)={0x18, 0x0, {0x3, @local, 'ip6erspan0\x00'}}, 0x1e)
setsockopt$MRT_ASSERT(r1, 0x0, 0xcf, 0x0, 0x0) (async)
setsockopt$MRT_ASSERT(r1, 0x0, 0xcf, 0x0, 0x0)
pipe2$watch_queue(&(0x7f0000000000), 0x80) (async)
pipe2$watch_queue(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000001140)={{0x1, 0x1, 0x18, r3}, './file0\x00'})
ioctl$BLKGETSIZE64(r5, 0x80081272, &(0x7f0000001180)) (async)
ioctl$BLKGETSIZE64(r5, 0x80081272, &(0x7f0000001180))
r6 = memfd_secret(0x0)
unlinkat(r6, &(0x7f0000001100)='./file0\x00', 0x200)
bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@bloom_filter={0x1e, 0x7fff, 0x80000001, 0x30, 0x1, r1, 0x9, '\x00', 0x0, r4, 0x2, 0x5, 0x5, 0x2}, 0x48)
03:50:39 executing program 5:
r0 = getpid() (async)
r1 = getpid()
kcmp$KCMP_EPOLL_TFD(r1, r0, 0x7, 0xffffffffffffffff, &(0x7f0000001840)) (async)
r2 = getpid() (async)
r3 = getpid()
kcmp$KCMP_EPOLL_TFD(r3, r2, 0x7, 0xffffffffffffffff, &(0x7f0000001840)) (async)
r4 = syz_open_procfs(r3, &(0x7f0000000200)='net\x00')
read$qrtrtun(r4, &(0x7f0000000040)=""/85, 0x55) (async)
read$qrtrtun(r4, &(0x7f00000000c0)=""/156, 0x9c)
03:50:39 executing program 2:
bpf$PROG_LOAD_XDP(0xc, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:39 executing program 1:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x10fe)
03:50:39 executing program 0:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1025)
03:50:39 executing program 3:
syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000), 0x0)
read$qrtrtun(r0, 0x0, 0x0)
read$qrtrtun(0xffffffffffffffff, &(0x7f00000010c0)=""/140, 0x8c)
03:50:39 executing program 2:
bpf$PROG_LOAD_XDP(0xd, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:39 executing program 1:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x2900)
03:50:39 executing program 5:
r0 = getpid()
r1 = getpid()
kcmp$KCMP_EPOLL_TFD(r1, r0, 0x7, 0xffffffffffffffff, &(0x7f0000001840))
getpid() (async)
r2 = getpid()
getpid() (async)
r3 = getpid()
kcmp$KCMP_EPOLL_TFD(r3, r2, 0x7, 0xffffffffffffffff, &(0x7f0000001840))
r4 = syz_open_procfs(r3, &(0x7f0000000200)='net\x00')
read$qrtrtun(r4, &(0x7f0000000040)=""/85, 0x55) (async)
read$qrtrtun(r4, &(0x7f0000000040)=""/85, 0x55)
read$qrtrtun(r4, &(0x7f00000000c0)=""/156, 0x9c)
03:50:39 executing program 4:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00') (async)
r2 = socket$pppoe(0x18, 0x1, 0x0)
connect$pppoe(r2, &(0x7f00000010c0)={0x18, 0x0, {0x3, @local, 'ip6erspan0\x00'}}, 0x1e)
setsockopt$MRT_ASSERT(r1, 0x0, 0xcf, 0x0, 0x0)
pipe2$watch_queue(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000001140)={{0x1, 0x1, 0x18, r3}, './file0\x00'})
ioctl$BLKGETSIZE64(r5, 0x80081272, &(0x7f0000001180))
r6 = memfd_secret(0x0)
unlinkat(r6, &(0x7f0000001100)='./file0\x00', 0x200) (async)
bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@bloom_filter={0x1e, 0x7fff, 0x80000001, 0x30, 0x1, r1, 0x9, '\x00', 0x0, r4, 0x2, 0x5, 0x5, 0x2}, 0x48)
03:50:39 executing program 0:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1048)
03:50:39 executing program 2:
bpf$PROG_LOAD_XDP(0xe, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:39 executing program 4:
r0 = syz_open_dev$loop(&(0x7f0000000000), 0x4, 0x8040)
ioctl$BLKDISCARD(r0, 0x1277, &(0x7f0000000040)=0x2)
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r1, &(0x7f00000012c0)=""/4096, 0x1000)
r2 = memfd_secret(0x80000)
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r2, 0xc0c89425, &(0x7f0000000080)={"0d986bf9d92e9f12bae137280ba02bdd", 0x0, 0x0, {0xfffffffffffffc84, 0x2}, {0x3, 0x1f}, 0x3, [0x7fff, 0x406, 0x7, 0x3, 0x7fffffff, 0x7, 0x40, 0x7fffffffffffffff, 0xfffffffffffffffb, 0x0, 0x9, 0x7fffffff, 0xfffffffffffffffe, 0x3, 0x1, 0x881]})
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r2, 0xc0c89425, &(0x7f0000000180)={"9f966ab995f418f9ea1c81a946316c21", 0x0, r3, {0x228, 0x493}, {0x2, 0xee94}, 0xffffffffffff8001, [0x2, 0x0, 0x100, 0x8, 0x5, 0x276523ec, 0x6, 0x40, 0x3ff, 0x9, 0x7, 0xcf9e, 0x6, 0x1, 0x9, 0x400]})
03:50:39 executing program 5:
r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/protocols\x00')
read$qrtrtun(r0, &(0x7f0000000040)=""/85, 0x55)
getpid()
r1 = getpid()
r2 = getpid()
kcmp$KCMP_EPOLL_TFD(r2, r1, 0x7, 0xffffffffffffffff, &(0x7f0000001840))
r3 = syz_open_procfs(r1, &(0x7f0000000ec0)='syscall\x00')
setsockopt$MRT_ASSERT(r3, 0x0, 0xcf, 0x0, 0x0)
r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r4, 0x0, 0xcf, 0x0, 0x0)
ioctl$IOC_WATCH_QUEUE_SET_FILTER(r0, 0x5761, &(0x7f0000000240)={0x4, 0x0, [{0x4, 0x1, 0x12000000, [0x5, 0xac7, 0x7b4, 0x8, 0x0, 0x6, 0xfffffff7, 0x20]}, {0x401, 0xfffffffb, 0x0, [0x80, 0x5, 0x8, 0x0, 0xe634, 0x8, 0x6, 0x2]}, {0x79, 0xff, 0x2, [0xfffff801, 0x0, 0x3, 0x2, 0x9, 0x342, 0x3, 0x1]}, {0x400, 0x9, 0xb9e, [0x7, 0x10000, 0x4, 0x0, 0x0, 0x1, 0xb9, 0xd]}]})
ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r4, 0x89f3, &(0x7f00000001c0)={'ip6_vti0\x00', &(0x7f0000000300)={'ip6_vti0\x00', 0x0, 0x4, 0xdc, 0x7f, 0x8c, 0x0, @mcast2, @private1, 0x700, 0x7, 0xd38, 0x9}})
getpid()
pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80)
bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000003c0)={0x2, 0x4, 0x8, 0x1, 0x80, r4, 0x42, '\x00', r5, r6, 0x1, 0x1, 0x5}, 0x48)
mount_setattr(r3, &(0x7f0000000000)='./file0\x00', 0x8100, &(0x7f0000000180)={0x80, 0x1000c0, 0x40000, {r4}}, 0x20)
read$qrtrtun(r0, &(0x7f00000000c0)=""/156, 0x9c)
03:50:39 executing program 1:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x6f0d)
03:50:39 executing program 0:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x104c)
03:50:39 executing program 2:
bpf$PROG_LOAD_XDP(0xf, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:40 executing program 1:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0xb20a)
03:50:40 executing program 4:
syz_open_dev$loop(&(0x7f0000000000), 0x4, 0x8040) (async)
r0 = syz_open_dev$loop(&(0x7f0000000000), 0x4, 0x8040)
ioctl$BLKDISCARD(r0, 0x1277, &(0x7f0000000040)=0x2)
syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00') (async)
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r1, &(0x7f00000012c0)=""/4096, 0x1000)
r2 = memfd_secret(0x80000)
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r2, 0xc0c89425, &(0x7f0000000080)={"0d986bf9d92e9f12bae137280ba02bdd", 0x0, 0x0, {0xfffffffffffffc84, 0x2}, {0x3, 0x1f}, 0x3, [0x7fff, 0x406, 0x7, 0x3, 0x7fffffff, 0x7, 0x40, 0x7fffffffffffffff, 0xfffffffffffffffb, 0x0, 0x9, 0x7fffffff, 0xfffffffffffffffe, 0x3, 0x1, 0x881]})
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r2, 0xc0c89425, &(0x7f0000000180)={"9f966ab995f418f9ea1c81a946316c21", 0x0, r3, {0x228, 0x493}, {0x2, 0xee94}, 0xffffffffffff8001, [0x2, 0x0, 0x100, 0x8, 0x5, 0x276523ec, 0x6, 0x40, 0x3ff, 0x9, 0x7, 0xcf9e, 0x6, 0x1, 0x9, 0x400]})
03:50:40 executing program 5:
r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/protocols\x00')
read$qrtrtun(r0, &(0x7f0000000040)=""/85, 0x55) (async)
getpid() (async)
r1 = getpid()
r2 = getpid()
kcmp$KCMP_EPOLL_TFD(r2, r1, 0x7, 0xffffffffffffffff, &(0x7f0000001840))
r3 = syz_open_procfs(r1, &(0x7f0000000ec0)='syscall\x00')
setsockopt$MRT_ASSERT(r3, 0x0, 0xcf, 0x0, 0x0) (async)
r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r4, 0x0, 0xcf, 0x0, 0x0) (async)
ioctl$IOC_WATCH_QUEUE_SET_FILTER(r0, 0x5761, &(0x7f0000000240)={0x4, 0x0, [{0x4, 0x1, 0x12000000, [0x5, 0xac7, 0x7b4, 0x8, 0x0, 0x6, 0xfffffff7, 0x20]}, {0x401, 0xfffffffb, 0x0, [0x80, 0x5, 0x8, 0x0, 0xe634, 0x8, 0x6, 0x2]}, {0x79, 0xff, 0x2, [0xfffff801, 0x0, 0x3, 0x2, 0x9, 0x342, 0x3, 0x1]}, {0x400, 0x9, 0xb9e, [0x7, 0x10000, 0x4, 0x0, 0x0, 0x1, 0xb9, 0xd]}]})
ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r4, 0x89f3, &(0x7f00000001c0)={'ip6_vti0\x00', &(0x7f0000000300)={'ip6_vti0\x00', 0x0, 0x4, 0xdc, 0x7f, 0x8c, 0x0, @mcast2, @private1, 0x700, 0x7, 0xd38, 0x9}}) (async)
getpid() (async)
pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80)
bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000003c0)={0x2, 0x4, 0x8, 0x1, 0x80, r4, 0x42, '\x00', r5, r6, 0x1, 0x1, 0x5}, 0x48) (async, rerun: 64)
mount_setattr(r3, &(0x7f0000000000)='./file0\x00', 0x8100, &(0x7f0000000180)={0x80, 0x1000c0, 0x40000, {r4}}, 0x20) (rerun: 64)
read$qrtrtun(r0, &(0x7f00000000c0)=""/156, 0x9c)
03:50:40 executing program 2:
bpf$PROG_LOAD_XDP(0x10, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:40 executing program 0:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1068)
03:50:40 executing program 3:
syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000), 0x0)
read$qrtrtun(r0, 0x0, 0x0)
read$qrtrtun(0xffffffffffffffff, &(0x7f00000010c0)=""/140, 0x8c)
03:50:40 executing program 1:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0xe907)
03:50:40 executing program 0:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x106c)
03:50:40 executing program 2:
bpf$PROG_LOAD_XDP(0x11, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:40 executing program 1:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0xec04)
03:50:40 executing program 5:
r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/protocols\x00')
read$qrtrtun(r0, &(0x7f0000000040)=""/85, 0x55)
getpid()
r1 = getpid()
r2 = getpid()
kcmp$KCMP_EPOLL_TFD(r2, r1, 0x7, 0xffffffffffffffff, &(0x7f0000001840))
r3 = syz_open_procfs(r1, &(0x7f0000000ec0)='syscall\x00')
setsockopt$MRT_ASSERT(r3, 0x0, 0xcf, 0x0, 0x0)
r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r4, 0x0, 0xcf, 0x0, 0x0)
ioctl$IOC_WATCH_QUEUE_SET_FILTER(r0, 0x5761, &(0x7f0000000240)={0x4, 0x0, [{0x4, 0x1, 0x12000000, [0x5, 0xac7, 0x7b4, 0x8, 0x0, 0x6, 0xfffffff7, 0x20]}, {0x401, 0xfffffffb, 0x0, [0x80, 0x5, 0x8, 0x0, 0xe634, 0x8, 0x6, 0x2]}, {0x79, 0xff, 0x2, [0xfffff801, 0x0, 0x3, 0x2, 0x9, 0x342, 0x3, 0x1]}, {0x400, 0x9, 0xb9e, [0x7, 0x10000, 0x4, 0x0, 0x0, 0x1, 0xb9, 0xd]}]})
ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r4, 0x89f3, &(0x7f00000001c0)={'ip6_vti0\x00', &(0x7f0000000300)={'ip6_vti0\x00', 0x0, 0x4, 0xdc, 0x7f, 0x8c, 0x0, @mcast2, @private1, 0x700, 0x7, 0xd38, 0x9}})
getpid()
pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80)
bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000003c0)={0x2, 0x4, 0x8, 0x1, 0x80, r4, 0x42, '\x00', r5, r6, 0x1, 0x1, 0x5}, 0x48)
mount_setattr(r3, &(0x7f0000000000)='./file0\x00', 0x8100, &(0x7f0000000180)={0x80, 0x1000c0, 0x40000, {r4}}, 0x20)
read$qrtrtun(r0, &(0x7f00000000c0)=""/156, 0x9c)
syz_open_procfs(0x0, &(0x7f0000000200)='net/protocols\x00') (async)
read$qrtrtun(r0, &(0x7f0000000040)=""/85, 0x55) (async)
getpid() (async)
getpid() (async)
getpid() (async)
kcmp$KCMP_EPOLL_TFD(r2, r1, 0x7, 0xffffffffffffffff, &(0x7f0000001840)) (async)
syz_open_procfs(r1, &(0x7f0000000ec0)='syscall\x00') (async)
setsockopt$MRT_ASSERT(r3, 0x0, 0xcf, 0x0, 0x0) (async)
syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00') (async)
setsockopt$MRT_ASSERT(r4, 0x0, 0xcf, 0x0, 0x0) (async)
ioctl$IOC_WATCH_QUEUE_SET_FILTER(r0, 0x5761, &(0x7f0000000240)={0x4, 0x0, [{0x4, 0x1, 0x12000000, [0x5, 0xac7, 0x7b4, 0x8, 0x0, 0x6, 0xfffffff7, 0x20]}, {0x401, 0xfffffffb, 0x0, [0x80, 0x5, 0x8, 0x0, 0xe634, 0x8, 0x6, 0x2]}, {0x79, 0xff, 0x2, [0xfffff801, 0x0, 0x3, 0x2, 0x9, 0x342, 0x3, 0x1]}, {0x400, 0x9, 0xb9e, [0x7, 0x10000, 0x4, 0x0, 0x0, 0x1, 0xb9, 0xd]}]}) (async)
ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r4, 0x89f3, &(0x7f00000001c0)={'ip6_vti0\x00', &(0x7f0000000300)={'ip6_vti0\x00', 0x0, 0x4, 0xdc, 0x7f, 0x8c, 0x0, @mcast2, @private1, 0x700, 0x7, 0xd38, 0x9}}) (async)
getpid() (async)
pipe2$watch_queue(&(0x7f0000000380), 0x80) (async)
bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000003c0)={0x2, 0x4, 0x8, 0x1, 0x80, r4, 0x42, '\x00', r5, r6, 0x1, 0x1, 0x5}, 0x48) (async)
mount_setattr(r3, &(0x7f0000000000)='./file0\x00', 0x8100, &(0x7f0000000180)={0x80, 0x1000c0, 0x40000, {r4}}, 0x20) (async)
read$qrtrtun(r0, &(0x7f00000000c0)=""/156, 0x9c) (async)
03:50:40 executing program 4:
r0 = syz_open_dev$loop(&(0x7f0000000000), 0x4, 0x8040)
ioctl$BLKDISCARD(r0, 0x1277, &(0x7f0000000040)=0x2) (async)
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r1, &(0x7f00000012c0)=""/4096, 0x1000)
r2 = memfd_secret(0x80000)
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r2, 0xc0c89425, &(0x7f0000000080)={"0d986bf9d92e9f12bae137280ba02bdd", 0x0, 0x0, {0xfffffffffffffc84, 0x2}, {0x3, 0x1f}, 0x3, [0x7fff, 0x406, 0x7, 0x3, 0x7fffffff, 0x7, 0x40, 0x7fffffffffffffff, 0xfffffffffffffffb, 0x0, 0x9, 0x7fffffff, 0xfffffffffffffffe, 0x3, 0x1, 0x881]})
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r2, 0xc0c89425, &(0x7f0000000180)={"9f966ab995f418f9ea1c81a946316c21", 0x0, r3, {0x228, 0x493}, {0x2, 0xee94}, 0xffffffffffff8001, [0x2, 0x0, 0x100, 0x8, 0x5, 0x276523ec, 0x6, 0x40, 0x3ff, 0x9, 0x7, 0xcf9e, 0x6, 0x1, 0x9, 0x400]})
03:50:40 executing program 0:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1074)
03:50:40 executing program 2:
bpf$PROG_LOAD_XDP(0x12, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:40 executing program 0:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x107a)
03:50:40 executing program 4:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
write$P9_RATTACH(r0, &(0x7f0000000000)={0x14, 0x69, 0x2, {0x80, 0x0, 0x4}}, 0x14)
03:50:40 executing program 5:
r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/netlink\x00')
read$qrtrtun(r0, &(0x7f0000000040)=""/85, 0x55)
read$qrtrtun(r0, &(0x7f00000000c0)=""/156, 0x9c)
03:50:41 executing program 2:
bpf$PROG_LOAD_XDP(0x13, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:41 executing program 1:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0xfc01)
03:50:41 executing program 5:
syz_open_procfs(0x0, &(0x7f0000000180)='net/netlink\x00') (async)
r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/netlink\x00')
read$qrtrtun(r0, &(0x7f0000000040)=""/85, 0x55)
read$qrtrtun(r0, &(0x7f00000000c0)=""/156, 0x9c)
03:50:41 executing program 4:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000) (async)
write$P9_RATTACH(r0, &(0x7f0000000000)={0x14, 0x69, 0x2, {0x80, 0x0, 0x4}}, 0x14)
03:50:41 executing program 0:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x10fe)
03:50:41 executing program 3:
syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000), 0x0)
read$qrtrtun(r0, 0x0, 0x0)
read$qrtrtun(0xffffffffffffffff, &(0x7f00000010c0)=""/140, 0x8c)
03:50:41 executing program 1:
r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$NBD_CMD_RECONFIGURE(r0, &(0x7f0000001980)={&(0x7f0000001880)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000001940)={&(0x7f00000018c0)={0x14}, 0x14}}, 0x0)
sendmsg$NBD_CMD_STATUS(r0, &(0x7f00000010c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x34, 0x0, 0x1, 0x70bd25, 0x25dfdbfb, {}, [@NBD_ATTR_TIMEOUT={0xc, 0x4, 0xfffffffffffffff8}, @NBD_ATTR_BACKEND_IDENTIFIER={0x6, 0xa, ':.'}, @NBD_ATTR_BACKEND_IDENTIFIER={0xa, 0xa, 'smaps\x00'}]}, 0x34}, 0x1, 0x0, 0x0, 0x810}, 0x4004800)
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r1, 0x0, 0xcf, 0x0, 0x0)
ioctl$IMSETDEVNAME(r1, 0x80184947, &(0x7f00000000c0)={0x1, 'syz0\x00'})
r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r2, &(0x7f00000019c0)=""/4098, 0x1002)
03:50:41 executing program 2:
bpf$PROG_LOAD_XDP(0x14, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:41 executing program 4:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
write$P9_RATTACH(r0, &(0x7f0000000000)={0x14, 0x69, 0x2, {0x80, 0x0, 0x4}}, 0x14)
03:50:41 executing program 5:
r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/netlink\x00')
read$qrtrtun(r0, &(0x7f0000000040)=""/85, 0x55)
read$qrtrtun(r0, &(0x7f00000000c0)=""/156, 0x9c)
syz_open_procfs(0x0, &(0x7f0000000180)='net/netlink\x00') (async)
read$qrtrtun(r0, &(0x7f0000000040)=""/85, 0x55) (async)
read$qrtrtun(r0, &(0x7f00000000c0)=""/156, 0x9c) (async)
03:50:41 executing program 0:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x2900)
03:50:41 executing program 1:
r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$NBD_CMD_RECONFIGURE(r0, &(0x7f0000001980)={&(0x7f0000001880)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000001940)={&(0x7f00000018c0)={0x14}, 0x14}}, 0x0)
sendmsg$NBD_CMD_STATUS(r0, &(0x7f00000010c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x34, 0x0, 0x1, 0x70bd25, 0x25dfdbfb, {}, [@NBD_ATTR_TIMEOUT={0xc, 0x4, 0xfffffffffffffff8}, @NBD_ATTR_BACKEND_IDENTIFIER={0x6, 0xa, ':.'}, @NBD_ATTR_BACKEND_IDENTIFIER={0xa, 0xa, 'smaps\x00'}]}, 0x34}, 0x1, 0x0, 0x0, 0x810}, 0x4004800)
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r1, 0x0, 0xcf, 0x0, 0x0) (async, rerun: 32)
ioctl$IMSETDEVNAME(r1, 0x80184947, &(0x7f00000000c0)={0x1, 'syz0\x00'}) (async, rerun: 32)
r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r2, &(0x7f00000019c0)=""/4098, 0x1002)
03:50:41 executing program 4:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
r1 = memfd_secret(0x0)
sendmsg$NFQNL_MSG_CONFIG(r1, &(0x7f00000010c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x2, 0x3, 0x401, 0x0, 0x0, {0x0, 0x0, 0x3}, [@NFQA_CFG_MASK={0x8, 0x4, 0x1, 0x0, 0x20}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x4000005)
r2 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$NFNL_MSG_ACCT_DEL(r2, &(0x7f0000001340)={&(0x7f0000001200)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000001240)={&(0x7f00000012c0)={0x70, 0x3, 0x7, 0x801, 0x0, 0x0, {}, [@NFACCT_FILTER={0x1c, 0x7, 0x0, 0x1, [@NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x100}, @NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x9}, @NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x401}]}, @NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x3}, @NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x2}, @NFACCT_QUOTA={0xc, 0x6, 0x1, 0x0, 0x81}, @NFACCT_QUOTA={0xc, 0x6, 0x1, 0x0, 0x6}, @NFACCT_QUOTA={0xc, 0x6, 0x1, 0x0, 0x401}, @NFACCT_QUOTA={0xc, 0x6, 0x1, 0x0, 0x8000}]}, 0x70}, 0x1, 0x0, 0x0, 0x4000804}, 0x4004000)
setsockopt$MRT_DEL_VIF(r1, 0x0, 0xcb, &(0x7f0000001380)={0xffffffffffffffff, 0x1, 0x7, 0x89bd, @vifc_lcl_ifindex, @local}, 0x10)
socket$igmp(0x2, 0x3, 0x2)
r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), 0xffffffffffffffff)
sendmsg$L2TP_CMD_TUNNEL_CREATE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000100)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c002000520166291cd93b7d93048bddc91058899ede7e363c8eac172fc26edf5b28f3a9aefe1c9859701e50b2dfe5de8cbccb55d402bad09ec5526d27b00956782a8b0eb401d7b93fc742fc2402bb61b9635bfc13060a38ba80d8d491664276529da09576d381", @ANYRES16=r3, @ANYBLOB="000429bd7000fedbdf250100000006001c0006000000"], 0x1c}}, 0x0)
sendmsg$L2TP_CMD_TUNNEL_CREATE(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)=ANY=[@ANYBLOB='$\x00WR', @ANYRES16=r3, @ANYBLOB="10002bbd7000fddbdf2501000000050007000200000008001700", @ANYRES32=r0, @ANYBLOB], 0x24}, 0x1, 0x0, 0x0, 0x8000}, 0x20000000)
03:50:41 executing program 2:
bpf$PROG_LOAD_XDP(0x15, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:41 executing program 5:
r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/protocols\x00')
read$qrtrtun(r0, &(0x7f0000000040)=""/85, 0x55)
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r1, 0x0, 0xcf, 0x0, 0x0)
clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0})
epoll_pwait2(r1, &(0x7f0000000000)=[{}, {}], 0x2, &(0x7f00000001c0)={r2, r3+10000000}, &(0x7f0000000240), 0x8)
read$qrtrtun(r0, &(0x7f00000000c0)=""/156, 0x9c)
03:50:41 executing program 1:
r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$NBD_CMD_RECONFIGURE(r0, &(0x7f0000001980)={&(0x7f0000001880)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000001940)={&(0x7f00000018c0)={0x14}, 0x14}}, 0x0)
sendmsg$NBD_CMD_STATUS(r0, &(0x7f00000010c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x34, 0x0, 0x1, 0x70bd25, 0x25dfdbfb, {}, [@NBD_ATTR_TIMEOUT={0xc, 0x4, 0xfffffffffffffff8}, @NBD_ATTR_BACKEND_IDENTIFIER={0x6, 0xa, ':.'}, @NBD_ATTR_BACKEND_IDENTIFIER={0xa, 0xa, 'smaps\x00'}]}, 0x34}, 0x1, 0x0, 0x0, 0x810}, 0x4004800) (async, rerun: 32)
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00') (rerun: 32)
setsockopt$MRT_ASSERT(r1, 0x0, 0xcf, 0x0, 0x0)
ioctl$IMSETDEVNAME(r1, 0x80184947, &(0x7f00000000c0)={0x1, 'syz0\x00'})
r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r2, &(0x7f00000019c0)=""/4098, 0x1002)
03:50:41 executing program 4:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000) (async)
r1 = memfd_secret(0x0)
sendmsg$NFQNL_MSG_CONFIG(r1, &(0x7f00000010c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x2, 0x3, 0x401, 0x0, 0x0, {0x0, 0x0, 0x3}, [@NFQA_CFG_MASK={0x8, 0x4, 0x1, 0x0, 0x20}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x4000005) (async)
r2 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$NFNL_MSG_ACCT_DEL(r2, &(0x7f0000001340)={&(0x7f0000001200)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000001240)={&(0x7f00000012c0)={0x70, 0x3, 0x7, 0x801, 0x0, 0x0, {}, [@NFACCT_FILTER={0x1c, 0x7, 0x0, 0x1, [@NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x100}, @NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x9}, @NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x401}]}, @NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x3}, @NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x2}, @NFACCT_QUOTA={0xc, 0x6, 0x1, 0x0, 0x81}, @NFACCT_QUOTA={0xc, 0x6, 0x1, 0x0, 0x6}, @NFACCT_QUOTA={0xc, 0x6, 0x1, 0x0, 0x401}, @NFACCT_QUOTA={0xc, 0x6, 0x1, 0x0, 0x8000}]}, 0x70}, 0x1, 0x0, 0x0, 0x4000804}, 0x4004000) (async)
setsockopt$MRT_DEL_VIF(r1, 0x0, 0xcb, &(0x7f0000001380)={0xffffffffffffffff, 0x1, 0x7, 0x89bd, @vifc_lcl_ifindex, @local}, 0x10) (async)
socket$igmp(0x2, 0x3, 0x2) (async, rerun: 32)
r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), 0xffffffffffffffff) (rerun: 32)
sendmsg$L2TP_CMD_TUNNEL_CREATE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000100)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c002000520166291cd93b7d93048bddc91058899ede7e363c8eac172fc26edf5b28f3a9aefe1c9859701e50b2dfe5de8cbccb55d402bad09ec5526d27b00956782a8b0eb401d7b93fc742fc2402bb61b9635bfc13060a38ba80d8d491664276529da09576d381", @ANYRES16=r3, @ANYBLOB="000429bd7000fedbdf250100000006001c0006000000"], 0x1c}}, 0x0)
sendmsg$L2TP_CMD_TUNNEL_CREATE(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)=ANY=[@ANYBLOB='$\x00WR', @ANYRES16=r3, @ANYBLOB="10002bbd7000fddbdf2501000000050007000200000008001700", @ANYRES32=r0, @ANYBLOB], 0x24}, 0x1, 0x0, 0x0, 0x8000}, 0x20000000)
03:50:41 executing program 2:
bpf$PROG_LOAD_XDP(0x16, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:41 executing program 0:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x6f0d)
03:50:41 executing program 4:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
r1 = memfd_secret(0x0)
sendmsg$NFQNL_MSG_CONFIG(r1, &(0x7f00000010c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x2, 0x3, 0x401, 0x0, 0x0, {0x0, 0x0, 0x3}, [@NFQA_CFG_MASK={0x8, 0x4, 0x1, 0x0, 0x20}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x4000005)
r2 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$NFNL_MSG_ACCT_DEL(r2, &(0x7f0000001340)={&(0x7f0000001200)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000001240)={&(0x7f00000012c0)={0x70, 0x3, 0x7, 0x801, 0x0, 0x0, {}, [@NFACCT_FILTER={0x1c, 0x7, 0x0, 0x1, [@NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x100}, @NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x9}, @NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x401}]}, @NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x3}, @NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x2}, @NFACCT_QUOTA={0xc, 0x6, 0x1, 0x0, 0x81}, @NFACCT_QUOTA={0xc, 0x6, 0x1, 0x0, 0x6}, @NFACCT_QUOTA={0xc, 0x6, 0x1, 0x0, 0x401}, @NFACCT_QUOTA={0xc, 0x6, 0x1, 0x0, 0x8000}]}, 0x70}, 0x1, 0x0, 0x0, 0x4000804}, 0x4004000)
setsockopt$MRT_DEL_VIF(r1, 0x0, 0xcb, &(0x7f0000001380)={0xffffffffffffffff, 0x1, 0x7, 0x89bd, @vifc_lcl_ifindex, @local}, 0x10) (async)
setsockopt$MRT_DEL_VIF(r1, 0x0, 0xcb, &(0x7f0000001380)={0xffffffffffffffff, 0x1, 0x7, 0x89bd, @vifc_lcl_ifindex, @local}, 0x10)
socket$igmp(0x2, 0x3, 0x2)
r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), 0xffffffffffffffff)
sendmsg$L2TP_CMD_TUNNEL_CREATE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000100)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c002000520166291cd93b7d93048bddc91058899ede7e363c8eac172fc26edf5b28f3a9aefe1c9859701e50b2dfe5de8cbccb55d402bad09ec5526d27b00956782a8b0eb401d7b93fc742fc2402bb61b9635bfc13060a38ba80d8d491664276529da09576d381", @ANYRES16=r3, @ANYBLOB="000429bd7000fedbdf250100000006001c0006000000"], 0x1c}}, 0x0) (async)
sendmsg$L2TP_CMD_TUNNEL_CREATE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000100)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c002000520166291cd93b7d93048bddc91058899ede7e363c8eac172fc26edf5b28f3a9aefe1c9859701e50b2dfe5de8cbccb55d402bad09ec5526d27b00956782a8b0eb401d7b93fc742fc2402bb61b9635bfc13060a38ba80d8d491664276529da09576d381", @ANYRES16=r3, @ANYBLOB="000429bd7000fedbdf250100000006001c0006000000"], 0x1c}}, 0x0)
sendmsg$L2TP_CMD_TUNNEL_CREATE(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)=ANY=[@ANYBLOB='$\x00WR', @ANYRES16=r3, @ANYBLOB="10002bbd7000fddbdf2501000000050007000200000008001700", @ANYRES32=r0, @ANYBLOB], 0x24}, 0x1, 0x0, 0x0, 0x8000}, 0x20000000) (async)
sendmsg$L2TP_CMD_TUNNEL_CREATE(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)=ANY=[@ANYBLOB='$\x00WR', @ANYRES16=r3, @ANYBLOB="10002bbd7000fddbdf2501000000050007000200000008001700", @ANYRES32=r0, @ANYBLOB], 0x24}, 0x1, 0x0, 0x0, 0x8000}, 0x20000000)
03:50:41 executing program 3:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
r1 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000), 0x0)
read$qrtrtun(r1, 0x0, 0x0)
read$qrtrtun(r0, 0x0, 0x0)
03:50:41 executing program 1:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
sendmsg$IPCTNL_MSG_TIMEOUT_GET(r0, &(0x7f0000001100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000010c0)={&(0x7f0000000080)={0x24, 0x1, 0x8, 0x201, 0x0, 0x0, {0x0, 0x0, 0x4}, [@CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x11}, @CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x3a}]}, 0x24}, 0x1, 0x0, 0x0, 0x1}, 0x4044811)
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
ioctl$PPPOEIOCSFWD(r0, 0x4008b100, &(0x7f0000000000)={0x18, 0x0, {0x4, @local, 'pimreg0\x00'}})
03:50:41 executing program 5:
r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/protocols\x00')
read$qrtrtun(r0, &(0x7f0000000040)=""/85, 0x55) (async)
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r1, 0x0, 0xcf, 0x0, 0x0)
clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0})
epoll_pwait2(r1, &(0x7f0000000000)=[{}, {}], 0x2, &(0x7f00000001c0)={r2, r3+10000000}, &(0x7f0000000240), 0x8)
read$qrtrtun(r0, &(0x7f00000000c0)=""/156, 0x9c)
03:50:41 executing program 2:
bpf$PROG_LOAD_XDP(0x17, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:41 executing program 5:
r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/protocols\x00')
read$qrtrtun(r0, &(0x7f0000000040)=""/85, 0x55)
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r1, 0x0, 0xcf, 0x0, 0x0)
clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0})
epoll_pwait2(r1, &(0x7f0000000000)=[{}, {}], 0x2, &(0x7f00000001c0)={r2, r3+10000000}, &(0x7f0000000240), 0x8)
read$qrtrtun(r0, &(0x7f00000000c0)=""/156, 0x9c)
syz_open_procfs(0x0, &(0x7f0000000200)='net/protocols\x00') (async)
read$qrtrtun(r0, &(0x7f0000000040)=""/85, 0x55) (async)
syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00') (async)
setsockopt$MRT_ASSERT(r1, 0x0, 0xcf, 0x0, 0x0) (async)
clock_gettime(0x0, &(0x7f0000000180)) (async)
epoll_pwait2(r1, &(0x7f0000000000)=[{}, {}], 0x2, &(0x7f00000001c0)={r2, r3+10000000}, &(0x7f0000000240), 0x8) (async)
read$qrtrtun(r0, &(0x7f00000000c0)=""/156, 0x9c) (async)
03:50:41 executing program 1:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
sendmsg$IPCTNL_MSG_TIMEOUT_GET(r0, &(0x7f0000001100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000010c0)={&(0x7f0000000080)={0x24, 0x1, 0x8, 0x201, 0x0, 0x0, {0x0, 0x0, 0x4}, [@CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x11}, @CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x3a}]}, 0x24}, 0x1, 0x0, 0x0, 0x1}, 0x4044811)
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
ioctl$PPPOEIOCSFWD(r0, 0x4008b100, &(0x7f0000000000)={0x18, 0x0, {0x4, @local, 'pimreg0\x00'}}) (async)
ioctl$PPPOEIOCSFWD(r0, 0x4008b100, &(0x7f0000000000)={0x18, 0x0, {0x4, @local, 'pimreg0\x00'}})
03:50:41 executing program 0:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0xb20a)
03:50:41 executing program 4:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
epoll_pwait(r0, &(0x7f0000000000)=[{}, {}, {}, {}], 0x4, 0x19, &(0x7f0000000040)={[0x9]}, 0x8)
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
03:50:41 executing program 2:
bpf$PROG_LOAD_XDP(0x18, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:41 executing program 0:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0xe907)
03:50:41 executing program 1:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
sendmsg$IPCTNL_MSG_TIMEOUT_GET(r0, &(0x7f0000001100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000010c0)={&(0x7f0000000080)={0x24, 0x1, 0x8, 0x201, 0x0, 0x0, {0x0, 0x0, 0x4}, [@CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x11}, @CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x3a}]}, 0x24}, 0x1, 0x0, 0x0, 0x1}, 0x4044811) (async)
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
ioctl$PPPOEIOCSFWD(r0, 0x4008b100, &(0x7f0000000000)={0x18, 0x0, {0x4, @local, 'pimreg0\x00'}})
03:50:41 executing program 4:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
epoll_pwait(r0, &(0x7f0000000000)=[{}, {}, {}, {}], 0x4, 0x19, &(0x7f0000000040)={[0x9]}, 0x8) (async)
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
03:50:42 executing program 3:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
r1 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000), 0x0)
read$qrtrtun(r1, 0x0, 0x0)
read$qrtrtun(r0, 0x0, 0x0)
03:50:42 executing program 1:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
pipe2$watch_queue(&(0x7f0000000000), 0x80)
r1 = socket$igmp(0x2, 0x3, 0x2)
ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'ip6gre0\x00', 0x0})
bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', r2}, 0x48)
bpf$BPF_PROG_QUERY(0x10, &(0x7f0000001140)={@cgroup=r0, 0x26, 0x1, 0x7, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000080)=[0x0], &(0x7f00000010c0)=[0x0, 0x0], &(0x7f0000001100)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x40)
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
03:50:42 executing program 2:
bpf$PROG_LOAD_XDP(0x19, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:42 executing program 0:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0xec04)
03:50:42 executing program 5:
r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/protocols\x00')
read$qrtrtun(r0, &(0x7f0000000040)=""/85, 0x55)
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r1, 0x0, 0xcf, 0x0, 0x0)
getpid()
getpid()
r2 = getpid()
r3 = getpid()
kcmp$KCMP_EPOLL_TFD(r2, r3, 0x7, 0xffffffffffffffff, &(0x7f0000001840)={0xffffffffffffffff, 0xffffffffffffffff, 0x1})
pipe2$watch_queue(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80)
epoll_pwait(r4, &(0x7f0000000640)=[{}, {}, {}, {}, {}, {}, {}], 0x7, 0x3, &(0x7f00000006c0)={[0x3]}, 0x8)
r5 = getpid()
syz_open_procfs$userns(r5, &(0x7f0000000180))
mount_setattr(r1, &(0x7f0000000000)='./file0\x00', 0x1000, &(0x7f00000001c0)={0x74}, 0x20)
r6 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, r1, 0x401, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x3}, 0x48)
r7 = getpid()
ptrace$setopts(0xc60a, r7, 0x2, 0x1)
ioctl$IOC_PR_CLEAR(r0, 0x401070cd, &(0x7f00000002c0)={0x4})
read$qrtrtun(r0, &(0x7f00000000c0)=""/156, 0x9c)
r8 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r8, 0x0, 0xcf, 0x0, 0x0)
r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r9, 0x0, 0xcf, 0x0, 0x0)
r10 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r10, 0x0, 0xcf, 0x0, 0x0)
r11 = bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x2, 0xee, 0x401, 0x8, 0x1000, r6, 0x7f, '\x00', 0x0, r1, 0x4}, 0x48)
bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x20, 0xc, &(0x7f0000000300)=ANY=[@ANYBLOB="180000000100012709b781d9a136fe76c87b7780bdd9000000d3030000180000000135000003", @ANYRES32=r8, @ANYBLOB="000000000101000083470800f0ffffff181a0000", @ANYRES32=r9, @ANYBLOB="00000000000000009500000000000000"], &(0x7f0000000380)='syzkaller\x00', 0x2, 0x2e, &(0x7f00000003c0)=""/46, 0x40f00, 0x9, '\x00', 0x0, 0x18, r10, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000400)={0x3, 0xf, 0x80000000, 0x3}, 0x10, 0x0, r0, 0x4, &(0x7f00000004c0)=[r11, r0, r0, r6], &(0x7f0000000500)=[{0x1, 0x1, 0x8, 0x2}, {0x1, 0x4, 0x9, 0xb}, {0x3, 0x1, 0x8, 0xc}, {0x0, 0x3, 0xe, 0xc}], 0x10, 0xd915}, 0x90)
03:50:42 executing program 4:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
epoll_pwait(r0, &(0x7f0000000000)=[{}, {}, {}, {}], 0x4, 0x19, &(0x7f0000000040)={[0x9]}, 0x8) (async)
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
03:50:42 executing program 2:
bpf$PROG_LOAD_XDP(0x1a, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:42 executing program 0:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0xfc01)
03:50:42 executing program 5:
r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/protocols\x00')
read$qrtrtun(r0, &(0x7f0000000040)=""/85, 0x55)
syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00') (async)
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r1, 0x0, 0xcf, 0x0, 0x0) (async)
setsockopt$MRT_ASSERT(r1, 0x0, 0xcf, 0x0, 0x0)
getpid()
getpid()
getpid() (async)
r2 = getpid()
r3 = getpid()
kcmp$KCMP_EPOLL_TFD(r2, r3, 0x7, 0xffffffffffffffff, &(0x7f0000001840)={0xffffffffffffffff, 0xffffffffffffffff, 0x1})
pipe2$watch_queue(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80)
epoll_pwait(r4, &(0x7f0000000640)=[{}, {}, {}, {}, {}, {}, {}], 0x7, 0x3, &(0x7f00000006c0)={[0x3]}, 0x8) (async)
epoll_pwait(r4, &(0x7f0000000640)=[{}, {}, {}, {}, {}, {}, {}], 0x7, 0x3, &(0x7f00000006c0)={[0x3]}, 0x8)
getpid() (async)
r5 = getpid()
syz_open_procfs$userns(r5, &(0x7f0000000180))
mount_setattr(r1, &(0x7f0000000000)='./file0\x00', 0x1000, &(0x7f00000001c0)={0x74}, 0x20)
bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, r1, 0x401, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x3}, 0x48) (async)
r6 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, r1, 0x401, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x3}, 0x48)
r7 = getpid()
ptrace$setopts(0xc60a, r7, 0x2, 0x1)
ioctl$IOC_PR_CLEAR(r0, 0x401070cd, &(0x7f00000002c0)={0x4})
read$qrtrtun(r0, &(0x7f00000000c0)=""/156, 0x9c)
r8 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r8, 0x0, 0xcf, 0x0, 0x0) (async)
setsockopt$MRT_ASSERT(r8, 0x0, 0xcf, 0x0, 0x0)
syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00') (async)
r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r9, 0x0, 0xcf, 0x0, 0x0)
syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00') (async)
r10 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r10, 0x0, 0xcf, 0x0, 0x0)
r11 = bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x2, 0xee, 0x401, 0x8, 0x1000, r6, 0x7f, '\x00', 0x0, r1, 0x4}, 0x48)
bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x20, 0xc, &(0x7f0000000300)=ANY=[@ANYBLOB="180000000100012709b781d9a136fe76c87b7780bdd9000000d3030000180000000135000003", @ANYRES32=r8, @ANYBLOB="000000000101000083470800f0ffffff181a0000", @ANYRES32=r9, @ANYBLOB="00000000000000009500000000000000"], &(0x7f0000000380)='syzkaller\x00', 0x2, 0x2e, &(0x7f00000003c0)=""/46, 0x40f00, 0x9, '\x00', 0x0, 0x18, r10, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000400)={0x3, 0xf, 0x80000000, 0x3}, 0x10, 0x0, r0, 0x4, &(0x7f00000004c0)=[r11, r0, r0, r6], &(0x7f0000000500)=[{0x1, 0x1, 0x8, 0x2}, {0x1, 0x4, 0x9, 0xb}, {0x3, 0x1, 0x8, 0xc}, {0x0, 0x3, 0xe, 0xc}], 0x10, 0xd915}, 0x90)
03:50:42 executing program 2:
bpf$PROG_LOAD_XDP(0x1b, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:42 executing program 4:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000010c0)=""/4110, 0x100e)
03:50:42 executing program 1:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
pipe2$watch_queue(&(0x7f0000000000), 0x80)
r1 = socket$igmp(0x2, 0x3, 0x2)
ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'ip6gre0\x00', 0x0})
bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', r2}, 0x48)
bpf$BPF_PROG_QUERY(0x10, &(0x7f0000001140)={@cgroup=r0, 0x26, 0x1, 0x7, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000080)=[0x0], &(0x7f00000010c0)=[0x0, 0x0], &(0x7f0000001100)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x40) (async, rerun: 64)
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000) (rerun: 64)
03:50:43 executing program 5:
r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/protocols\x00')
read$qrtrtun(r0, &(0x7f0000000040)=""/85, 0x55) (async)
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r1, 0x0, 0xcf, 0x0, 0x0)
getpid() (async)
getpid() (async)
r2 = getpid() (async)
r3 = getpid()
kcmp$KCMP_EPOLL_TFD(r2, r3, 0x7, 0xffffffffffffffff, &(0x7f0000001840)={0xffffffffffffffff, 0xffffffffffffffff, 0x1}) (async)
pipe2$watch_queue(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80)
epoll_pwait(r4, &(0x7f0000000640)=[{}, {}, {}, {}, {}, {}, {}], 0x7, 0x3, &(0x7f00000006c0)={[0x3]}, 0x8)
r5 = getpid()
syz_open_procfs$userns(r5, &(0x7f0000000180)) (async)
mount_setattr(r1, &(0x7f0000000000)='./file0\x00', 0x1000, &(0x7f00000001c0)={0x74}, 0x20) (async)
r6 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, r1, 0x401, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x3}, 0x48) (async)
r7 = getpid()
ptrace$setopts(0xc60a, r7, 0x2, 0x1) (async)
ioctl$IOC_PR_CLEAR(r0, 0x401070cd, &(0x7f00000002c0)={0x4}) (async)
read$qrtrtun(r0, &(0x7f00000000c0)=""/156, 0x9c) (async)
r8 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r8, 0x0, 0xcf, 0x0, 0x0) (async)
r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r9, 0x0, 0xcf, 0x0, 0x0) (async)
r10 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r10, 0x0, 0xcf, 0x0, 0x0) (async)
r11 = bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x2, 0xee, 0x401, 0x8, 0x1000, r6, 0x7f, '\x00', 0x0, r1, 0x4}, 0x48)
bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x20, 0xc, &(0x7f0000000300)=ANY=[@ANYBLOB="180000000100012709b781d9a136fe76c87b7780bdd9000000d3030000180000000135000003", @ANYRES32=r8, @ANYBLOB="000000000101000083470800f0ffffff181a0000", @ANYRES32=r9, @ANYBLOB="00000000000000009500000000000000"], &(0x7f0000000380)='syzkaller\x00', 0x2, 0x2e, &(0x7f00000003c0)=""/46, 0x40f00, 0x9, '\x00', 0x0, 0x18, r10, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000400)={0x3, 0xf, 0x80000000, 0x3}, 0x10, 0x0, r0, 0x4, &(0x7f00000004c0)=[r11, r0, r0, r6], &(0x7f0000000500)=[{0x1, 0x1, 0x8, 0x2}, {0x1, 0x4, 0x9, 0xb}, {0x3, 0x1, 0x8, 0xc}, {0x0, 0x3, 0xe, 0xc}], 0x10, 0xd915}, 0x90)
03:50:43 executing program 2:
bpf$PROG_LOAD_XDP(0x1c, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:43 executing program 4:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000010c0)=""/4110, 0x100e) (async)
read$qrtrtun(r0, &(0x7f00000010c0)=""/4110, 0x100e)
03:50:43 executing program 0:
ioctl$PPPOEIOCDFWD(0xffffffffffffffff, 0xb101, 0x0)
io_uring_setup(0x27f6, &(0x7f0000000340)={0x0, 0x30ea, 0x100, 0x3, 0x2c4})
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/netfilter\x00')
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='net/mcfilter\x00')
setsockopt$MRT_ASSERT(r1, 0x0, 0xcf, 0x0, 0x0)
ioctl$BLKIOOPT(r0, 0x1279, &(0x7f0000000300))
r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000003c0)='net/ip6_tables_matches\x00')
setsockopt$MRT_DEL_MFC_PROXY(r2, 0x0, 0xd3, &(0x7f0000000400)={@local, @empty, 0x0, "58ec0103e6444a905fcfffabf2645e00c5e966dbfaad9fef080305b286f1227a", 0x2, 0xd622, 0x1, 0x6}, 0x3c)
read$qrtrtun(r1, &(0x7f00000020c0)=""/4093, 0xffd)
r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r3, 0x0, 0xcf, 0x0, 0x0)
write$P9_RCREATE(r3, &(0x7f0000000440)={0x18, 0x73, 0x1, {{0x2, 0x3, 0x8}, 0x8}}, 0x18)
r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r4, 0x0, 0xcf, 0x0, 0x0)
r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x1d, 0x6, &(0x7f0000000600)=ANY=[@ANYBLOB="dc09801aec65a2861211d5710ec90beb67acdfb27351b7c13e52b031e705df5fb3c0bbec0939b5cb7a91de011c787023e19802dcf81bc0700dc86656e4ffed115c840fab7099113f", @ANYRES32=r0, @ANYBLOB="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"], &(0x7f0000000080)='syzkaller\x00', 0x20, 0x10, &(0x7f00000000c0)=""/16, 0x40f00, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x2, 0x3}, 0x8, 0x10, &(0x7f0000000140)={0x5, 0x8, 0x0, 0x8}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x4, &(0x7f0000000180)=[r4, r0, r0, r1, r0], &(0x7f00000001c0)=[{0x3, 0x3, 0xb, 0x3}, {0x5, 0x3, 0xc, 0x6}, {0x1, 0x4, 0x8, 0x3}, {0x1, 0x3, 0x5, 0x8}], 0x10, 0x6}, 0x90)
bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000040)=ANY=[@ANYRES32=r5, @ANYRES32=r1, @ANYBLOB="873678f36669457b432e6ba94897b258d53e88"], 0x10)
03:50:43 executing program 1:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00') (async)
pipe2$watch_queue(&(0x7f0000000000), 0x80) (async)
r1 = socket$igmp(0x2, 0x3, 0x2)
ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'ip6gre0\x00', 0x0})
bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', r2}, 0x48)
bpf$BPF_PROG_QUERY(0x10, &(0x7f0000001140)={@cgroup=r0, 0x26, 0x1, 0x7, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000080)=[0x0], &(0x7f00000010c0)=[0x0, 0x0], &(0x7f0000001100)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x40) (async)
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
03:50:43 executing program 3:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
r1 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000), 0x0)
read$qrtrtun(r1, 0x0, 0x0)
read$qrtrtun(r0, 0x0, 0x0)
03:50:43 executing program 2:
bpf$PROG_LOAD_XDP(0x1d, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:43 executing program 5:
r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/protocols\x00')
write$P9_RXATTRWALK(r0, &(0x7f0000000000)={0xf, 0x1f, 0x1, 0x7f}, 0xf)
read$qrtrtun(r0, &(0x7f0000000040)=""/85, 0x55)
pipe2$watch_queue(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80)
write$9p(r1, &(0x7f00000001c0)="101066115ec31643d411f9030388e6cf9c34ad", 0x13)
read$qrtrtun(r0, &(0x7f00000000c0)=""/156, 0x9c)
03:50:43 executing program 4:
syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps\x00') (async)
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000010c0)=""/4110, 0x100e)
03:50:43 executing program 2:
bpf$PROG_LOAD_XDP(0x1e, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:43 executing program 1:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
r1 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000040), 0x4)
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc0c89425, &(0x7f00000010c0)={"fb39936d762ac0786a33962966d3ece3", 0x0, 0x0, {0x587, 0x3}, {0x2, 0x5}, 0x1, [0x5, 0x48, 0x0, 0x7fffffff, 0x724, 0xffffffffffffffb2, 0x3, 0x8, 0x3, 0x3, 0x8000000000000001, 0x3, 0x9, 0x4, 0x3]})
r3 = bpf$ITER_CREATE(0x21, &(0x7f00000011c0)={r1}, 0x8)
bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f00000013c0)=0xffffffffffffffff, 0x4)
ioctl$IOC_PR_PREEMPT_ABORT(r3, 0x401870cc, &(0x7f0000001200)={0x7, 0x6, 0x600000, 0x8})
ioctl$BTRFS_IOC_START_SYNC(r0, 0x80089418, &(0x7f0000000080)=0x0)
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r1, 0xc0c89425, &(0x7f00000012c0)={"393ac6edd703d567c12eabc53705ec40", r2, r4, {0x5, 0x6}, {0x5, 0x2}, 0x1, [0x0, 0x101, 0x7, 0x3, 0x9, 0xffffffffffffff01, 0x1, 0x9, 0x101, 0x23, 0x100, 0x2, 0x82, 0x4, 0x5, 0x6e]})
r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r6, 0x0, 0xcf, 0x0, 0x0)
bpf$BPF_PROG_DETACH(0x9, &(0x7f0000001240)={@map=r0, r6, 0x1e, 0x0, 0x0, @prog_fd=r5}, 0x20)
setsockopt$MRT_ASSERT(r5, 0x0, 0xcf, 0x0, 0x0)
write$P9_RMKDIR(r5, &(0x7f0000000000)={0x14, 0x49, 0x2, {0x20, 0x3, 0x5}}, 0x14)
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
03:50:43 executing program 5:
r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/protocols\x00')
write$P9_RXATTRWALK(r0, &(0x7f0000000000)={0xf, 0x1f, 0x1, 0x7f}, 0xf) (async)
read$qrtrtun(r0, &(0x7f0000000040)=""/85, 0x55) (async)
pipe2$watch_queue(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80)
write$9p(r1, &(0x7f00000001c0)="101066115ec31643d411f9030388e6cf9c34ad", 0x13)
read$qrtrtun(r0, &(0x7f00000000c0)=""/156, 0x9c)
03:50:43 executing program 0:
ioctl$PPPOEIOCDFWD(0xffffffffffffffff, 0xb101, 0x0)
io_uring_setup(0x27f6, &(0x7f0000000340)={0x0, 0x30ea, 0x100, 0x3, 0x2c4})
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/netfilter\x00') (async, rerun: 64)
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='net/mcfilter\x00') (rerun: 64)
setsockopt$MRT_ASSERT(r1, 0x0, 0xcf, 0x0, 0x0) (async)
ioctl$BLKIOOPT(r0, 0x1279, &(0x7f0000000300))
r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000003c0)='net/ip6_tables_matches\x00')
setsockopt$MRT_DEL_MFC_PROXY(r2, 0x0, 0xd3, &(0x7f0000000400)={@local, @empty, 0x0, "58ec0103e6444a905fcfffabf2645e00c5e966dbfaad9fef080305b286f1227a", 0x2, 0xd622, 0x1, 0x6}, 0x3c) (async)
read$qrtrtun(r1, &(0x7f00000020c0)=""/4093, 0xffd)
r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r3, 0x0, 0xcf, 0x0, 0x0)
write$P9_RCREATE(r3, &(0x7f0000000440)={0x18, 0x73, 0x1, {{0x2, 0x3, 0x8}, 0x8}}, 0x18) (async)
r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r4, 0x0, 0xcf, 0x0, 0x0) (async)
r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x1d, 0x6, &(0x7f0000000600)=ANY=[@ANYBLOB="dc09801aec65a2861211d5710ec90beb67acdfb27351b7c13e52b031e705df5fb3c0bbec0939b5cb7a91de011c787023e19802dcf81bc0700dc86656e4ffed115c840fab7099113f", @ANYRES32=r0, @ANYBLOB="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"], &(0x7f0000000080)='syzkaller\x00', 0x20, 0x10, &(0x7f00000000c0)=""/16, 0x40f00, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x2, 0x3}, 0x8, 0x10, &(0x7f0000000140)={0x5, 0x8, 0x0, 0x8}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x4, &(0x7f0000000180)=[r4, r0, r0, r1, r0], &(0x7f00000001c0)=[{0x3, 0x3, 0xb, 0x3}, {0x5, 0x3, 0xc, 0x6}, {0x1, 0x4, 0x8, 0x3}, {0x1, 0x3, 0x5, 0x8}], 0x10, 0x6}, 0x90)
bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000040)=ANY=[@ANYRES32=r5, @ANYRES32=r1, @ANYBLOB="873678f36669457b432e6ba94897b258d53e88"], 0x10)
03:50:43 executing program 4:
getpid()
r0 = getpid()
r1 = syz_open_procfs(r0, &(0x7f0000000000)='net/udp\x00')
write$P9_RFLUSH(r1, &(0x7f0000000040)={0x7, 0x6d, 0x1}, 0x7)
read$qrtrtun(r1, &(0x7f00000000c0)=""/4096, 0x1000)
03:50:43 executing program 5:
r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/protocols\x00')
write$P9_RXATTRWALK(r0, &(0x7f0000000000)={0xf, 0x1f, 0x1, 0x7f}, 0xf)
read$qrtrtun(r0, &(0x7f0000000040)=""/85, 0x55)
pipe2$watch_queue(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80)
write$9p(r1, &(0x7f00000001c0)="101066115ec31643d411f9030388e6cf9c34ad", 0x13)
read$qrtrtun(r0, &(0x7f00000000c0)=""/156, 0x9c)
syz_open_procfs(0x0, &(0x7f0000000200)='net/protocols\x00') (async)
write$P9_RXATTRWALK(r0, &(0x7f0000000000)={0xf, 0x1f, 0x1, 0x7f}, 0xf) (async)
read$qrtrtun(r0, &(0x7f0000000040)=""/85, 0x55) (async)
pipe2$watch_queue(&(0x7f0000000180), 0x80) (async)
write$9p(r1, &(0x7f00000001c0)="101066115ec31643d411f9030388e6cf9c34ad", 0x13) (async)
read$qrtrtun(r0, &(0x7f00000000c0)=""/156, 0x9c) (async)
03:50:43 executing program 2:
bpf$PROG_LOAD_XDP(0x21, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:43 executing program 4:
getpid()
r0 = getpid()
syz_open_procfs(r0, &(0x7f0000000000)='net/udp\x00') (async)
r1 = syz_open_procfs(r0, &(0x7f0000000000)='net/udp\x00')
write$P9_RFLUSH(r1, &(0x7f0000000040)={0x7, 0x6d, 0x1}, 0x7)
read$qrtrtun(r1, &(0x7f00000000c0)=""/4096, 0x1000)
03:50:44 executing program 0:
ioctl$PPPOEIOCDFWD(0xffffffffffffffff, 0xb101, 0x0) (async)
io_uring_setup(0x27f6, &(0x7f0000000340)={0x0, 0x30ea, 0x100, 0x3, 0x2c4})
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/netfilter\x00') (async)
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='net/mcfilter\x00')
setsockopt$MRT_ASSERT(r1, 0x0, 0xcf, 0x0, 0x0)
ioctl$BLKIOOPT(r0, 0x1279, &(0x7f0000000300)) (async)
r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000003c0)='net/ip6_tables_matches\x00')
setsockopt$MRT_DEL_MFC_PROXY(r2, 0x0, 0xd3, &(0x7f0000000400)={@local, @empty, 0x0, "58ec0103e6444a905fcfffabf2645e00c5e966dbfaad9fef080305b286f1227a", 0x2, 0xd622, 0x1, 0x6}, 0x3c)
read$qrtrtun(r1, &(0x7f00000020c0)=""/4093, 0xffd) (async)
r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r3, 0x0, 0xcf, 0x0, 0x0) (async)
write$P9_RCREATE(r3, &(0x7f0000000440)={0x18, 0x73, 0x1, {{0x2, 0x3, 0x8}, 0x8}}, 0x18)
r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r4, 0x0, 0xcf, 0x0, 0x0) (async)
r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x1d, 0x6, &(0x7f0000000600)=ANY=[@ANYBLOB="dc09801aec65a2861211d5710ec90beb67acdfb27351b7c13e52b031e705df5fb3c0bbec0939b5cb7a91de011c787023e19802dcf81bc0700dc86656e4ffed115c840fab7099113f", @ANYRES32=r0, @ANYBLOB="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"], &(0x7f0000000080)='syzkaller\x00', 0x20, 0x10, &(0x7f00000000c0)=""/16, 0x40f00, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x2, 0x3}, 0x8, 0x10, &(0x7f0000000140)={0x5, 0x8, 0x0, 0x8}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x4, &(0x7f0000000180)=[r4, r0, r0, r1, r0], &(0x7f00000001c0)=[{0x3, 0x3, 0xb, 0x3}, {0x5, 0x3, 0xc, 0x6}, {0x1, 0x4, 0x8, 0x3}, {0x1, 0x3, 0x5, 0x8}], 0x10, 0x6}, 0x90)
bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000040)=ANY=[@ANYRES32=r5, @ANYRES32=r1, @ANYBLOB="873678f36669457b432e6ba94897b258d53e88"], 0x10)
03:50:44 executing program 5:
r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/protocols\x00')
read$qrtrtun(r0, &(0x7f0000000040)=""/85, 0x55)
read$qrtrtun(r0, &(0x7f00000000c0)=""/156, 0x9c)
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r1, 0x0, 0xcf, 0x0, 0x0)
write$qrtrtun(r1, &(0x7f0000000240)="5a5e2a8ece8bdc94261f3c6a437f903f69014cec190c936d7465626d2ec463653bea62bd739292d7a46d3ce86d50e2b9edadcb679655662d16289f31635b65b784407f28ff4470657c1c8a64b5c8f456426906db9d6e66d3508e14832fab20e5dad2ae6ec31dc3d542af0b90e1243ea36e44f906fa110830e7d4c55448a825bb3e415d31b1f1a1757a6886eee750504826a1c50a985ad6542d1a8c65b976f8efd3756e5e74fea2320d7194800a62238f09f4694d56f8773aa903fbf06be449079bbc3d40", 0xc4)
03:50:44 executing program 1:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00') (async)
r1 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000040), 0x4)
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc0c89425, &(0x7f00000010c0)={"fb39936d762ac0786a33962966d3ece3", 0x0, 0x0, {0x587, 0x3}, {0x2, 0x5}, 0x1, [0x5, 0x48, 0x0, 0x7fffffff, 0x724, 0xffffffffffffffb2, 0x3, 0x8, 0x3, 0x3, 0x8000000000000001, 0x3, 0x9, 0x4, 0x3]}) (async)
r3 = bpf$ITER_CREATE(0x21, &(0x7f00000011c0)={r1}, 0x8)
bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f00000013c0)=0xffffffffffffffff, 0x4) (async)
ioctl$IOC_PR_PREEMPT_ABORT(r3, 0x401870cc, &(0x7f0000001200)={0x7, 0x6, 0x600000, 0x8}) (async)
ioctl$BTRFS_IOC_START_SYNC(r0, 0x80089418, &(0x7f0000000080)=0x0)
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r1, 0xc0c89425, &(0x7f00000012c0)={"393ac6edd703d567c12eabc53705ec40", r2, r4, {0x5, 0x6}, {0x5, 0x2}, 0x1, [0x0, 0x101, 0x7, 0x3, 0x9, 0xffffffffffffff01, 0x1, 0x9, 0x101, 0x23, 0x100, 0x2, 0x82, 0x4, 0x5, 0x6e]})
r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00') (async)
r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r6, 0x0, 0xcf, 0x0, 0x0) (async)
bpf$BPF_PROG_DETACH(0x9, &(0x7f0000001240)={@map=r0, r6, 0x1e, 0x0, 0x0, @prog_fd=r5}, 0x20)
setsockopt$MRT_ASSERT(r5, 0x0, 0xcf, 0x0, 0x0) (async)
write$P9_RMKDIR(r5, &(0x7f0000000000)={0x14, 0x49, 0x2, {0x20, 0x3, 0x5}}, 0x14) (async)
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
03:50:44 executing program 2:
bpf$PROG_LOAD_XDP(0x22, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:44 executing program 4:
getpid()
r0 = getpid()
r1 = syz_open_procfs(r0, &(0x7f0000000000)='net/udp\x00')
write$P9_RFLUSH(r1, &(0x7f0000000040)={0x7, 0x6d, 0x1}, 0x7)
read$qrtrtun(r1, &(0x7f00000000c0)=""/4096, 0x1000)
getpid() (async)
getpid() (async)
syz_open_procfs(r0, &(0x7f0000000000)='net/udp\x00') (async)
write$P9_RFLUSH(r1, &(0x7f0000000040)={0x7, 0x6d, 0x1}, 0x7) (async)
read$qrtrtun(r1, &(0x7f00000000c0)=""/4096, 0x1000) (async)
03:50:44 executing program 3:
ioctl$PPPOEIOCDFWD(0xffffffffffffffff, 0xb101, 0x0)
io_uring_setup(0x27f6, &(0x7f0000000340)={0x0, 0x30ea, 0x100, 0x3, 0x2c4})
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/netfilter\x00')
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='net/mcfilter\x00')
setsockopt$MRT_ASSERT(r1, 0x0, 0xcf, 0x0, 0x0)
ioctl$BLKIOOPT(r0, 0x1279, &(0x7f0000000300))
r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000003c0)='net/ip6_tables_matches\x00')
setsockopt$MRT_DEL_MFC_PROXY(r2, 0x0, 0xd3, &(0x7f0000000400)={@local, @empty, 0x0, "58ec0103e6444a905fcfffabf2645e00c5e966dbfaad9fef080305b286f1227a", 0x2, 0xd622, 0x1, 0x6}, 0x3c)
read$qrtrtun(r1, &(0x7f00000020c0)=""/4093, 0xffd)
r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r3, 0x0, 0xcf, 0x0, 0x0)
write$P9_RCREATE(r3, &(0x7f0000000440)={0x18, 0x73, 0x1, {{0x2, 0x3, 0x8}, 0x8}}, 0x18)
r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r4, 0x0, 0xcf, 0x0, 0x0)
r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x1d, 0x6, &(0x7f0000000600)=ANY=[@ANYBLOB="dc09801aec65a2861211d5710ec90beb67acdfb27351b7c13e52b031e705df5fb3c0bbec0939b5cb7a91de011c787023e19802dcf81bc0700dc86656e4ffed115c840fab7099113f", @ANYRES32=r0, @ANYBLOB="000000008520000003e40000000047af8fd503e95a9717000000069270f9fc49d37396bafe193d92d64c9eea0f012cbf2a86a40b6a9a309dd43e731aa6760f5ef7f67f850a00c75d35f993b26593183c0400000009037830868365ddb379181b7f2dffd946f1e6c57e805098f0078460451fed2d3a9a2d79c791e4259ed3b9790a5d1a42462171cfbbe8caa91574088cae3672ccd60cd00b41d6eb9a4f554c35fd11033b3e2e18f6080b1ff71780a4093afaa3fd44fceddaa1db823cdc3e4b5c1bec6f12ae7cac55feab48befe35d5db2e07d6268f3a3d6e813f860f20f151f0a0f8eab4e4a601ab325e94245b9128672609b270ee4d2eba09ac00100000b269bc3da712bb7dd9fbf69044c8faf5b3532581141246284cd81957bf16d594d0040f9683dbad58420d56077b2e3b5f63988ab398ecf2cbd75aa0c595bf01566026db2df7f79288473dd1554fdee139970cc65018d821130e4162d22c1d3f793333576224"], &(0x7f0000000080)='syzkaller\x00', 0x20, 0x10, &(0x7f00000000c0)=""/16, 0x40f00, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x2, 0x3}, 0x8, 0x10, &(0x7f0000000140)={0x5, 0x8, 0x0, 0x8}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x4, &(0x7f0000000180)=[r4, r0, r0, r1, r0], &(0x7f00000001c0)=[{0x3, 0x3, 0xb, 0x3}, {0x5, 0x3, 0xc, 0x6}, {0x1, 0x4, 0x8, 0x3}, {0x1, 0x3, 0x5, 0x8}], 0x10, 0x6}, 0x90)
bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000040)=ANY=[@ANYRES32=r5, @ANYRES32=r1, @ANYBLOB="873678f36669457b432e6ba94897b258d53e88"], 0x10)
03:50:44 executing program 2:
bpf$PROG_LOAD_XDP(0x23, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:44 executing program 4:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
r1 = memfd_secret(0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000000)=ANY=[@ANYBLOB="0200000000000000000000000000000000000000000000000000000000000000000000000000000006000000", @ANYRES32=0x0, @ANYBLOB="000008000000000000000000000000000000000000000700000000000000001f30283a103500"])
03:50:44 executing program 0:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/ip_tables_targets\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
03:50:44 executing program 1:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
r1 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000040), 0x4)
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc0c89425, &(0x7f00000010c0)={"fb39936d762ac0786a33962966d3ece3", 0x0, 0x0, {0x587, 0x3}, {0x2, 0x5}, 0x1, [0x5, 0x48, 0x0, 0x7fffffff, 0x724, 0xffffffffffffffb2, 0x3, 0x8, 0x3, 0x3, 0x8000000000000001, 0x3, 0x9, 0x4, 0x3]}) (async, rerun: 64)
r3 = bpf$ITER_CREATE(0x21, &(0x7f00000011c0)={r1}, 0x8) (rerun: 64)
bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f00000013c0)=0xffffffffffffffff, 0x4) (async)
ioctl$IOC_PR_PREEMPT_ABORT(r3, 0x401870cc, &(0x7f0000001200)={0x7, 0x6, 0x600000, 0x8})
ioctl$BTRFS_IOC_START_SYNC(r0, 0x80089418, &(0x7f0000000080)=0x0)
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r1, 0xc0c89425, &(0x7f00000012c0)={"393ac6edd703d567c12eabc53705ec40", r2, r4, {0x5, 0x6}, {0x5, 0x2}, 0x1, [0x0, 0x101, 0x7, 0x3, 0x9, 0xffffffffffffff01, 0x1, 0x9, 0x101, 0x23, 0x100, 0x2, 0x82, 0x4, 0x5, 0x6e]}) (async)
r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00') (async)
r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r6, 0x0, 0xcf, 0x0, 0x0) (async)
bpf$BPF_PROG_DETACH(0x9, &(0x7f0000001240)={@map=r0, r6, 0x1e, 0x0, 0x0, @prog_fd=r5}, 0x20) (async, rerun: 32)
setsockopt$MRT_ASSERT(r5, 0x0, 0xcf, 0x0, 0x0) (async, rerun: 32)
write$P9_RMKDIR(r5, &(0x7f0000000000)={0x14, 0x49, 0x2, {0x20, 0x3, 0x5}}, 0x14) (async, rerun: 32)
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000) (rerun: 32)
03:50:44 executing program 5:
r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/protocols\x00')
read$qrtrtun(r0, &(0x7f0000000040)=""/85, 0x55)
read$qrtrtun(r0, &(0x7f00000000c0)=""/156, 0x9c)
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r1, 0x0, 0xcf, 0x0, 0x0)
write$qrtrtun(r1, &(0x7f0000000240)="5a5e2a8ece8bdc94261f3c6a437f903f69014cec190c936d7465626d2ec463653bea62bd739292d7a46d3ce86d50e2b9edadcb679655662d16289f31635b65b784407f28ff4470657c1c8a64b5c8f456426906db9d6e66d3508e14832fab20e5dad2ae6ec31dc3d542af0b90e1243ea36e44f906fa110830e7d4c55448a825bb3e415d31b1f1a1757a6886eee750504826a1c50a985ad6542d1a8c65b976f8efd3756e5e74fea2320d7194800a62238f09f4694d56f8773aa903fbf06be449079bbc3d40", 0xc4)
03:50:44 executing program 3:
ioctl$PPPOEIOCDFWD(0xffffffffffffffff, 0xb101, 0x0)
io_uring_setup(0x27f6, &(0x7f0000000340)={0x0, 0x30ea, 0x100, 0x3, 0x2c4})
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/netfilter\x00')
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='net/mcfilter\x00')
setsockopt$MRT_ASSERT(r1, 0x0, 0xcf, 0x0, 0x0)
ioctl$BLKIOOPT(r0, 0x1279, &(0x7f0000000300))
r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000003c0)='net/ip6_tables_matches\x00')
setsockopt$MRT_DEL_MFC_PROXY(r2, 0x0, 0xd3, &(0x7f0000000400)={@local, @empty, 0x0, "58ec0103e6444a905fcfffabf2645e00c5e966dbfaad9fef080305b286f1227a", 0x2, 0xd622, 0x1, 0x6}, 0x3c)
read$qrtrtun(r1, &(0x7f00000020c0)=""/4093, 0xffd)
r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r3, 0x0, 0xcf, 0x0, 0x0)
write$P9_RCREATE(r3, &(0x7f0000000440)={0x18, 0x73, 0x1, {{0x2, 0x3, 0x8}, 0x8}}, 0x18)
r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r4, 0x0, 0xcf, 0x0, 0x0)
r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x1d, 0x6, &(0x7f0000000600)=ANY=[@ANYBLOB="dc09801aec65a2861211d5710ec90beb67acdfb27351b7c13e52b031e705df5fb3c0bbec0939b5cb7a91de011c787023e19802dcf81bc0700dc86656e4ffed115c840fab7099113f", @ANYRES32=r0, @ANYBLOB="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"], &(0x7f0000000080)='syzkaller\x00', 0x20, 0x10, &(0x7f00000000c0)=""/16, 0x40f00, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x2, 0x3}, 0x8, 0x10, &(0x7f0000000140)={0x5, 0x8, 0x0, 0x8}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x4, &(0x7f0000000180)=[r4, r0, r0, r1, r0], &(0x7f00000001c0)=[{0x3, 0x3, 0xb, 0x3}, {0x5, 0x3, 0xc, 0x6}, {0x1, 0x4, 0x8, 0x3}, {0x1, 0x3, 0x5, 0x8}], 0x10, 0x6}, 0x90)
bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000040)=ANY=[@ANYRES32=r5, @ANYRES32=r1, @ANYBLOB="873678f36669457b432e6ba94897b258d53e88"], 0x10)
03:50:44 executing program 5:
r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/protocols\x00')
read$qrtrtun(r0, &(0x7f0000000040)=""/85, 0x55)
read$qrtrtun(r0, &(0x7f00000000c0)=""/156, 0x9c) (async)
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r1, 0x0, 0xcf, 0x0, 0x0)
write$qrtrtun(r1, &(0x7f0000000240)="5a5e2a8ece8bdc94261f3c6a437f903f69014cec190c936d7465626d2ec463653bea62bd739292d7a46d3ce86d50e2b9edadcb679655662d16289f31635b65b784407f28ff4470657c1c8a64b5c8f456426906db9d6e66d3508e14832fab20e5dad2ae6ec31dc3d542af0b90e1243ea36e44f906fa110830e7d4c55448a825bb3e415d31b1f1a1757a6886eee750504826a1c50a985ad6542d1a8c65b976f8efd3756e5e74fea2320d7194800a62238f09f4694d56f8773aa903fbf06be449079bbc3d40", 0xc4)
03:50:44 executing program 2:
bpf$PROG_LOAD_XDP(0x25, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:44 executing program 4:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
r1 = memfd_secret(0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000000)=ANY=[@ANYBLOB="0200000000000000000000000000000000000000000000000000000000000000000000000000000006000000", @ANYRES32=0x0, @ANYBLOB="000008000000000000000000000000000000000000000700000000000000001f30283a103500"])
03:50:44 executing program 3:
ioctl$PPPOEIOCDFWD(0xffffffffffffffff, 0xb101, 0x0)
io_uring_setup(0x27f6, &(0x7f0000000340)={0x0, 0x30ea, 0x100, 0x3, 0x2c4})
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/netfilter\x00')
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='net/mcfilter\x00')
setsockopt$MRT_ASSERT(r1, 0x0, 0xcf, 0x0, 0x0)
ioctl$BLKIOOPT(r0, 0x1279, &(0x7f0000000300))
r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000003c0)='net/ip6_tables_matches\x00')
setsockopt$MRT_DEL_MFC_PROXY(r2, 0x0, 0xd3, &(0x7f0000000400)={@local, @empty, 0x0, "58ec0103e6444a905fcfffabf2645e00c5e966dbfaad9fef080305b286f1227a", 0x2, 0xd622, 0x1, 0x6}, 0x3c)
read$qrtrtun(r1, &(0x7f00000020c0)=""/4093, 0xffd)
r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r3, 0x0, 0xcf, 0x0, 0x0)
write$P9_RCREATE(r3, &(0x7f0000000440)={0x18, 0x73, 0x1, {{0x2, 0x3, 0x8}, 0x8}}, 0x18)
r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r4, 0x0, 0xcf, 0x0, 0x0)
r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x1d, 0x6, &(0x7f0000000600)=ANY=[@ANYBLOB="dc09801aec65a2861211d5710ec90beb67acdfb27351b7c13e52b031e705df5fb3c0bbec0939b5cb7a91de011c787023e19802dcf81bc0700dc86656e4ffed115c840fab7099113f", @ANYRES32=r0, @ANYBLOB="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"], &(0x7f0000000080)='syzkaller\x00', 0x20, 0x10, &(0x7f00000000c0)=""/16, 0x40f00, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x2, 0x3}, 0x8, 0x10, &(0x7f0000000140)={0x5, 0x8, 0x0, 0x8}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x4, &(0x7f0000000180)=[r4, r0, r0, r1, r0], &(0x7f00000001c0)=[{0x3, 0x3, 0xb, 0x3}, {0x5, 0x3, 0xc, 0x6}, {0x1, 0x4, 0x8, 0x3}, {0x1, 0x3, 0x5, 0x8}], 0x10, 0x6}, 0x90)
bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000040)=ANY=[@ANYRES32=r5, @ANYRES32=r1, @ANYBLOB="873678f36669457b432e6ba94897b258d53e88"], 0x10)
03:50:44 executing program 0:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/ip_tables_targets\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000) (async)
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
03:50:44 executing program 2:
bpf$PROG_LOAD_XDP(0x45, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:44 executing program 0:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/ip_tables_targets\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
03:50:44 executing program 5:
r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/protocols\x00')
read$qrtrtun(r0, &(0x7f0000000040)=""/85, 0x55)
read$qrtrtun(r0, &(0x7f00000000c0)=""/156, 0x9c)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000000)=0x1)
03:50:44 executing program 3:
ioctl$PPPOEIOCDFWD(0xffffffffffffffff, 0xb101, 0x0)
io_uring_setup(0x27f6, &(0x7f0000000340)={0x0, 0x30ea, 0x100, 0x3, 0x2c4})
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/netfilter\x00')
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='net/mcfilter\x00')
setsockopt$MRT_ASSERT(r1, 0x0, 0xcf, 0x0, 0x0)
ioctl$BLKIOOPT(r0, 0x1279, &(0x7f0000000300))
r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000003c0)='net/ip6_tables_matches\x00')
setsockopt$MRT_DEL_MFC_PROXY(r2, 0x0, 0xd3, &(0x7f0000000400)={@local, @empty, 0x0, "58ec0103e6444a905fcfffabf2645e00c5e966dbfaad9fef080305b286f1227a", 0x2, 0xd622, 0x1, 0x6}, 0x3c)
read$qrtrtun(r1, &(0x7f00000020c0)=""/4093, 0xffd)
r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r3, 0x0, 0xcf, 0x0, 0x0)
write$P9_RCREATE(r3, &(0x7f0000000440)={0x18, 0x73, 0x1, {{0x2, 0x3, 0x8}, 0x8}}, 0x18)
r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r4, 0x0, 0xcf, 0x0, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x1d, 0x6, &(0x7f0000000600)=ANY=[@ANYBLOB="dc09801aec65a2861211d5710ec90beb67acdfb27351b7c13e52b031e705df5fb3c0bbec0939b5cb7a91de011c787023e19802dcf81bc0700dc86656e4ffed115c840fab7099113f", @ANYRES32=r0, @ANYBLOB="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"], &(0x7f0000000080)='syzkaller\x00', 0x20, 0x10, &(0x7f00000000c0)=""/16, 0x40f00, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x2, 0x3}, 0x8, 0x10, &(0x7f0000000140)={0x5, 0x8, 0x0, 0x8}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x4, &(0x7f0000000180)=[r4, r0, r0, r1, r0], &(0x7f00000001c0)=[{0x3, 0x3, 0xb, 0x3}, {0x5, 0x3, 0xc, 0x6}, {0x1, 0x4, 0x8, 0x3}, {0x1, 0x3, 0x5, 0x8}], 0x10, 0x6}, 0x90)
03:50:44 executing program 1:
r0 = getpid()
r1 = syz_open_procfs(r0, &(0x7f0000001280)='statm\x00')
r2 = memfd_secret(0x0)
r3 = getpid()
sched_rr_get_interval(r3, &(0x7f0000000040))
ioctl$sock_inet6_udp_SIOCOUTQ(r2, 0x5411, &(0x7f0000000000))
read$qrtrtun(r1, &(0x7f00000000c0)=""/4096, 0x1000)
03:50:44 executing program 4:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000) (async)
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
r1 = memfd_secret(0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000000)=ANY=[@ANYBLOB="0200000000000000000000000000000000000000000000000000000000000000000000000000000006000000", @ANYRES32=0x0, @ANYBLOB="000008000000000000000000000000000000000000000700000000000000001f30283a103500"])
03:50:44 executing program 2:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x2, 0x1, &(0x7f0000001240)=@raw=[@ldst], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:44 executing program 5:
r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/protocols\x00')
read$qrtrtun(r0, &(0x7f0000000040)=""/85, 0x55)
read$qrtrtun(r0, &(0x7f00000000c0)=""/156, 0x9c) (async)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000000)=0x1)
03:50:44 executing program 3:
ioctl$PPPOEIOCDFWD(0xffffffffffffffff, 0xb101, 0x0)
io_uring_setup(0x27f6, &(0x7f0000000340)={0x0, 0x30ea, 0x100, 0x3, 0x2c4})
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/netfilter\x00')
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='net/mcfilter\x00')
setsockopt$MRT_ASSERT(r1, 0x0, 0xcf, 0x0, 0x0)
ioctl$BLKIOOPT(r0, 0x1279, &(0x7f0000000300))
r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000003c0)='net/ip6_tables_matches\x00')
setsockopt$MRT_DEL_MFC_PROXY(r2, 0x0, 0xd3, &(0x7f0000000400)={@local, @empty, 0x0, "58ec0103e6444a905fcfffabf2645e00c5e966dbfaad9fef080305b286f1227a", 0x2, 0xd622, 0x1, 0x6}, 0x3c)
read$qrtrtun(r1, &(0x7f00000020c0)=""/4093, 0xffd)
r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r3, 0x0, 0xcf, 0x0, 0x0)
write$P9_RCREATE(r3, &(0x7f0000000440)={0x18, 0x73, 0x1, {{0x2, 0x3, 0x8}, 0x8}}, 0x18)
r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r4, 0x0, 0xcf, 0x0, 0x0)
03:50:44 executing program 0:
syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000040), 0x201372227aa2eaaf, 0x0)
read$qrtrtun(r0, &(0x7f00000012c0)=""/4095, 0xfff)
03:50:44 executing program 1:
r0 = getpid()
r1 = syz_open_procfs(r0, &(0x7f0000001280)='statm\x00')
r2 = memfd_secret(0x0)
r3 = getpid()
sched_rr_get_interval(r3, &(0x7f0000000040))
ioctl$sock_inet6_udp_SIOCOUTQ(r2, 0x5411, &(0x7f0000000000))
read$qrtrtun(r1, &(0x7f00000000c0)=""/4096, 0x1000)
getpid() (async)
syz_open_procfs(r0, &(0x7f0000001280)='statm\x00') (async)
memfd_secret(0x0) (async)
getpid() (async)
sched_rr_get_interval(r3, &(0x7f0000000040)) (async)
ioctl$sock_inet6_udp_SIOCOUTQ(r2, 0x5411, &(0x7f0000000000)) (async)
read$qrtrtun(r1, &(0x7f00000000c0)=""/4096, 0x1000) (async)
03:50:44 executing program 2:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x3, 0x1, &(0x7f0000001240)=@raw=[@ldst], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:44 executing program 1:
r0 = getpid()
r1 = syz_open_procfs(r0, &(0x7f0000001280)='statm\x00')
r2 = memfd_secret(0x0)
r3 = getpid()
sched_rr_get_interval(r3, &(0x7f0000000040))
ioctl$sock_inet6_udp_SIOCOUTQ(r2, 0x5411, &(0x7f0000000000))
read$qrtrtun(r1, &(0x7f00000000c0)=""/4096, 0x1000)
getpid() (async)
syz_open_procfs(r0, &(0x7f0000001280)='statm\x00') (async)
memfd_secret(0x0) (async)
getpid() (async)
sched_rr_get_interval(r3, &(0x7f0000000040)) (async)
ioctl$sock_inet6_udp_SIOCOUTQ(r2, 0x5411, &(0x7f0000000000)) (async)
read$qrtrtun(r1, &(0x7f00000000c0)=""/4096, 0x1000) (async)
03:50:44 executing program 0:
syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00') (async)
r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000040), 0x201372227aa2eaaf, 0x0)
read$qrtrtun(r0, &(0x7f00000012c0)=""/4095, 0xfff)
03:50:44 executing program 5:
r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/protocols\x00')
read$qrtrtun(r0, &(0x7f0000000040)=""/85, 0x55)
read$qrtrtun(r0, &(0x7f00000000c0)=""/156, 0x9c)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000000)=0x1)
syz_open_procfs(0x0, &(0x7f0000000200)='net/protocols\x00') (async)
read$qrtrtun(r0, &(0x7f0000000040)=""/85, 0x55) (async)
read$qrtrtun(r0, &(0x7f00000000c0)=""/156, 0x9c) (async)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000000)=0x1) (async)
03:50:44 executing program 3:
ioctl$PPPOEIOCDFWD(0xffffffffffffffff, 0xb101, 0x0)
io_uring_setup(0x27f6, &(0x7f0000000340)={0x0, 0x30ea, 0x100, 0x3, 0x2c4})
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/netfilter\x00')
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='net/mcfilter\x00')
setsockopt$MRT_ASSERT(r1, 0x0, 0xcf, 0x0, 0x0)
ioctl$BLKIOOPT(r0, 0x1279, &(0x7f0000000300))
r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000003c0)='net/ip6_tables_matches\x00')
setsockopt$MRT_DEL_MFC_PROXY(r2, 0x0, 0xd3, &(0x7f0000000400)={@local, @empty, 0x0, "58ec0103e6444a905fcfffabf2645e00c5e966dbfaad9fef080305b286f1227a", 0x2, 0xd622, 0x1, 0x6}, 0x3c)
read$qrtrtun(r1, &(0x7f00000020c0)=""/4093, 0xffd)
r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r3, 0x0, 0xcf, 0x0, 0x0)
write$P9_RCREATE(r3, &(0x7f0000000440)={0x18, 0x73, 0x1, {{0x2, 0x3, 0x8}, 0x8}}, 0x18)
syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
03:50:44 executing program 2:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x4, 0x1, &(0x7f0000001240)=@raw=[@ldst], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:44 executing program 4:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='comm\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x102, 0x0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2)
r3 = getpid()
r4 = getpid()
kcmp$KCMP_EPOLL_TFD(r4, r3, 0x7, 0xffffffffffffffff, &(0x7f0000001840))
r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000010c0)='net/dev_snmp6\x00')
ioctl$IOC_WATCH_QUEUE_SET_FILTER(r0, 0x5761, &(0x7f00000012c0)={0x9, 0x0, [{0x9, 0x11d0, 0x5, [0x5, 0xfaf, 0xffffff01, 0x1ff, 0x1000, 0xde1d, 0x3, 0x2]}, {0x9, 0x6, 0x0, [0x7f, 0x1, 0x5, 0x0, 0x5fc, 0x6, 0x5, 0x5]}, {0x7, 0x2, 0xffffffff, [0x6, 0xf8000000, 0x0, 0x7fffffff, 0x9, 0x5, 0x1, 0x3]}, {0x8, 0x94, 0x0, [0xb0c206bc, 0x2, 0x5, 0x3, 0x401, 0x0, 0x25, 0x1]}, {0x3ff, 0x18f, 0xffffff00, [0x3, 0x4, 0x1, 0xac, 0x1f, 0x1000, 0x9, 0x1000]}, {0x100, 0x0, 0xff, [0x2, 0x7f, 0x2, 0x3b, 0xfffffffa, 0x1f, 0x5, 0x246]}, {0x0, 0x4, 0x80, [0x7fff, 0xffffffff, 0x1, 0x9, 0x7, 0x1fffe0, 0xb0, 0xe7]}, {0x7fff, 0x4aae, 0x3, [0x1, 0x3, 0x40, 0x63, 0xff, 0x1, 0x542, 0x1]}, {0x4, 0xf3c2, 0x0, [0x9, 0xffffff80, 0x1, 0x8, 0x8, 0x50a, 0x66ef, 0xdc6]}]})
setsockopt$MRT_ASSERT(r5, 0x0, 0xcf, 0x0, 0x0)
bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000080)={r0, r5, 0x9, 0x0, @void}, 0x10)
timerfd_gettime(r5, &(0x7f0000000040))
syz_open_procfs(r3, &(0x7f0000000000)='net/ip6_tables_matches\x00')
03:50:44 executing program 5:
r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/protocols\x00')
ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f00000001c0))
bpf$ITER_CREATE(0x21, &(0x7f0000000180)={r0}, 0x8)
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r1, 0x0, 0xcf, 0x0, 0x0)
setsockopt$MRT_TABLE(r1, 0x0, 0xcf, &(0x7f0000000000)=0x1, 0x4)
read$qrtrtun(r0, &(0x7f0000000040)=""/85, 0x55)
read$qrtrtun(r0, &(0x7f00000000c0)=""/156, 0x9c)
03:50:44 executing program 0:
syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000040), 0x201372227aa2eaaf, 0x0)
read$qrtrtun(r0, &(0x7f00000012c0)=""/4095, 0xfff)
syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00') (async)
openat$bsg(0xffffffffffffff9c, &(0x7f0000000040), 0x201372227aa2eaaf, 0x0) (async)
read$qrtrtun(r0, &(0x7f00000012c0)=""/4095, 0xfff) (async)
03:50:44 executing program 1:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
r1 = memfd_secret(0x80000)
write$P9_RATTACH(r1, &(0x7f0000000080)={0x14, 0x69, 0x1, {0x8, 0x3, 0x1}}, 0x14)
setsockopt$MRT_TABLE(0xffffffffffffffff, 0x0, 0xcf, &(0x7f0000001140)=0xff, 0x4)
read$watch_queue(r0, &(0x7f0000001180)=""/178, 0xb2)
r2 = syz_genetlink_get_family_id$nbd(&(0x7f0000000040), 0xffffffffffffffff)
sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, &(0x7f0000001100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000010c0)={&(0x7f00000012c0)={0x50, r2, 0x1, 0x70bd27, 0x25dfdbfe, {}, [@NBD_ATTR_BACKEND_IDENTIFIER={0x38, 0xa, '|\x87/\xa3jt.\xe9((D\x9a\rZ\tTA\xba\xcc\x15\x1d\x18\x1e\x7fj}\xb5\xc7\x04\xed\xdb\xd7\x90\x99K\xe5I\xa5\xdd\x95\xb2\xeaOB)\x1fj\xe8\x92R\x87\xae'}, @NBD_ATTR_BACKEND_IDENTIFIER={0x4}]}, 0x50}, 0x1, 0x0, 0x0, 0x20000000}, 0x40000)
r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r3, 0x0, 0xcf, 0x0, 0x0)
bpf$ITER_CREATE(0x21, &(0x7f0000001240)={r3}, 0x8)
03:50:44 executing program 3:
ioctl$PPPOEIOCDFWD(0xffffffffffffffff, 0xb101, 0x0)
io_uring_setup(0x27f6, &(0x7f0000000340)={0x0, 0x30ea, 0x100, 0x3, 0x2c4})
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/netfilter\x00')
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='net/mcfilter\x00')
setsockopt$MRT_ASSERT(r1, 0x0, 0xcf, 0x0, 0x0)
ioctl$BLKIOOPT(r0, 0x1279, &(0x7f0000000300))
r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000003c0)='net/ip6_tables_matches\x00')
setsockopt$MRT_DEL_MFC_PROXY(r2, 0x0, 0xd3, &(0x7f0000000400)={@local, @empty, 0x0, "58ec0103e6444a905fcfffabf2645e00c5e966dbfaad9fef080305b286f1227a", 0x2, 0xd622, 0x1, 0x6}, 0x3c)
read$qrtrtun(r1, &(0x7f00000020c0)=""/4093, 0xffd)
r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r3, 0x0, 0xcf, 0x0, 0x0)
write$P9_RCREATE(r3, &(0x7f0000000440)={0x18, 0x73, 0x1, {{0x2, 0x3, 0x8}, 0x8}}, 0x18)
03:50:44 executing program 5:
r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/protocols\x00')
ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f00000001c0)) (async)
bpf$ITER_CREATE(0x21, &(0x7f0000000180)={r0}, 0x8) (async)
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r1, 0x0, 0xcf, 0x0, 0x0) (async)
setsockopt$MRT_TABLE(r1, 0x0, 0xcf, &(0x7f0000000000)=0x1, 0x4) (async)
read$qrtrtun(r0, &(0x7f0000000040)=""/85, 0x55)
read$qrtrtun(r0, &(0x7f00000000c0)=""/156, 0x9c)
03:50:44 executing program 1:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000) (async)
r1 = memfd_secret(0x80000)
write$P9_RATTACH(r1, &(0x7f0000000080)={0x14, 0x69, 0x1, {0x8, 0x3, 0x1}}, 0x14) (async)
setsockopt$MRT_TABLE(0xffffffffffffffff, 0x0, 0xcf, &(0x7f0000001140)=0xff, 0x4) (async)
read$watch_queue(r0, &(0x7f0000001180)=""/178, 0xb2) (async)
r2 = syz_genetlink_get_family_id$nbd(&(0x7f0000000040), 0xffffffffffffffff)
sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, &(0x7f0000001100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000010c0)={&(0x7f00000012c0)={0x50, r2, 0x1, 0x70bd27, 0x25dfdbfe, {}, [@NBD_ATTR_BACKEND_IDENTIFIER={0x38, 0xa, '|\x87/\xa3jt.\xe9((D\x9a\rZ\tTA\xba\xcc\x15\x1d\x18\x1e\x7fj}\xb5\xc7\x04\xed\xdb\xd7\x90\x99K\xe5I\xa5\xdd\x95\xb2\xeaOB)\x1fj\xe8\x92R\x87\xae'}, @NBD_ATTR_BACKEND_IDENTIFIER={0x4}]}, 0x50}, 0x1, 0x0, 0x0, 0x20000000}, 0x40000) (async)
r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r3, 0x0, 0xcf, 0x0, 0x0) (async)
bpf$ITER_CREATE(0x21, &(0x7f0000001240)={r3}, 0x8)
03:50:44 executing program 3:
ioctl$PPPOEIOCDFWD(0xffffffffffffffff, 0xb101, 0x0)
io_uring_setup(0x27f6, &(0x7f0000000340)={0x0, 0x30ea, 0x100, 0x3, 0x2c4})
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/netfilter\x00')
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='net/mcfilter\x00')
setsockopt$MRT_ASSERT(r1, 0x0, 0xcf, 0x0, 0x0)
ioctl$BLKIOOPT(r0, 0x1279, &(0x7f0000000300))
r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000003c0)='net/ip6_tables_matches\x00')
setsockopt$MRT_DEL_MFC_PROXY(r2, 0x0, 0xd3, &(0x7f0000000400)={@local, @empty, 0x0, "58ec0103e6444a905fcfffabf2645e00c5e966dbfaad9fef080305b286f1227a", 0x2, 0xd622, 0x1, 0x6}, 0x3c)
read$qrtrtun(r1, &(0x7f00000020c0)=""/4093, 0xffd)
r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r3, 0x0, 0xcf, 0x0, 0x0)
03:50:44 executing program 4:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='comm\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x102, 0x0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) (async)
r3 = getpid() (async)
r4 = getpid()
kcmp$KCMP_EPOLL_TFD(r4, r3, 0x7, 0xffffffffffffffff, &(0x7f0000001840)) (async)
r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000010c0)='net/dev_snmp6\x00') (async)
ioctl$IOC_WATCH_QUEUE_SET_FILTER(r0, 0x5761, &(0x7f00000012c0)={0x9, 0x0, [{0x9, 0x11d0, 0x5, [0x5, 0xfaf, 0xffffff01, 0x1ff, 0x1000, 0xde1d, 0x3, 0x2]}, {0x9, 0x6, 0x0, [0x7f, 0x1, 0x5, 0x0, 0x5fc, 0x6, 0x5, 0x5]}, {0x7, 0x2, 0xffffffff, [0x6, 0xf8000000, 0x0, 0x7fffffff, 0x9, 0x5, 0x1, 0x3]}, {0x8, 0x94, 0x0, [0xb0c206bc, 0x2, 0x5, 0x3, 0x401, 0x0, 0x25, 0x1]}, {0x3ff, 0x18f, 0xffffff00, [0x3, 0x4, 0x1, 0xac, 0x1f, 0x1000, 0x9, 0x1000]}, {0x100, 0x0, 0xff, [0x2, 0x7f, 0x2, 0x3b, 0xfffffffa, 0x1f, 0x5, 0x246]}, {0x0, 0x4, 0x80, [0x7fff, 0xffffffff, 0x1, 0x9, 0x7, 0x1fffe0, 0xb0, 0xe7]}, {0x7fff, 0x4aae, 0x3, [0x1, 0x3, 0x40, 0x63, 0xff, 0x1, 0x542, 0x1]}, {0x4, 0xf3c2, 0x0, [0x9, 0xffffff80, 0x1, 0x8, 0x8, 0x50a, 0x66ef, 0xdc6]}]})
setsockopt$MRT_ASSERT(r5, 0x0, 0xcf, 0x0, 0x0) (async)
bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000080)={r0, r5, 0x9, 0x0, @void}, 0x10) (async)
timerfd_gettime(r5, &(0x7f0000000040))
syz_open_procfs(r3, &(0x7f0000000000)='net/ip6_tables_matches\x00')
03:50:44 executing program 2:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x5, 0x1, &(0x7f0000001240)=@raw=[@ldst], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:44 executing program 5:
r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/protocols\x00')
ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f00000001c0)) (async)
bpf$ITER_CREATE(0x21, &(0x7f0000000180)={r0}, 0x8)
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r1, 0x0, 0xcf, 0x0, 0x0) (async, rerun: 32)
setsockopt$MRT_TABLE(r1, 0x0, 0xcf, &(0x7f0000000000)=0x1, 0x4) (async, rerun: 32)
read$qrtrtun(r0, &(0x7f0000000040)=""/85, 0x55)
read$qrtrtun(r0, &(0x7f00000000c0)=""/156, 0x9c)
03:50:44 executing program 0:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r1, 0x0, 0xcf, 0x0, 0x0)
accept4$phonet_pipe(r1, &(0x7f0000000000), &(0x7f0000000040)=0x10, 0x80800)
read$qrtrtun(r0, &(0x7f00000012c0)=""/4097, 0x1001)
03:50:44 executing program 1:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
r1 = memfd_secret(0x80000)
write$P9_RATTACH(r1, &(0x7f0000000080)={0x14, 0x69, 0x1, {0x8, 0x3, 0x1}}, 0x14)
setsockopt$MRT_TABLE(0xffffffffffffffff, 0x0, 0xcf, &(0x7f0000001140)=0xff, 0x4)
read$watch_queue(r0, &(0x7f0000001180)=""/178, 0xb2)
r2 = syz_genetlink_get_family_id$nbd(&(0x7f0000000040), 0xffffffffffffffff)
sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, &(0x7f0000001100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000010c0)={&(0x7f00000012c0)={0x50, r2, 0x1, 0x70bd27, 0x25dfdbfe, {}, [@NBD_ATTR_BACKEND_IDENTIFIER={0x38, 0xa, '|\x87/\xa3jt.\xe9((D\x9a\rZ\tTA\xba\xcc\x15\x1d\x18\x1e\x7fj}\xb5\xc7\x04\xed\xdb\xd7\x90\x99K\xe5I\xa5\xdd\x95\xb2\xeaOB)\x1fj\xe8\x92R\x87\xae'}, @NBD_ATTR_BACKEND_IDENTIFIER={0x4}]}, 0x50}, 0x1, 0x0, 0x0, 0x20000000}, 0x40000)
r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r3, 0x0, 0xcf, 0x0, 0x0)
bpf$ITER_CREATE(0x21, &(0x7f0000001240)={r3}, 0x8)
syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00') (async)
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000) (async)
memfd_secret(0x80000) (async)
write$P9_RATTACH(r1, &(0x7f0000000080)={0x14, 0x69, 0x1, {0x8, 0x3, 0x1}}, 0x14) (async)
setsockopt$MRT_TABLE(0xffffffffffffffff, 0x0, 0xcf, &(0x7f0000001140)=0xff, 0x4) (async)
read$watch_queue(r0, &(0x7f0000001180)=""/178, 0xb2) (async)
syz_genetlink_get_family_id$nbd(&(0x7f0000000040), 0xffffffffffffffff) (async)
sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, &(0x7f0000001100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000010c0)={&(0x7f00000012c0)={0x50, r2, 0x1, 0x70bd27, 0x25dfdbfe, {}, [@NBD_ATTR_BACKEND_IDENTIFIER={0x38, 0xa, '|\x87/\xa3jt.\xe9((D\x9a\rZ\tTA\xba\xcc\x15\x1d\x18\x1e\x7fj}\xb5\xc7\x04\xed\xdb\xd7\x90\x99K\xe5I\xa5\xdd\x95\xb2\xeaOB)\x1fj\xe8\x92R\x87\xae'}, @NBD_ATTR_BACKEND_IDENTIFIER={0x4}]}, 0x50}, 0x1, 0x0, 0x0, 0x20000000}, 0x40000) (async)
syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00') (async)
setsockopt$MRT_ASSERT(r3, 0x0, 0xcf, 0x0, 0x0) (async)
bpf$ITER_CREATE(0x21, &(0x7f0000001240)={r3}, 0x8) (async)
03:50:44 executing program 2:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x7, 0x1, &(0x7f0000001240)=@raw=[@ldst], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:44 executing program 5:
r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/protocols\x00')
read$qrtrtun(r0, &(0x7f0000000180)=""/85, 0x55)
read$qrtrtun(r0, &(0x7f00000000c0)=""/156, 0x9c)
03:50:44 executing program 0:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00') (async)
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r1, 0x0, 0xcf, 0x0, 0x0) (async)
accept4$phonet_pipe(r1, &(0x7f0000000000), &(0x7f0000000040)=0x10, 0x80800) (async)
read$qrtrtun(r0, &(0x7f00000012c0)=""/4097, 0x1001)
03:50:44 executing program 3:
ioctl$PPPOEIOCDFWD(0xffffffffffffffff, 0xb101, 0x0)
io_uring_setup(0x27f6, &(0x7f0000000340)={0x0, 0x30ea, 0x100, 0x3, 0x2c4})
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/netfilter\x00')
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='net/mcfilter\x00')
setsockopt$MRT_ASSERT(r1, 0x0, 0xcf, 0x0, 0x0)
ioctl$BLKIOOPT(r0, 0x1279, &(0x7f0000000300))
r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000003c0)='net/ip6_tables_matches\x00')
setsockopt$MRT_DEL_MFC_PROXY(r2, 0x0, 0xd3, &(0x7f0000000400)={@local, @empty, 0x0, "58ec0103e6444a905fcfffabf2645e00c5e966dbfaad9fef080305b286f1227a", 0x2, 0xd622, 0x1, 0x6}, 0x3c)
read$qrtrtun(r1, &(0x7f00000020c0)=""/4093, 0xffd)
syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
03:50:44 executing program 4:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='comm\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x102, 0x0)
r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) (async)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2)
ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2)
getpid() (async)
r3 = getpid()
r4 = getpid()
kcmp$KCMP_EPOLL_TFD(r4, r3, 0x7, 0xffffffffffffffff, &(0x7f0000001840)) (async)
kcmp$KCMP_EPOLL_TFD(r4, r3, 0x7, 0xffffffffffffffff, &(0x7f0000001840))
syz_open_procfs(0xffffffffffffffff, &(0x7f00000010c0)='net/dev_snmp6\x00') (async)
r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000010c0)='net/dev_snmp6\x00')
ioctl$IOC_WATCH_QUEUE_SET_FILTER(r0, 0x5761, &(0x7f00000012c0)={0x9, 0x0, [{0x9, 0x11d0, 0x5, [0x5, 0xfaf, 0xffffff01, 0x1ff, 0x1000, 0xde1d, 0x3, 0x2]}, {0x9, 0x6, 0x0, [0x7f, 0x1, 0x5, 0x0, 0x5fc, 0x6, 0x5, 0x5]}, {0x7, 0x2, 0xffffffff, [0x6, 0xf8000000, 0x0, 0x7fffffff, 0x9, 0x5, 0x1, 0x3]}, {0x8, 0x94, 0x0, [0xb0c206bc, 0x2, 0x5, 0x3, 0x401, 0x0, 0x25, 0x1]}, {0x3ff, 0x18f, 0xffffff00, [0x3, 0x4, 0x1, 0xac, 0x1f, 0x1000, 0x9, 0x1000]}, {0x100, 0x0, 0xff, [0x2, 0x7f, 0x2, 0x3b, 0xfffffffa, 0x1f, 0x5, 0x246]}, {0x0, 0x4, 0x80, [0x7fff, 0xffffffff, 0x1, 0x9, 0x7, 0x1fffe0, 0xb0, 0xe7]}, {0x7fff, 0x4aae, 0x3, [0x1, 0x3, 0x40, 0x63, 0xff, 0x1, 0x542, 0x1]}, {0x4, 0xf3c2, 0x0, [0x9, 0xffffff80, 0x1, 0x8, 0x8, 0x50a, 0x66ef, 0xdc6]}]})
setsockopt$MRT_ASSERT(r5, 0x0, 0xcf, 0x0, 0x0)
bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000080)={r0, r5, 0x9, 0x0, @void}, 0x10) (async)
bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000080)={r0, r5, 0x9, 0x0, @void}, 0x10)
timerfd_gettime(r5, &(0x7f0000000040))
syz_open_procfs(r3, &(0x7f0000000000)='net/ip6_tables_matches\x00')
03:50:44 executing program 2:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x8, 0x1, &(0x7f0000001240)=@raw=[@ldst], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:44 executing program 5:
r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/protocols\x00')
read$qrtrtun(r0, &(0x7f0000000180)=""/85, 0x55) (async)
read$qrtrtun(r0, &(0x7f00000000c0)=""/156, 0x9c)
03:50:44 executing program 0:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00') (async)
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r1, 0x0, 0xcf, 0x0, 0x0) (async)
accept4$phonet_pipe(r1, &(0x7f0000000000), &(0x7f0000000040)=0x10, 0x80800) (async)
read$qrtrtun(r0, &(0x7f00000012c0)=""/4097, 0x1001)
03:50:44 executing program 2:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x9, 0x1, &(0x7f0000001240)=@raw=[@ldst], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:44 executing program 5:
r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/protocols\x00')
read$qrtrtun(r0, &(0x7f0000000180)=""/85, 0x55)
read$qrtrtun(r0, &(0x7f00000000c0)=""/156, 0x9c)
syz_open_procfs(0x0, &(0x7f0000000200)='net/protocols\x00') (async)
read$qrtrtun(r0, &(0x7f0000000180)=""/85, 0x55) (async)
read$qrtrtun(r0, &(0x7f00000000c0)=""/156, 0x9c) (async)
03:50:44 executing program 0:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
r1 = getpid()
r2 = getpid()
kcmp$KCMP_EPOLL_TFD(r2, r1, 0x7, 0xffffffffffffffff, &(0x7f0000001840))
r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r3, 0x0, 0xcf, 0x0, 0x0)
r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r4, 0x0, 0xcf, 0x0, 0x0)
kcmp$KCMP_EPOLL_TFD(r1, 0xffffffffffffffff, 0x7, r3, &(0x7f0000000000)={r0, r4, 0x20})
03:50:44 executing program 3:
ioctl$PPPOEIOCDFWD(0xffffffffffffffff, 0xb101, 0x0)
io_uring_setup(0x27f6, &(0x7f0000000340)={0x0, 0x30ea, 0x100, 0x3, 0x2c4})
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/netfilter\x00')
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='net/mcfilter\x00')
setsockopt$MRT_ASSERT(r1, 0x0, 0xcf, 0x0, 0x0)
ioctl$BLKIOOPT(r0, 0x1279, &(0x7f0000000300))
r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000003c0)='net/ip6_tables_matches\x00')
setsockopt$MRT_DEL_MFC_PROXY(r2, 0x0, 0xd3, &(0x7f0000000400)={@local, @empty, 0x0, "58ec0103e6444a905fcfffabf2645e00c5e966dbfaad9fef080305b286f1227a", 0x2, 0xd622, 0x1, 0x6}, 0x3c)
read$qrtrtun(r1, &(0x7f00000020c0)=""/4093, 0xffd)
03:50:45 executing program 4:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
memfd_secret(0x80000)
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r1, 0x0, 0xcf, 0x0, 0x0)
ioctl$BTRFS_IOC_START_SYNC(r1, 0x80089418, &(0x7f0000000040))
03:50:45 executing program 0:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000) (async)
r1 = getpid()
r2 = getpid()
kcmp$KCMP_EPOLL_TFD(r2, r1, 0x7, 0xffffffffffffffff, &(0x7f0000001840)) (async, rerun: 32)
r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00') (rerun: 32)
setsockopt$MRT_ASSERT(r3, 0x0, 0xcf, 0x0, 0x0)
r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r4, 0x0, 0xcf, 0x0, 0x0) (async)
kcmp$KCMP_EPOLL_TFD(r1, 0xffffffffffffffff, 0x7, r3, &(0x7f0000000000)={r0, r4, 0x20})
03:50:45 executing program 5:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000200)='net/protocols\x00')
read$qrtrtun(r0, &(0x7f0000000040)=""/85, 0x55)
epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, 0xffffffffffffffff)
read$qrtrtun(r0, &(0x7f00000000c0)=""/141, 0x8d)
03:50:45 executing program 2:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0xa, 0x1, &(0x7f0000001240)=@raw=[@ldst], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:45 executing program 3:
ioctl$PPPOEIOCDFWD(0xffffffffffffffff, 0xb101, 0x0)
io_uring_setup(0x27f6, &(0x7f0000000340)={0x0, 0x30ea, 0x100, 0x3, 0x2c4})
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/netfilter\x00')
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='net/mcfilter\x00')
setsockopt$MRT_ASSERT(r1, 0x0, 0xcf, 0x0, 0x0)
ioctl$BLKIOOPT(r0, 0x1279, &(0x7f0000000300))
syz_open_procfs(0xffffffffffffffff, &(0x7f00000003c0)='net/ip6_tables_matches\x00')
read$qrtrtun(r1, &(0x7f00000020c0)=""/4093, 0xffd)
03:50:45 executing program 5:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000200)='net/protocols\x00')
read$qrtrtun(r0, &(0x7f0000000040)=""/85, 0x55)
epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, 0xffffffffffffffff)
read$qrtrtun(r0, &(0x7f00000000c0)=""/141, 0x8d)
syz_open_procfs(0xffffffffffffffff, &(0x7f0000000200)='net/protocols\x00') (async)
read$qrtrtun(r0, &(0x7f0000000040)=""/85, 0x55) (async)
epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, 0xffffffffffffffff) (async)
read$qrtrtun(r0, &(0x7f00000000c0)=""/141, 0x8d) (async)
03:50:45 executing program 2:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0xb, 0x1, &(0x7f0000001240)=@raw=[@ldst], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:45 executing program 4:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00') (async)
memfd_secret(0x80000)
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000) (async, rerun: 32)
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00') (rerun: 32)
setsockopt$MRT_ASSERT(r1, 0x0, 0xcf, 0x0, 0x0) (async)
ioctl$BTRFS_IOC_START_SYNC(r1, 0x80089418, &(0x7f0000000040))
03:50:45 executing program 0:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000) (async, rerun: 64)
r1 = getpid() (async, rerun: 64)
r2 = getpid()
kcmp$KCMP_EPOLL_TFD(r2, r1, 0x7, 0xffffffffffffffff, &(0x7f0000001840)) (async)
r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r3, 0x0, 0xcf, 0x0, 0x0)
r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r4, 0x0, 0xcf, 0x0, 0x0) (async)
kcmp$KCMP_EPOLL_TFD(r1, 0xffffffffffffffff, 0x7, r3, &(0x7f0000000000)={r0, r4, 0x20})
03:50:45 executing program 5:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000200)='net/protocols\x00')
read$qrtrtun(r0, &(0x7f0000000040)=""/85, 0x55)
epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, 0xffffffffffffffff)
read$qrtrtun(r0, &(0x7f00000000c0)=""/141, 0x8d)
syz_open_procfs(0xffffffffffffffff, &(0x7f0000000200)='net/protocols\x00') (async)
read$qrtrtun(r0, &(0x7f0000000040)=""/85, 0x55) (async)
epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, 0xffffffffffffffff) (async)
read$qrtrtun(r0, &(0x7f00000000c0)=""/141, 0x8d) (async)
03:50:45 executing program 2:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0xc, 0x1, &(0x7f0000001240)=@raw=[@ldst], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:45 executing program 3:
ioctl$PPPOEIOCDFWD(0xffffffffffffffff, 0xb101, 0x0)
io_uring_setup(0x27f6, &(0x7f0000000340)={0x0, 0x30ea, 0x100, 0x3, 0x2c4})
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/netfilter\x00')
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='net/mcfilter\x00')
setsockopt$MRT_ASSERT(r1, 0x0, 0xcf, 0x0, 0x0)
ioctl$BLKIOOPT(r0, 0x1279, &(0x7f0000000300))
read$qrtrtun(r1, &(0x7f00000020c0)=""/4093, 0xffd)
03:50:45 executing program 2:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0xd, 0x1, &(0x7f0000001240)=@raw=[@ldst], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:45 executing program 3:
ioctl$PPPOEIOCDFWD(0xffffffffffffffff, 0xb101, 0x0)
io_uring_setup(0x27f6, &(0x7f0000000340)={0x0, 0x30ea, 0x100, 0x3, 0x2c4})
syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/netfilter\x00')
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='net/mcfilter\x00')
setsockopt$MRT_ASSERT(r0, 0x0, 0xcf, 0x0, 0x0)
read$qrtrtun(r0, &(0x7f00000020c0)=""/4093, 0xffd)
03:50:45 executing program 4:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
memfd_secret(0x80000)
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r1, 0x0, 0xcf, 0x0, 0x0)
ioctl$BTRFS_IOC_START_SYNC(r1, 0x80089418, &(0x7f0000000040))
syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00') (async)
memfd_secret(0x80000) (async)
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000) (async)
syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00') (async)
setsockopt$MRT_ASSERT(r1, 0x0, 0xcf, 0x0, 0x0) (async)
ioctl$BTRFS_IOC_START_SYNC(r1, 0x80089418, &(0x7f0000000040)) (async)
03:50:45 executing program 0:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000040), 0x200)
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r1, 0x0, 0xcf, 0x0, 0x0)
read$qrtrtun(r0, &(0x7f0000002300)=""/4121, 0x1019)
write$qrtrtun(r0, &(0x7f0000000000)="b4", 0x1)
03:50:45 executing program 1:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000010c0)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
r1 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000), 0x123043)
socket$inet_udplite(0x2, 0x2, 0x88)
r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r2, 0x0, 0xcf, 0x0, 0x0)
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000001400)={'syztnl1\x00', &(0x7f0000001380)={'syztnl1\x00', 0x0, 0x29, 0xfd, 0x81, 0xffffffff, 0x40, @empty, @empty, 0x1, 0x700, 0x10001, 0x9}})
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f00000014c0)={'ip6tnl0\x00', &(0x7f0000001440)={'ip6gre0\x00', r3, 0x4, 0xb4, 0xe0, 0x7, 0x4d, @empty, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010101}, 0x1, 0x700, 0xfc1, 0x9}})
write$qrtrtun(r1, &(0x7f0000000040)="d2c3239789bf8f2462c1f6f895b2cf97a3c6b61d3e24e7d241626ec922ec9e89a9b7dc8d4d82c26d4bebc6131ec4e979f43b5c687d6a27ba6c66ea3cea7f22f531fbb4cedc7d63e49df7e777e9970cf5ea98a5b37f29c170", 0x58)
r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
mmap$qrtrtun(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x4010, 0xffffffffffffffff, 0x1f)
r5 = socket$igmp(0x2, 0x3, 0x2)
ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000040)={'ip6gre0\x00', 0x0})
bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', r6}, 0x48)
r7 = syz_open_procfs(0x0, &(0x7f0000001100)='io\x00')
bpf$MAP_CREATE(0x0, &(0x7f0000001140)=@bloom_filter={0x1e, 0x0, 0x8000, 0x200000, 0x0, r0, 0x2, '\x00', r6, r7, 0x1, 0x2, 0x0, 0x9}, 0x48)
bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f00000011c0)={0x4, 0x0}, 0x8)
bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000001200)=r8, 0x4)
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r7, 0x89f1, &(0x7f0000001580)={'ip6tnl0\x00', &(0x7f0000001500)={'syztnl0\x00', r3, 0x4, 0x8, 0x8, 0x8, 0x7d, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @mcast2, 0x0, 0x0, 0x48549ae0, 0xfffffffc}})
bpf$BPF_PROG_QUERY(0x10, &(0x7f00000016c0)={@map=r4, 0x15, 0x1, 0x8aef1e0, &(0x7f00000015c0)=[0x0, 0x0, 0x0], 0x3, 0x0, &(0x7f0000001600)=[0x0], &(0x7f0000001640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000001680)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40)
bpf$BPF_PROG_DETACH(0x9, &(0x7f0000001700)={@ifindex=r9, 0xffffffffffffffff, 0x27, 0x4, 0x0, @link_id=r8, r10}, 0x20)
sendmsg$NFNL_MSG_COMPAT_GET(0xffffffffffffffff, &(0x7f0000001300)={&(0x7f0000001240)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000012c0)={&(0x7f0000001280)={0x2c, 0x0, 0xb, 0x5, 0x0, 0x0, {0x1, 0x0, 0xa}, [@NFTA_COMPAT_REV={0x8, 0x2, 0x1, 0x0, 0x1}, @NFTA_COMPAT_TYPE={0x8, 0x3, 0x1, 0x0, 0x1}, @NFTA_COMPAT_REV={0x8, 0x2, 0x1, 0x0, 0x4}]}, 0x2c}}, 0x440c4)
keyctl$KEYCTL_WATCH_KEY(0x20, 0x0, 0xffffffffffffffff, 0xb2)
setsockopt$MRT_ASSERT(r4, 0x0, 0xcf, 0x0, 0x0)
epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r4)
ioctl$IMSETDEVNAME(r0, 0x80184947, &(0x7f0000001340)={0x800, 'syz0\x00'})
03:50:45 executing program 2:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0xe, 0x1, &(0x7f0000001240)=@raw=[@ldst], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:45 executing program 3:
ioctl$PPPOEIOCDFWD(0xffffffffffffffff, 0xb101, 0x0)
io_uring_setup(0x27f6, &(0x7f0000000340)={0x0, 0x30ea, 0x100, 0x3, 0x2c4})
syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/netfilter\x00')
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='net/mcfilter\x00')
read$qrtrtun(r0, &(0x7f00000020c0)=""/4093, 0xffd)
03:50:45 executing program 0:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000040), 0x200) (async)
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r1, 0x0, 0xcf, 0x0, 0x0) (async, rerun: 64)
read$qrtrtun(r0, &(0x7f0000002300)=""/4121, 0x1019) (async, rerun: 64)
write$qrtrtun(r0, &(0x7f0000000000)="b4", 0x1)
03:50:45 executing program 4:
r0 = getpid()
r1 = getpid()
kcmp$KCMP_EPOLL_TFD(r1, r0, 0x7, 0xffffffffffffffff, &(0x7f0000001840))
getpid()
epoll_create1(0x0)
bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f0000000000)={0x7}, 0x8)
r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r2, 0x0, 0xcf, 0x0, 0x0)
bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000040)={r2, 0x0, 0x25, 0x1c, @val=@kprobe_multi=@addrs={0x1, 0x2, 0x0, &(0x7f00000000c0)=[0x8, 0x7ff], 0x3}}, 0x40)
syz_open_procfs(r1, &(0x7f0000000080)='net/rpc\x00')
03:50:45 executing program 2:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0xf, 0x1, &(0x7f0000001240)=@raw=[@ldst], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:45 executing program 1:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000010c0)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000), 0x123043) (async)
r1 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000), 0x123043)
socket$inet_udplite(0x2, 0x2, 0x88)
syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00') (async)
r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r2, 0x0, 0xcf, 0x0, 0x0) (async)
setsockopt$MRT_ASSERT(r2, 0x0, 0xcf, 0x0, 0x0)
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000001400)={'syztnl1\x00', &(0x7f0000001380)={'syztnl1\x00', 0x0, 0x29, 0xfd, 0x81, 0xffffffff, 0x40, @empty, @empty, 0x1, 0x700, 0x10001, 0x9}}) (async)
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000001400)={'syztnl1\x00', &(0x7f0000001380)={'syztnl1\x00', 0x0, 0x29, 0xfd, 0x81, 0xffffffff, 0x40, @empty, @empty, 0x1, 0x700, 0x10001, 0x9}})
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f00000014c0)={'ip6tnl0\x00', &(0x7f0000001440)={'ip6gre0\x00', r3, 0x4, 0xb4, 0xe0, 0x7, 0x4d, @empty, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010101}, 0x1, 0x700, 0xfc1, 0x9}})
write$qrtrtun(r1, &(0x7f0000000040)="d2c3239789bf8f2462c1f6f895b2cf97a3c6b61d3e24e7d241626ec922ec9e89a9b7dc8d4d82c26d4bebc6131ec4e979f43b5c687d6a27ba6c66ea3cea7f22f531fbb4cedc7d63e49df7e777e9970cf5ea98a5b37f29c170", 0x58)
r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
mmap$qrtrtun(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x4010, 0xffffffffffffffff, 0x1f)
r5 = socket$igmp(0x2, 0x3, 0x2)
ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000040)={'ip6gre0\x00'}) (async)
ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000040)={'ip6gre0\x00', 0x0})
bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', r6}, 0x48)
r7 = syz_open_procfs(0x0, &(0x7f0000001100)='io\x00')
bpf$MAP_CREATE(0x0, &(0x7f0000001140)=@bloom_filter={0x1e, 0x0, 0x8000, 0x200000, 0x0, r0, 0x2, '\x00', r6, r7, 0x1, 0x2, 0x0, 0x9}, 0x48)
bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f00000011c0)={0x4, 0x0}, 0x8)
bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000001200)=r8, 0x4)
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r7, 0x89f1, &(0x7f0000001580)={'ip6tnl0\x00', &(0x7f0000001500)={'syztnl0\x00', r3, 0x4, 0x8, 0x8, 0x8, 0x7d, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @mcast2, 0x0, 0x0, 0x48549ae0, 0xfffffffc}})
bpf$BPF_PROG_QUERY(0x10, &(0x7f00000016c0)={@map=r4, 0x15, 0x1, 0x8aef1e0, &(0x7f00000015c0)=[0x0, 0x0, 0x0], 0x3, 0x0, &(0x7f0000001600)=[0x0], &(0x7f0000001640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000001680)=[0x0, 0x0, 0x0, 0x0, 0x0]}, 0x40) (async)
bpf$BPF_PROG_QUERY(0x10, &(0x7f00000016c0)={@map=r4, 0x15, 0x1, 0x8aef1e0, &(0x7f00000015c0)=[0x0, 0x0, 0x0], 0x3, 0x0, &(0x7f0000001600)=[0x0], &(0x7f0000001640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000001680)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40)
bpf$BPF_PROG_DETACH(0x9, &(0x7f0000001700)={@ifindex=r9, 0xffffffffffffffff, 0x27, 0x4, 0x0, @link_id=r8, r10}, 0x20) (async)
bpf$BPF_PROG_DETACH(0x9, &(0x7f0000001700)={@ifindex=r9, 0xffffffffffffffff, 0x27, 0x4, 0x0, @link_id=r8, r10}, 0x20)
sendmsg$NFNL_MSG_COMPAT_GET(0xffffffffffffffff, &(0x7f0000001300)={&(0x7f0000001240)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000012c0)={&(0x7f0000001280)={0x2c, 0x0, 0xb, 0x5, 0x0, 0x0, {0x1, 0x0, 0xa}, [@NFTA_COMPAT_REV={0x8, 0x2, 0x1, 0x0, 0x1}, @NFTA_COMPAT_TYPE={0x8, 0x3, 0x1, 0x0, 0x1}, @NFTA_COMPAT_REV={0x8, 0x2, 0x1, 0x0, 0x4}]}, 0x2c}}, 0x440c4)
keyctl$KEYCTL_WATCH_KEY(0x20, 0x0, 0xffffffffffffffff, 0xb2)
setsockopt$MRT_ASSERT(r4, 0x0, 0xcf, 0x0, 0x0)
epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r4) (async)
epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r4)
ioctl$IMSETDEVNAME(r0, 0x80184947, &(0x7f0000001340)={0x800, 'syz0\x00'})
03:50:45 executing program 4:
r0 = getpid() (async)
r1 = getpid()
kcmp$KCMP_EPOLL_TFD(r1, r0, 0x7, 0xffffffffffffffff, &(0x7f0000001840))
getpid() (async)
epoll_create1(0x0) (async)
bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f0000000000)={0x7}, 0x8) (async)
r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r2, 0x0, 0xcf, 0x0, 0x0) (async)
bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000040)={r2, 0x0, 0x25, 0x1c, @val=@kprobe_multi=@addrs={0x1, 0x2, 0x0, &(0x7f00000000c0)=[0x8, 0x7ff], 0x3}}, 0x40) (async)
syz_open_procfs(r1, &(0x7f0000000080)='net/rpc\x00')
03:50:45 executing program 3:
ioctl$PPPOEIOCDFWD(0xffffffffffffffff, 0xb101, 0x0)
io_uring_setup(0x27f6, &(0x7f0000000340)={0x0, 0x30ea, 0x100, 0x3, 0x2c4})
syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/netfilter\x00')
read$qrtrtun(0xffffffffffffffff, &(0x7f00000020c0)=""/4093, 0xffd)
03:50:45 executing program 0:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000040), 0x200)
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r1, 0x0, 0xcf, 0x0, 0x0)
read$qrtrtun(r0, &(0x7f0000002300)=""/4121, 0x1019)
write$qrtrtun(r0, &(0x7f0000000000)="b4", 0x1)
syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00') (async)
openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000040), 0x200) (async)
syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00') (async)
setsockopt$MRT_ASSERT(r1, 0x0, 0xcf, 0x0, 0x0) (async)
read$qrtrtun(r0, &(0x7f0000002300)=""/4121, 0x1019) (async)
write$qrtrtun(r0, &(0x7f0000000000)="b4", 0x1) (async)
03:50:45 executing program 2:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x10, 0x1, &(0x7f0000001240)=@raw=[@ldst], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:45 executing program 3:
ioctl$PPPOEIOCDFWD(0xffffffffffffffff, 0xb101, 0x0)
io_uring_setup(0x27f6, &(0x7f0000000340)={0x0, 0x30ea, 0x100, 0x3, 0x2c4})
syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/netfilter\x00')
read$qrtrtun(0xffffffffffffffff, &(0x7f00000020c0)=""/4093, 0xffd)
03:50:45 executing program 4:
r0 = getpid()
r1 = getpid()
kcmp$KCMP_EPOLL_TFD(r1, r0, 0x7, 0xffffffffffffffff, &(0x7f0000001840))
getpid()
epoll_create1(0x0)
bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f0000000000)={0x7}, 0x8)
r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r2, 0x0, 0xcf, 0x0, 0x0)
bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000040)={r2, 0x0, 0x25, 0x1c, @val=@kprobe_multi=@addrs={0x1, 0x2, 0x0, &(0x7f00000000c0)=[0x8, 0x7ff], 0x3}}, 0x40)
syz_open_procfs(r1, &(0x7f0000000080)='net/rpc\x00')
getpid() (async)
getpid() (async)
kcmp$KCMP_EPOLL_TFD(r1, r0, 0x7, 0xffffffffffffffff, &(0x7f0000001840)) (async)
getpid() (async)
epoll_create1(0x0) (async)
bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f0000000000)={0x7}, 0x8) (async)
syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00') (async)
setsockopt$MRT_ASSERT(r2, 0x0, 0xcf, 0x0, 0x0) (async)
bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000040)={r2, 0x0, 0x25, 0x1c, @val=@kprobe_multi=@addrs={0x1, 0x2, 0x0, &(0x7f00000000c0)=[0x8, 0x7ff], 0x3}}, 0x40) (async)
syz_open_procfs(r1, &(0x7f0000000080)='net/rpc\x00') (async)
03:50:45 executing program 1:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000010c0)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
r1 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000), 0x123043) (async)
socket$inet_udplite(0x2, 0x2, 0x88)
r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r2, 0x0, 0xcf, 0x0, 0x0) (async, rerun: 32)
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000001400)={'syztnl1\x00', &(0x7f0000001380)={'syztnl1\x00', 0x0, 0x29, 0xfd, 0x81, 0xffffffff, 0x40, @empty, @empty, 0x1, 0x700, 0x10001, 0x9}}) (rerun: 32)
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f00000014c0)={'ip6tnl0\x00', &(0x7f0000001440)={'ip6gre0\x00', r3, 0x4, 0xb4, 0xe0, 0x7, 0x4d, @empty, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010101}, 0x1, 0x700, 0xfc1, 0x9}})
write$qrtrtun(r1, &(0x7f0000000040)="d2c3239789bf8f2462c1f6f895b2cf97a3c6b61d3e24e7d241626ec922ec9e89a9b7dc8d4d82c26d4bebc6131ec4e979f43b5c687d6a27ba6c66ea3cea7f22f531fbb4cedc7d63e49df7e777e9970cf5ea98a5b37f29c170", 0x58) (async)
r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00') (async)
mmap$qrtrtun(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x4010, 0xffffffffffffffff, 0x1f) (async)
r5 = socket$igmp(0x2, 0x3, 0x2)
ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000040)={'ip6gre0\x00', 0x0})
bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', r6}, 0x48) (async, rerun: 32)
r7 = syz_open_procfs(0x0, &(0x7f0000001100)='io\x00') (rerun: 32)
bpf$MAP_CREATE(0x0, &(0x7f0000001140)=@bloom_filter={0x1e, 0x0, 0x8000, 0x200000, 0x0, r0, 0x2, '\x00', r6, r7, 0x1, 0x2, 0x0, 0x9}, 0x48) (async, rerun: 64)
bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f00000011c0)={0x4, 0x0}, 0x8) (rerun: 64)
bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000001200)=r8, 0x4)
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r7, 0x89f1, &(0x7f0000001580)={'ip6tnl0\x00', &(0x7f0000001500)={'syztnl0\x00', r3, 0x4, 0x8, 0x8, 0x8, 0x7d, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @mcast2, 0x0, 0x0, 0x48549ae0, 0xfffffffc}}) (async)
bpf$BPF_PROG_QUERY(0x10, &(0x7f00000016c0)={@map=r4, 0x15, 0x1, 0x8aef1e0, &(0x7f00000015c0)=[0x0, 0x0, 0x0], 0x3, 0x0, &(0x7f0000001600)=[0x0], &(0x7f0000001640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000001680)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40)
bpf$BPF_PROG_DETACH(0x9, &(0x7f0000001700)={@ifindex=r9, 0xffffffffffffffff, 0x27, 0x4, 0x0, @link_id=r8, r10}, 0x20) (async)
sendmsg$NFNL_MSG_COMPAT_GET(0xffffffffffffffff, &(0x7f0000001300)={&(0x7f0000001240)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000012c0)={&(0x7f0000001280)={0x2c, 0x0, 0xb, 0x5, 0x0, 0x0, {0x1, 0x0, 0xa}, [@NFTA_COMPAT_REV={0x8, 0x2, 0x1, 0x0, 0x1}, @NFTA_COMPAT_TYPE={0x8, 0x3, 0x1, 0x0, 0x1}, @NFTA_COMPAT_REV={0x8, 0x2, 0x1, 0x0, 0x4}]}, 0x2c}}, 0x440c4) (async)
keyctl$KEYCTL_WATCH_KEY(0x20, 0x0, 0xffffffffffffffff, 0xb2) (async)
setsockopt$MRT_ASSERT(r4, 0x0, 0xcf, 0x0, 0x0) (async)
epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r4) (async)
ioctl$IMSETDEVNAME(r0, 0x80184947, &(0x7f0000001340)={0x800, 'syz0\x00'})
03:50:45 executing program 4:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
r1 = syz_open_procfs(0x0, &(0x7f0000000000)='smaps\x00')
epoll_wait(r1, &(0x7f0000001100)=[{}, {}, {}, {}, {}, {}], 0x6, 0x813)
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000080)={r1}, 0xffffffffffffff6d)
r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r4, 0x0, 0xcf, 0x0, 0x0)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r4, 0x84, 0x64, &(0x7f0000001200)=[@in6={0xa, 0x4e20, 0x7ff, @mcast2, 0xffff}, @in={0x2, 0x4e21, @loopback}], 0x2c)
r5 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000040), 0x400100, 0x0)
setsockopt$MRT_ASSERT(r3, 0x0, 0xcf, 0x0, 0x0)
r6 = getpid()
r7 = getpid()
r8 = getpid()
kcmp$KCMP_EPOLL_TFD(r8, r7, 0x7, 0xffffffffffffffff, &(0x7f0000001840))
r9 = openat$bsg(0xffffffffffffff9c, &(0x7f0000001180), 0x50000, 0x0)
kcmp$KCMP_EPOLL_TFD(r6, r8, 0x7, r5, &(0x7f00000011c0)={r9, 0xffffffffffffffff, 0xc457})
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r2, 0xc018937b, &(0x7f00000010c0)={{0x1, 0x1, 0x18, r3, {0xffffffffffffffff, 0xffffffffffffffff}}, './file0\x00'})
03:50:45 executing program 3:
ioctl$PPPOEIOCDFWD(0xffffffffffffffff, 0xb101, 0x0)
io_uring_setup(0x27f6, &(0x7f0000000340)={0x0, 0x30ea, 0x100, 0x3, 0x2c4})
syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/netfilter\x00')
read$qrtrtun(0xffffffffffffffff, &(0x7f00000020c0)=""/4093, 0xffd)
03:50:45 executing program 0:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
r1 = getpid()
ioctl$BLKSECTGET(r0, 0x1267, &(0x7f0000000040))
r2 = epoll_create(0x0)
kcmp$KCMP_EPOLL_TFD(r1, 0x0, 0x7, r0, &(0x7f0000000000)={r2, r0, 0x1})
03:50:45 executing program 2:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x11, 0x1, &(0x7f0000001240)=@raw=[@ldst], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:45 executing program 0:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000) (async)
r1 = getpid() (async)
ioctl$BLKSECTGET(r0, 0x1267, &(0x7f0000000040))
r2 = epoll_create(0x0)
kcmp$KCMP_EPOLL_TFD(r1, 0x0, 0x7, r0, &(0x7f0000000000)={r2, r0, 0x1})
03:50:45 executing program 3:
ioctl$PPPOEIOCDFWD(0xffffffffffffffff, 0xb101, 0x0)
io_uring_setup(0x27f6, &(0x7f0000000340)={0x0, 0x30ea, 0x100, 0x3, 0x2c4})
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='net/mcfilter\x00')
read$qrtrtun(r0, &(0x7f00000020c0)=""/4093, 0xffd)
03:50:45 executing program 2:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x12, 0x1, &(0x7f0000001240)=@raw=[@ldst], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:45 executing program 4:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
r1 = syz_open_procfs(0x0, &(0x7f0000000000)='smaps\x00')
epoll_wait(r1, &(0x7f0000001100)=[{}, {}, {}, {}, {}, {}], 0x6, 0x813)
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000) (async)
r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000080)={r1}, 0xffffffffffffff6d) (async, rerun: 32)
r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00') (async, rerun: 32)
r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r4, 0x0, 0xcf, 0x0, 0x0)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r4, 0x84, 0x64, &(0x7f0000001200)=[@in6={0xa, 0x4e20, 0x7ff, @mcast2, 0xffff}, @in={0x2, 0x4e21, @loopback}], 0x2c) (async)
r5 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000040), 0x400100, 0x0) (async, rerun: 64)
setsockopt$MRT_ASSERT(r3, 0x0, 0xcf, 0x0, 0x0) (async, rerun: 64)
r6 = getpid()
r7 = getpid() (async)
r8 = getpid()
kcmp$KCMP_EPOLL_TFD(r8, r7, 0x7, 0xffffffffffffffff, &(0x7f0000001840)) (async, rerun: 64)
r9 = openat$bsg(0xffffffffffffff9c, &(0x7f0000001180), 0x50000, 0x0) (rerun: 64)
kcmp$KCMP_EPOLL_TFD(r6, r8, 0x7, r5, &(0x7f00000011c0)={r9, 0xffffffffffffffff, 0xc457}) (async)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r2, 0xc018937b, &(0x7f00000010c0)={{0x1, 0x1, 0x18, r3, {0xffffffffffffffff, 0xffffffffffffffff}}, './file0\x00'})
03:50:45 executing program 1:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x200002, 0x0)
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
write$P9_RATTACH(r0, &(0x7f0000000040)={0x14, 0x69, 0x2, {0x0, 0x4, 0x5}}, 0x14)
03:50:45 executing program 2:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x13, 0x1, &(0x7f0000001240)=@raw=[@ldst], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:45 executing program 0:
syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00') (async)
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
r1 = getpid()
ioctl$BLKSECTGET(r0, 0x1267, &(0x7f0000000040))
r2 = epoll_create(0x0)
kcmp$KCMP_EPOLL_TFD(r1, 0x0, 0x7, r0, &(0x7f0000000000)={r2, r0, 0x1}) (async)
kcmp$KCMP_EPOLL_TFD(r1, 0x0, 0x7, r0, &(0x7f0000000000)={r2, r0, 0x1})
03:50:45 executing program 3:
ioctl$PPPOEIOCDFWD(0xffffffffffffffff, 0xb101, 0x0)
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='net/mcfilter\x00')
read$qrtrtun(r0, &(0x7f00000020c0)=""/4093, 0xffd)
03:50:45 executing program 5:
r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/protocols\x00')
read$qrtrtun(r0, &(0x7f0000000040)=""/85, 0x55)
r1 = getuid()
getresuid(&(0x7f0000000000)=0x0, &(0x7f00000000c0), &(0x7f0000000100))
write$P9_RSTATu(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="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", @ANYRES32=r1, @ANYRES32=0xee01, @ANYRES32=r2], 0x66)
read$qrtrtun(r0, &(0x7f0000000240)=""/152, 0x98)
pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000)
r4 = getegid()
write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000100)={0x5e, 0x7d, 0x1, {{0x0, 0x42, 0x2, 0x400, {0x4, 0x1, 0x4}, 0x680000, 0x7fffffff, 0x1, 0x5, 0x8, 'ip6gre0\x00', 0x0, '', 0x7, '-].^^\\-'}, 0x7, '@/,,]}*', 0xffffffffffffffff, r4, 0xee00}}, 0x5e)
statx(r0, &(0x7f0000000180)='./file0\x00', 0x2000, 0x2, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0})
r6 = getegid()
write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000100)={0x5e, 0x7d, 0x1, {{0x0, 0x42, 0x2, 0x400, {0x4, 0x1, 0x4}, 0x680000, 0x7fffffff, 0x1, 0x5, 0x8, 'ip6gre0\x00', 0x0, '', 0x7, '-].^^\\-'}, 0x7, '@/,,]}*', 0xffffffffffffffff, r6, 0xee00}}, 0x5e)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r3, {r1, r6}}, './file0\x00'})
write$P9_RSTATu(r3, &(0x7f0000000580)={0x5f, 0x7d, 0x2, {{0x0, 0x46, 0x8, 0x4, {0x4, 0x4, 0x8}, 0x0, 0x5, 0x8, 0x5, 0x0, '', 0x2, '+{', 0x3, '+{\'', 0xe, 'net/protocols\x00'}, 0x4, '-.--', r1, r4, r5}}, 0x5f)
03:50:45 executing program 1:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x200002, 0x0) (async, rerun: 32)
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000) (rerun: 32)
write$P9_RATTACH(r0, &(0x7f0000000040)={0x14, 0x69, 0x2, {0x0, 0x4, 0x5}}, 0x14)
03:50:45 executing program 2:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x15, 0x1, &(0x7f0000001240)=@raw=[@ldst], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:45 executing program 4:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
r1 = syz_open_procfs(0x0, &(0x7f0000000000)='smaps\x00')
epoll_wait(r1, &(0x7f0000001100)=[{}, {}, {}, {}, {}, {}], 0x6, 0x813)
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000) (async)
r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000080)={r1}, 0xffffffffffffff6d)
r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00') (async)
r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r4, 0x0, 0xcf, 0x0, 0x0)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r4, 0x84, 0x64, &(0x7f0000001200)=[@in6={0xa, 0x4e20, 0x7ff, @mcast2, 0xffff}, @in={0x2, 0x4e21, @loopback}], 0x2c)
r5 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000040), 0x400100, 0x0) (async)
setsockopt$MRT_ASSERT(r3, 0x0, 0xcf, 0x0, 0x0)
r6 = getpid() (async)
r7 = getpid() (async)
r8 = getpid()
kcmp$KCMP_EPOLL_TFD(r8, r7, 0x7, 0xffffffffffffffff, &(0x7f0000001840))
r9 = openat$bsg(0xffffffffffffff9c, &(0x7f0000001180), 0x50000, 0x0)
kcmp$KCMP_EPOLL_TFD(r6, r8, 0x7, r5, &(0x7f00000011c0)={r9, 0xffffffffffffffff, 0xc457}) (async, rerun: 32)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r2, 0xc018937b, &(0x7f00000010c0)={{0x1, 0x1, 0x18, r3, {0xffffffffffffffff, 0xffffffffffffffff}}, './file0\x00'}) (rerun: 32)
03:50:45 executing program 0:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='limits\x00')
read$qrtrtun(r0, &(0x7f00000012c0)=""/4089, 0xff9)
03:50:45 executing program 5:
r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/protocols\x00')
read$qrtrtun(r0, &(0x7f0000000040)=""/85, 0x55) (async, rerun: 64)
r1 = getuid() (rerun: 64)
getresuid(&(0x7f0000000000)=0x0, &(0x7f00000000c0), &(0x7f0000000100))
write$P9_RSTATu(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="660000007d0200000043000400020000001003000000b4dd000000000000000008021f000000060000006f9411dd0615bc6b81a2cb11e5ef0a0000000000000100270e006e65742f70726f746f636f6c7300000001002e0e006e65742f70726f746f626f6c7300ec55d0d5562d9a553aa0927d285262a8a82604abcb4ef72f274c2a6e9c7935ca5be0e6ac9effb482ebb5e181a74f69b9c7e646df717ba40b591ef894df279799ef558758e93536c461b72b7308243624cbcf4f665c32b90cbf83d669164fb75b182facc371f35bd0f4c8d7e488b76c7636f3e6fb4462c26270ccd5c186cb03fb0446010c2e5d6e626b088a177dd1be0c8342d7cb23ff737c30d8f38e16faf1319e193baa810296244be1e9516c7e3530822175e42605bd6a16f00a85e51436e22f79ccd5f201edf12eb068b439fa7b", @ANYRES32=r1, @ANYRES32=0xee01, @ANYRES32=r2], 0x66) (async)
read$qrtrtun(r0, &(0x7f0000000240)=""/152, 0x98) (async, rerun: 64)
pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) (async, rerun: 64)
r4 = getegid()
write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000100)={0x5e, 0x7d, 0x1, {{0x0, 0x42, 0x2, 0x400, {0x4, 0x1, 0x4}, 0x680000, 0x7fffffff, 0x1, 0x5, 0x8, 'ip6gre0\x00', 0x0, '', 0x7, '-].^^\\-'}, 0x7, '@/,,]}*', 0xffffffffffffffff, r4, 0xee00}}, 0x5e) (async)
statx(r0, &(0x7f0000000180)='./file0\x00', 0x2000, 0x2, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) (async)
r6 = getegid()
write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000100)={0x5e, 0x7d, 0x1, {{0x0, 0x42, 0x2, 0x400, {0x4, 0x1, 0x4}, 0x680000, 0x7fffffff, 0x1, 0x5, 0x8, 'ip6gre0\x00', 0x0, '', 0x7, '-].^^\\-'}, 0x7, '@/,,]}*', 0xffffffffffffffff, r6, 0xee00}}, 0x5e) (async)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r3, {r1, r6}}, './file0\x00'})
write$P9_RSTATu(r3, &(0x7f0000000580)={0x5f, 0x7d, 0x2, {{0x0, 0x46, 0x8, 0x4, {0x4, 0x4, 0x8}, 0x0, 0x5, 0x8, 0x5, 0x0, '', 0x2, '+{', 0x3, '+{\'', 0xe, 'net/protocols\x00'}, 0x4, '-.--', r1, r4, r5}}, 0x5f)
03:50:45 executing program 3:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='net/mcfilter\x00')
read$qrtrtun(r0, &(0x7f00000020c0)=""/4093, 0xffd)
03:50:45 executing program 2:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x16, 0x1, &(0x7f0000001240)=@raw=[@ldst], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:45 executing program 1:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x200002, 0x0) (async)
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
write$P9_RATTACH(r0, &(0x7f0000000040)={0x14, 0x69, 0x2, {0x0, 0x4, 0x5}}, 0x14)
03:50:45 executing program 3:
r0 = syz_open_procfs(0xffffffffffffffff, 0x0)
read$qrtrtun(r0, &(0x7f00000020c0)=""/4093, 0xffd)
03:50:45 executing program 4:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
write$qrtrtun(r0, &(0x7f0000001140)="9fb2eca919ad66847fdf2e59", 0xc)
bpf$BPF_PROG_QUERY(0x10, &(0x7f0000001100)={@map=r0, 0x1e, 0x1, 0x8, &(0x7f0000000000)=[0x0], 0x1, 0x0, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000010c0)=[0x0, 0x0, 0x0, 0x0]}, 0x40)
03:50:45 executing program 2:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x17, 0x1, &(0x7f0000001240)=@raw=[@ldst], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:45 executing program 0:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='limits\x00')
read$qrtrtun(r0, &(0x7f00000012c0)=""/4089, 0xff9) (async)
read$qrtrtun(r0, &(0x7f00000012c0)=""/4089, 0xff9)
03:50:45 executing program 5:
r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/protocols\x00')
read$qrtrtun(r0, &(0x7f0000000040)=""/85, 0x55)
r1 = getuid() (async, rerun: 32)
getresuid(&(0x7f0000000000)=0x0, &(0x7f00000000c0), &(0x7f0000000100)) (rerun: 32)
write$P9_RSTATu(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="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", @ANYRES32=r1, @ANYRES32=0xee01, @ANYRES32=r2], 0x66)
read$qrtrtun(r0, &(0x7f0000000240)=""/152, 0x98) (async, rerun: 64)
pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) (async, rerun: 64)
r4 = getegid()
write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000100)={0x5e, 0x7d, 0x1, {{0x0, 0x42, 0x2, 0x400, {0x4, 0x1, 0x4}, 0x680000, 0x7fffffff, 0x1, 0x5, 0x8, 'ip6gre0\x00', 0x0, '', 0x7, '-].^^\\-'}, 0x7, '@/,,]}*', 0xffffffffffffffff, r4, 0xee00}}, 0x5e) (async, rerun: 32)
statx(r0, &(0x7f0000000180)='./file0\x00', 0x2000, 0x2, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) (rerun: 32)
r6 = getegid()
write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000100)={0x5e, 0x7d, 0x1, {{0x0, 0x42, 0x2, 0x400, {0x4, 0x1, 0x4}, 0x680000, 0x7fffffff, 0x1, 0x5, 0x8, 'ip6gre0\x00', 0x0, '', 0x7, '-].^^\\-'}, 0x7, '@/,,]}*', 0xffffffffffffffff, r6, 0xee00}}, 0x5e)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r3, {r1, r6}}, './file0\x00'})
write$P9_RSTATu(r3, &(0x7f0000000580)={0x5f, 0x7d, 0x2, {{0x0, 0x46, 0x8, 0x4, {0x4, 0x4, 0x8}, 0x0, 0x5, 0x8, 0x5, 0x0, '', 0x2, '+{', 0x3, '+{\'', 0xe, 'net/protocols\x00'}, 0x4, '-.--', r1, r4, r5}}, 0x5f)
03:50:45 executing program 3:
r0 = syz_open_procfs(0xffffffffffffffff, 0x0)
read$qrtrtun(r0, &(0x7f00000020c0)=""/4093, 0xffd)
03:50:45 executing program 2:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x18, 0x1, &(0x7f0000001240)=@raw=[@ldst], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:45 executing program 1:
syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
pipe2$watch_queue(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80)
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
03:50:45 executing program 4:
syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00') (async)
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
write$qrtrtun(r0, &(0x7f0000001140)="9fb2eca919ad66847fdf2e59", 0xc)
bpf$BPF_PROG_QUERY(0x10, &(0x7f0000001100)={@map=r0, 0x1e, 0x1, 0x8, &(0x7f0000000000)=[0x0], 0x1, 0x0, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000010c0)=[0x0, 0x0, 0x0, 0x0]}, 0x40)
03:50:45 executing program 0:
syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='limits\x00') (async)
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='limits\x00')
read$qrtrtun(r0, &(0x7f00000012c0)=""/4089, 0xff9)
03:50:45 executing program 3:
r0 = syz_open_procfs(0xffffffffffffffff, 0x0)
read$qrtrtun(r0, &(0x7f00000020c0)=""/4093, 0xffd)
03:50:45 executing program 2:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x19, 0x1, &(0x7f0000001240)=@raw=[@ldst], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:45 executing program 4:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000) (async, rerun: 64)
write$qrtrtun(r0, &(0x7f0000001140)="9fb2eca919ad66847fdf2e59", 0xc) (rerun: 64)
bpf$BPF_PROG_QUERY(0x10, &(0x7f0000001100)={@map=r0, 0x1e, 0x1, 0x8, &(0x7f0000000000)=[0x0], 0x1, 0x0, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000010c0)=[0x0, 0x0, 0x0, 0x0]}, 0x40)
03:50:45 executing program 1:
syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
pipe2$watch_queue(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80)
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00') (async)
pipe2$watch_queue(&(0x7f0000000000), 0x80) (async)
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000) (async)
03:50:45 executing program 5:
r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/protocols\x00')
read$qrtrtun(r0, &(0x7f0000000040)=""/85, 0x55)
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r1, 0x0, 0xcf, 0x0, 0x0)
timerfd_gettime(r1, &(0x7f0000000000))
read$qrtrtun(r0, &(0x7f00000000c0)=""/156, 0x9c)
mmap$qrtrtun(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2000002, 0x80010, r0, 0x2)
epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff)
03:50:45 executing program 3:
syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='net/mcfilter\x00')
read$qrtrtun(0xffffffffffffffff, &(0x7f00000020c0)=""/4093, 0xffd)
03:50:45 executing program 0:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r1, 0x0, 0xcf, 0x0, 0x0)
mmap$qrtrtun(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x20010, r1, 0x2)
03:50:45 executing program 2:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x1a, 0x1, &(0x7f0000001240)=@raw=[@ldst], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:45 executing program 1:
syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
pipe2$watch_queue(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80)
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00') (async)
pipe2$watch_queue(&(0x7f0000000000), 0x80) (async)
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000) (async)
03:50:45 executing program 5:
r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/protocols\x00')
read$qrtrtun(r0, &(0x7f0000000040)=""/85, 0x55) (async)
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r1, 0x0, 0xcf, 0x0, 0x0) (async)
timerfd_gettime(r1, &(0x7f0000000000))
read$qrtrtun(r0, &(0x7f00000000c0)=""/156, 0x9c) (async)
mmap$qrtrtun(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2000002, 0x80010, r0, 0x2) (async)
epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff)
03:50:45 executing program 0:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r1, 0x0, 0xcf, 0x0, 0x0)
mmap$qrtrtun(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x20010, r1, 0x2)
03:50:45 executing program 4:
pipe2$watch_queue(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80)
ioctl$BLKFLSBUF(r1, 0x1261, &(0x7f0000000040)=0x8001)
syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
setsockopt$MRT_FLUSH(r0, 0x0, 0xd4, &(0x7f0000000080)=0x1f, 0x4)
r2 = memfd_secret(0x0)
read$qrtrtun(r2, &(0x7f00000012c0)=""/4100, 0x1004)
r3 = getpid()
write$P9_RGETLOCK(r2, &(0x7f00000000c0)={0x24, 0x37, 0x2, {0x1, 0x20, 0x7, r3, 0x6, 'smaps\x00'}}, 0x24)
03:50:45 executing program 2:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x1b, 0x1, &(0x7f0000001240)=@raw=[@ldst], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:45 executing program 3:
syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='net/mcfilter\x00')
read$qrtrtun(0xffffffffffffffff, &(0x7f00000020c0)=""/4093, 0xffd)
03:50:45 executing program 1:
r0 = getpid()
r1 = syz_open_procfs(r0, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r1, &(0x7f00000000c0)=""/4096, 0x1000)
03:50:45 executing program 2:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x1c, 0x1, &(0x7f0000001240)=@raw=[@ldst], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:45 executing program 5:
r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/protocols\x00')
read$qrtrtun(r0, &(0x7f0000000040)=""/85, 0x55)
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r1, 0x0, 0xcf, 0x0, 0x0) (async)
timerfd_gettime(r1, &(0x7f0000000000)) (async)
read$qrtrtun(r0, &(0x7f00000000c0)=""/156, 0x9c)
mmap$qrtrtun(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2000002, 0x80010, r0, 0x2) (async)
epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff)
03:50:45 executing program 4:
pipe2$watch_queue(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80)
ioctl$BLKFLSBUF(r1, 0x1261, &(0x7f0000000040)=0x8001)
syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
setsockopt$MRT_FLUSH(r0, 0x0, 0xd4, &(0x7f0000000080)=0x1f, 0x4)
r2 = memfd_secret(0x0)
read$qrtrtun(r2, &(0x7f00000012c0)=""/4100, 0x1004)
r3 = getpid()
write$P9_RGETLOCK(r2, &(0x7f00000000c0)={0x24, 0x37, 0x2, {0x1, 0x20, 0x7, r3, 0x6, 'smaps\x00'}}, 0x24)
pipe2$watch_queue(&(0x7f0000000100), 0x80) (async)
ioctl$BLKFLSBUF(r1, 0x1261, &(0x7f0000000040)=0x8001) (async)
syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00') (async)
setsockopt$MRT_FLUSH(r0, 0x0, 0xd4, &(0x7f0000000080)=0x1f, 0x4) (async)
memfd_secret(0x0) (async)
read$qrtrtun(r2, &(0x7f00000012c0)=""/4100, 0x1004) (async)
getpid() (async)
write$P9_RGETLOCK(r2, &(0x7f00000000c0)={0x24, 0x37, 0x2, {0x1, 0x20, 0x7, r3, 0x6, 'smaps\x00'}}, 0x24) (async)
03:50:45 executing program 3:
syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='net/mcfilter\x00')
read$qrtrtun(0xffffffffffffffff, &(0x7f00000020c0)=""/4093, 0xffd)
03:50:45 executing program 0:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r1, 0x0, 0xcf, 0x0, 0x0)
mmap$qrtrtun(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x20010, r1, 0x2)
syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00') (async)
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000) (async)
syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00') (async)
setsockopt$MRT_ASSERT(r1, 0x0, 0xcf, 0x0, 0x0) (async)
mmap$qrtrtun(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x20010, r1, 0x2) (async)
03:50:45 executing program 1:
r0 = getpid()
r1 = syz_open_procfs(r0, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r1, &(0x7f00000000c0)=""/4096, 0x1000)
03:50:45 executing program 2:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x1d, 0x1, &(0x7f0000001240)=@raw=[@ldst], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:45 executing program 5:
r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/protocols\x00')
read$qrtrtun(r0, &(0x7f0000000040)=""/85, 0x55)
bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000340)={{r0}, &(0x7f0000000000), &(0x7f0000000300)='%p \x00'}, 0x20)
read$qrtrtun(r0, &(0x7f00000000c0)=""/156, 0x9c)
socket$l2tp(0x2, 0x2, 0x73)
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r1, 0x0, 0xcf, 0x0, 0x0)
read$qrtrtun(r1, &(0x7f0000000180)=""/123, 0x7b)
read$qrtrtun(r0, &(0x7f0000000240)=""/186, 0xba)
socket$phonet(0x23, 0x2, 0x1)
03:50:45 executing program 3:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='net/mcfilter\x00')
read$qrtrtun(r0, 0x0, 0x0)
03:50:45 executing program 0:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000000)={r0}, 0x8)
ioctl$IOC_PR_PREEMPT(r1, 0x401870cb, &(0x7f0000000040)={0x8001, 0x100000001, 0x6, 0x7})
03:50:45 executing program 1:
r0 = getpid()
r1 = syz_open_procfs(r0, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r1, &(0x7f00000000c0)=""/4096, 0x1000)
03:50:45 executing program 2:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x1e, 0x1, &(0x7f0000001240)=@raw=[@ldst], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:45 executing program 1:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='oom_score\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
03:50:45 executing program 4:
pipe2$watch_queue(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80)
ioctl$BLKFLSBUF(r1, 0x1261, &(0x7f0000000040)=0x8001)
syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00') (async)
setsockopt$MRT_FLUSH(r0, 0x0, 0xd4, &(0x7f0000000080)=0x1f, 0x4) (async)
r2 = memfd_secret(0x0)
read$qrtrtun(r2, &(0x7f00000012c0)=""/4100, 0x1004)
r3 = getpid()
write$P9_RGETLOCK(r2, &(0x7f00000000c0)={0x24, 0x37, 0x2, {0x1, 0x20, 0x7, r3, 0x6, 'smaps\x00'}}, 0x24)
03:50:45 executing program 3:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='net/mcfilter\x00')
read$qrtrtun(r0, 0x0, 0x0)
03:50:45 executing program 0:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000) (async)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000000)={r0}, 0x8)
ioctl$IOC_PR_PREEMPT(r1, 0x401870cb, &(0x7f0000000040)={0x8001, 0x100000001, 0x6, 0x7})
03:50:45 executing program 5:
r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/protocols\x00')
read$qrtrtun(r0, &(0x7f0000000040)=""/85, 0x55) (async)
bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000340)={{r0}, &(0x7f0000000000), &(0x7f0000000300)='%p \x00'}, 0x20) (async)
read$qrtrtun(r0, &(0x7f00000000c0)=""/156, 0x9c)
socket$l2tp(0x2, 0x2, 0x73) (async)
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r1, 0x0, 0xcf, 0x0, 0x0) (async)
read$qrtrtun(r1, &(0x7f0000000180)=""/123, 0x7b) (async)
read$qrtrtun(r0, &(0x7f0000000240)=""/186, 0xba) (async)
socket$phonet(0x23, 0x2, 0x1)
03:50:45 executing program 1:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='oom_score\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
03:50:45 executing program 2:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x2, &(0x7f0000001240)=@raw=[@ldst], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:45 executing program 4:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000001100)={r0}, 0x8)
statx(r0, &(0x7f0000001140)='./file0\x00', 0x400, 0x800, &(0x7f0000001180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0})
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r1, 0xc018937b, &(0x7f00000012c0)={{0x1, 0x1, 0x18, r0, {0xffffffffffffffff, r2}}, './file0\x00'})
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
mmap$qrtrtun(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2000000, 0x13, 0xffffffffffffffff, 0x8000)
ioctl$BLKRAGET(r0, 0x1263, &(0x7f00000010c0))
read$qrtrtun(r0, &(0x7f0000000000)=""/143, 0x8f)
03:50:45 executing program 0:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000000)={r0}, 0x8)
ioctl$IOC_PR_PREEMPT(r1, 0x401870cb, &(0x7f0000000040)={0x8001, 0x100000001, 0x6, 0x7})
syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00') (async)
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000) (async)
bpf$ITER_CREATE(0x21, &(0x7f0000000000)={r0}, 0x8) (async)
ioctl$IOC_PR_PREEMPT(r1, 0x401870cb, &(0x7f0000000040)={0x8001, 0x100000001, 0x6, 0x7}) (async)
03:50:45 executing program 3:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='net/mcfilter\x00')
read$qrtrtun(r0, 0x0, 0x0)
03:50:45 executing program 1:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='oom_score\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='oom_score\x00') (async)
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000) (async)
03:50:45 executing program 2:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x3, &(0x7f0000001240)=@raw=[@ldst], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:45 executing program 3:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x1e, 0x1, &(0x7f0000001240)=@raw=[@ldst], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:45 executing program 3:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x1e, 0x1, &(0x7f0000001240)=@raw=[@ldst], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:45 executing program 4:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000001100)={r0}, 0x8) (async)
statx(r0, &(0x7f0000001140)='./file0\x00', 0x400, 0x800, &(0x7f0000001180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0})
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r1, 0xc018937b, &(0x7f00000012c0)={{0x1, 0x1, 0x18, r0, {0xffffffffffffffff, r2}}, './file0\x00'}) (async)
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000) (async)
mmap$qrtrtun(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2000000, 0x13, 0xffffffffffffffff, 0x8000) (async)
ioctl$BLKRAGET(r0, 0x1263, &(0x7f00000010c0))
read$qrtrtun(r0, &(0x7f0000000000)=""/143, 0x8f)
03:50:45 executing program 5:
r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/protocols\x00')
read$qrtrtun(r0, &(0x7f0000000040)=""/85, 0x55) (async, rerun: 64)
bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000340)={{r0}, &(0x7f0000000000), &(0x7f0000000300)='%p \x00'}, 0x20) (rerun: 64)
read$qrtrtun(r0, &(0x7f00000000c0)=""/156, 0x9c) (async)
socket$l2tp(0x2, 0x2, 0x73)
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r1, 0x0, 0xcf, 0x0, 0x0)
read$qrtrtun(r1, &(0x7f0000000180)=""/123, 0x7b)
read$qrtrtun(r0, &(0x7f0000000240)=""/186, 0xba)
socket$phonet(0x23, 0x2, 0x1)
03:50:45 executing program 1:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='environ\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
write$qrtrtun(r0, &(0x7f0000000000)="7d65b75a94930ba6cbd87db0bf75eaf30768b8ef87645f5718e8110cf45a1c8b0f403ae6d2877310b740940b6cf1", 0x2e)
03:50:46 executing program 2:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x4, &(0x7f0000001240)=@raw=[@ldst], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:46 executing program 3:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x1e, 0x1, &(0x7f0000001240)=@raw=[@ldst], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:46 executing program 5:
r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/udplite6\x00')
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f00000001c0)=ANY=[@ANYBLOB="012005000000000000000000", @ANYRES32=r0, @ANYRES32=0xee00, @ANYRES32=0x0, @ANYBLOB='./file0\x00'])
read$qrtrtun(r1, &(0x7f0000000040)=""/99, 0x63)
openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000), 0x80000)
read$qrtrtun(r0, &(0x7f00000000c0)=""/156, 0x9c)
r2 = getpid()
sched_rr_get_interval(r2, &(0x7f0000000180))
03:50:46 executing program 5:
r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/udplite6\x00')
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f00000001c0)=ANY=[@ANYBLOB="012005000000000000000000", @ANYRES32=r0, @ANYRES32=0xee00, @ANYRES32=0x0, @ANYBLOB='./file0\x00'])
read$qrtrtun(r1, &(0x7f0000000040)=""/99, 0x63)
openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000), 0x80000)
read$qrtrtun(r0, &(0x7f00000000c0)=""/156, 0x9c) (async)
r2 = getpid()
sched_rr_get_interval(r2, &(0x7f0000000180))
03:50:46 executing program 1:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='environ\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
write$qrtrtun(r0, &(0x7f0000000000)="7d65b75a94930ba6cbd87db0bf75eaf30768b8ef87645f5718e8110cf45a1c8b0f403ae6d2877310b740940b6cf1", 0x2e)
syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='environ\x00') (async)
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000) (async)
write$qrtrtun(r0, &(0x7f0000000000)="7d65b75a94930ba6cbd87db0bf75eaf30768b8ef87645f5718e8110cf45a1c8b0f403ae6d2877310b740940b6cf1", 0x2e) (async)
03:50:46 executing program 4:
syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00') (async)
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000001100)={r0}, 0x8)
statx(r0, &(0x7f0000001140)='./file0\x00', 0x400, 0x800, &(0x7f0000001180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0})
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r1, 0xc018937b, &(0x7f00000012c0)={{0x1, 0x1, 0x18, r0, {0xffffffffffffffff, r2}}, './file0\x00'})
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
mmap$qrtrtun(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2000000, 0x13, 0xffffffffffffffff, 0x8000) (async)
mmap$qrtrtun(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2000000, 0x13, 0xffffffffffffffff, 0x8000)
ioctl$BLKRAGET(r0, 0x1263, &(0x7f00000010c0))
read$qrtrtun(r0, &(0x7f0000000000)=""/143, 0x8f)
03:50:46 executing program 2:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x5, &(0x7f0000001240)=@raw=[@ldst], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:46 executing program 3:
bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0)
03:50:46 executing program 5:
syz_open_procfs(0x0, &(0x7f0000000200)='net/udplite6\x00') (async)
r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/udplite6\x00')
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f00000001c0)=ANY=[@ANYBLOB="012005000000000000000000", @ANYRES32=r0, @ANYRES32=0xee00, @ANYRES32=0x0, @ANYBLOB='./file0\x00'])
read$qrtrtun(r1, &(0x7f0000000040)=""/99, 0x63)
openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000), 0x80000)
read$qrtrtun(r0, &(0x7f00000000c0)=""/156, 0x9c)
getpid() (async)
r2 = getpid()
sched_rr_get_interval(r2, &(0x7f0000000180))
03:50:46 executing program 3:
bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0)
03:50:46 executing program 4:
read$qrtrtun(0xffffffffffffffff, &(0x7f00000000c0)=""/4096, 0x1000)
ioctl$BLKBSZGET(0xffffffffffffffff, 0x80081270, &(0x7f0000000000))
03:50:46 executing program 1:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='environ\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000) (async)
write$qrtrtun(r0, &(0x7f0000000000)="7d65b75a94930ba6cbd87db0bf75eaf30768b8ef87645f5718e8110cf45a1c8b0f403ae6d2877310b740940b6cf1", 0x2e)
03:50:46 executing program 5:
r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/protocols\x00')
syz_open_dev$loop(&(0x7f0000000000), 0xffffffffffffffc1, 0xdc280)
read$qrtrtun(r0, &(0x7f0000000040)=""/85, 0x55)
read$qrtrtun(r0, &(0x7f0000000240)=""/81, 0x51)
epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r0, &(0x7f0000000180)={0xa})
read$qrtrtun(r0, &(0x7f00000000c0)=""/156, 0x9c)
03:50:46 executing program 1:
r0 = getpid()
r1 = syz_open_procfs(r0, &(0x7f0000000000)='net/vlan/vlan1\x00')
read$qrtrtun(r1, &(0x7f00000000c0)=""/4096, 0x1000)
r2 = syz_open_procfs(r0, &(0x7f0000000040)='net/raw\x00')
sendmsg$IPCTNL_MSG_EXP_DELETE(r2, &(0x7f0000001140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001100)={&(0x7f00000010c0)={0x24, 0x2, 0x2, 0x401, 0x0, 0x0, {0x5, 0x0, 0xa}, [@CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x4}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x1}]}, 0x24}, 0x1, 0x0, 0x0, 0x40448d4}, 0x40)
03:50:46 executing program 2:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0xa, &(0x7f0000001240)=@raw=[@ldst], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:46 executing program 3:
bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0)
03:50:46 executing program 4:
read$qrtrtun(0xffffffffffffffff, &(0x7f00000000c0)=""/4096, 0x1000)
ioctl$BLKBSZGET(0xffffffffffffffff, 0x80081270, &(0x7f0000000000))
03:50:46 executing program 1:
r0 = getpid()
r1 = syz_open_procfs(r0, &(0x7f0000000000)='net/vlan/vlan1\x00')
read$qrtrtun(r1, &(0x7f00000000c0)=""/4096, 0x1000)
r2 = syz_open_procfs(r0, &(0x7f0000000040)='net/raw\x00')
sendmsg$IPCTNL_MSG_EXP_DELETE(r2, &(0x7f0000001140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001100)={&(0x7f00000010c0)={0x24, 0x2, 0x2, 0x401, 0x0, 0x0, {0x5, 0x0, 0xa}, [@CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x4}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x1}]}, 0x24}, 0x1, 0x0, 0x0, 0x40448d4}, 0x40)
03:50:46 executing program 2:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0xb, &(0x7f0000001240)=@raw=[@ldst], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:46 executing program 3:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x1e, 0x0, 0x0, &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:46 executing program 5:
r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/protocols\x00') (async)
syz_open_dev$loop(&(0x7f0000000000), 0xffffffffffffffc1, 0xdc280)
read$qrtrtun(r0, &(0x7f0000000040)=""/85, 0x55)
read$qrtrtun(r0, &(0x7f0000000240)=""/81, 0x51)
epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r0, &(0x7f0000000180)={0xa}) (async)
read$qrtrtun(r0, &(0x7f00000000c0)=""/156, 0x9c)
03:50:46 executing program 3:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x1e, 0x0, 0x0, &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:46 executing program 1:
r0 = getpid()
r1 = syz_open_procfs(r0, &(0x7f0000000000)='net/vlan/vlan1\x00')
read$qrtrtun(r1, &(0x7f00000000c0)=""/4096, 0x1000) (async)
r2 = syz_open_procfs(r0, &(0x7f0000000040)='net/raw\x00')
sendmsg$IPCTNL_MSG_EXP_DELETE(r2, &(0x7f0000001140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001100)={&(0x7f00000010c0)={0x24, 0x2, 0x2, 0x401, 0x0, 0x0, {0x5, 0x0, 0xa}, [@CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x4}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x1}]}, 0x24}, 0x1, 0x0, 0x0, 0x40448d4}, 0x40)
03:50:46 executing program 4:
read$qrtrtun(0xffffffffffffffff, &(0x7f00000000c0)=""/4096, 0x1000) (async)
ioctl$BLKBSZGET(0xffffffffffffffff, 0x80081270, &(0x7f0000000000))
03:50:46 executing program 2:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x14, &(0x7f0000001240)=@raw=[@ldst], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:46 executing program 5:
r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/protocols\x00')
syz_open_dev$loop(&(0x7f0000000000), 0xffffffffffffffc1, 0xdc280)
read$qrtrtun(r0, &(0x7f0000000040)=""/85, 0x55)
read$qrtrtun(r0, &(0x7f0000000240)=""/81, 0x51)
epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r0, &(0x7f0000000180)={0xa})
read$qrtrtun(r0, &(0x7f00000000c0)=""/156, 0x9c)
syz_open_procfs(0x0, &(0x7f0000000200)='net/protocols\x00') (async)
syz_open_dev$loop(&(0x7f0000000000), 0xffffffffffffffc1, 0xdc280) (async)
read$qrtrtun(r0, &(0x7f0000000040)=""/85, 0x55) (async)
read$qrtrtun(r0, &(0x7f0000000240)=""/81, 0x51) (async)
epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r0, &(0x7f0000000180)={0xa}) (async)
read$qrtrtun(r0, &(0x7f00000000c0)=""/156, 0x9c) (async)
03:50:46 executing program 2:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x3a0, &(0x7f0000001240)=@raw=[@ldst], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:46 executing program 3:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x1e, 0x0, 0x0, &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:46 executing program 4:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
ioctl$IOC_WATCH_QUEUE_SET_FILTER(r0, 0x5761, &(0x7f00000010c0)={0x5, 0x0, [{0x81, 0xd07, 0x6, [0x6, 0x8, 0x5, 0x0, 0x7, 0xffffffc1, 0xfffffffb, 0x200]}, {0x401, 0xfffffff7, 0x80000000, [0x2, 0x79, 0x44ea, 0xfff, 0x2, 0x3, 0x9, 0x1]}, {0x1, 0x4, 0x5, [0x0, 0x5, 0x8, 0xffff, 0x8454, 0x8000, 0x0, 0x3f]}, {0x1f, 0x5, 0x2, [0x9, 0x8, 0x6, 0x91, 0x3ff, 0x3, 0x8, 0x6]}, {0x2, 0x8, 0x2, [0x9be, 0x8, 0x1f, 0x8, 0x7, 0x800, 0x6, 0x37]}]})
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0xee01}}, './file0\x00'})
r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz0\x00', 0x200002, 0x0)
bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000080)={0x2, 0x0}, 0x8)
bpf$BPF_LINK_CREATE(0x1c, &(0x7f00000011c0)={r1, r2, 0x1c, 0x0, @val=@tracing={r3, 0x81}}, 0x40)
03:50:46 executing program 2:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x3f7, &(0x7f0000001240)=@raw=[@ldst], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:46 executing program 3:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x1e, 0x0, &(0x7f0000001240), &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:46 executing program 5:
r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/protocols\x00')
read$qrtrtun(r0, &(0x7f0000000040)=""/85, 0x55)
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r1, 0x0, 0xcf, 0x0, 0x0)
ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge0\x00', 0x0})
r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r3, 0x0, 0xcf, 0x0, 0x0)
ioctl$IOC_WATCH_QUEUE_SET_SIZE(r3, 0x5760, 0x0)
r4 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000500)={0x6, 0xc, &(0x7f0000000100)=@framed={{0x18, 0x0, 0x0, 0x0, 0x85, 0x0, 0x0, 0x0, 0x4}, [@map_idx_val={0x18, 0x2, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, @alu={0x4, 0x1, 0x8, 0xa, 0x4, 0xfffffffffffffffc}, @alu={0x7, 0x1, 0x7, 0x7, 0x0, 0x0, 0xffffffffffffffff}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @cb_func={0x18, 0xe, 0x4, 0x0, 0xffffffffffffffff}, @btf_id={0x18, 0xa, 0x3, 0x0, 0x5}]}, &(0x7f0000000000)='syzkaller\x00', 0x1, 0x98, &(0x7f0000000280)=""/152, 0x40f00, 0x8, '\x00', r2, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000400)={0x9, 0x3}, 0x8, 0x10, &(0x7f0000000440)={0x0, 0xb, 0x101, 0x7fff}, 0x10, 0x0, 0x0, 0x1, &(0x7f0000000480)=[r3, r0, r1, 0x1], &(0x7f00000004c0)=[{0x3, 0x2, 0xe, 0x9}], 0x10, 0x7ff}, 0x90)
epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r4, &(0x7f00000005c0)={0x20000002})
ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r1, 0x89f3, &(0x7f0000000240)={'ip6tnl0\x00', &(0x7f0000000180)={'syztnl2\x00', r2, 0x4, 0xd7, 0xbc, 0x3, 0x40, @mcast1, @private0={0xfc, 0x0, '\x00', 0x1}, 0x3c00, 0x10, 0x1, 0x80000001}})
read$qrtrtun(r0, &(0x7f0000000340)=""/145, 0x74)
03:50:46 executing program 2:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x3e00, &(0x7f0000001240)=@raw=[@ldst], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:46 executing program 4:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000) (async)
ioctl$IOC_WATCH_QUEUE_SET_FILTER(r0, 0x5761, &(0x7f00000010c0)={0x5, 0x0, [{0x81, 0xd07, 0x6, [0x6, 0x8, 0x5, 0x0, 0x7, 0xffffffc1, 0xfffffffb, 0x200]}, {0x401, 0xfffffff7, 0x80000000, [0x2, 0x79, 0x44ea, 0xfff, 0x2, 0x3, 0x9, 0x1]}, {0x1, 0x4, 0x5, [0x0, 0x5, 0x8, 0xffff, 0x8454, 0x8000, 0x0, 0x3f]}, {0x1f, 0x5, 0x2, [0x9, 0x8, 0x6, 0x91, 0x3ff, 0x3, 0x8, 0x6]}, {0x2, 0x8, 0x2, [0x9be, 0x8, 0x1f, 0x8, 0x7, 0x800, 0x6, 0x37]}]}) (async)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0xee01}}, './file0\x00'}) (async, rerun: 64)
r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz0\x00', 0x200002, 0x0) (async, rerun: 64)
bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000080)={0x2, 0x0}, 0x8)
bpf$BPF_LINK_CREATE(0x1c, &(0x7f00000011c0)={r1, r2, 0x1c, 0x0, @val=@tracing={r3, 0x81}}, 0x40)
03:50:46 executing program 0:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
syz_io_uring_setup(0xee0, &(0x7f0000000000)={0x0, 0x3132, 0x4, 0x1, 0x113, 0x0, r0}, &(0x7f0000000080)=0x0, &(0x7f00000000c0))
r2 = syz_io_uring_setup(0x3598, &(0x7f0000000100)={0x0, 0xeb7b, 0x400, 0x1, 0x397, 0x0, r0}, &(0x7f0000000180), &(0x7f00000001c0)=0x0)
syz_io_uring_submit(r1, r3, &(0x7f0000000280)=@IORING_OP_OPENAT2={0x1c, 0x40, 0x0, 0xffffffffffffffff, &(0x7f0000000200)={0x200001, 0x82, 0x5}, &(0x7f0000000240)='./file0\x00', 0x18, 0x0, 0x12345})
read$qrtrtun(r0, &(0x7f00000012c0)=""/4096, 0x1000)
socketpair(0x3, 0x3, 0x2, &(0x7f00000004c0)={0xffffffffffffffff})
ioctl$sock_inet6_udp_SIOCOUTQ(r4, 0x5411, &(0x7f0000000500))
syz_io_uring_setup(0x7507, &(0x7f0000000340)={0x0, 0x1440, 0x820, 0x2, 0x30f}, &(0x7f00000003c0)=0x0, &(0x7f0000000400))
r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r6, 0x0, 0xcf, 0x0, 0x0)
r7 = open$dir(&(0x7f0000000480)='./file0\x00', 0x100, 0x1)
syz_io_uring_submit(r5, r3, &(0x7f0000000440)=@IORING_OP_SPLICE={0x1e, 0x4, 0x0, @fd=r7, 0x3, {0x0, r2}, 0x0, 0x2, 0x1, {0x0, 0x0, r6}})
r8 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x40000, 0x0)
write$P9_RMKDIR(r8, &(0x7f0000000300)={0x14, 0x49, 0x1, {0x1, 0x1, 0x5}}, 0x14)
r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r9, 0x0, 0xcf, 0x0, 0x0)
bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000540)={r8, r9, 0x4, r8}, 0x10)
03:50:46 executing program 3:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x1e, 0x0, &(0x7f0000001240), &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:46 executing program 5:
r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/protocols\x00')
read$qrtrtun(r0, &(0x7f0000000040)=""/85, 0x55)
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r1, 0x0, 0xcf, 0x0, 0x0)
ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge0\x00', 0x0})
r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r3, 0x0, 0xcf, 0x0, 0x0) (async)
ioctl$IOC_WATCH_QUEUE_SET_SIZE(r3, 0x5760, 0x0) (async)
r4 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000500)={0x6, 0xc, &(0x7f0000000100)=@framed={{0x18, 0x0, 0x0, 0x0, 0x85, 0x0, 0x0, 0x0, 0x4}, [@map_idx_val={0x18, 0x2, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, @alu={0x4, 0x1, 0x8, 0xa, 0x4, 0xfffffffffffffffc}, @alu={0x7, 0x1, 0x7, 0x7, 0x0, 0x0, 0xffffffffffffffff}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @cb_func={0x18, 0xe, 0x4, 0x0, 0xffffffffffffffff}, @btf_id={0x18, 0xa, 0x3, 0x0, 0x5}]}, &(0x7f0000000000)='syzkaller\x00', 0x1, 0x98, &(0x7f0000000280)=""/152, 0x40f00, 0x8, '\x00', r2, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000400)={0x9, 0x3}, 0x8, 0x10, &(0x7f0000000440)={0x0, 0xb, 0x101, 0x7fff}, 0x10, 0x0, 0x0, 0x1, &(0x7f0000000480)=[r3, r0, r1, 0x1], &(0x7f00000004c0)=[{0x3, 0x2, 0xe, 0x9}], 0x10, 0x7ff}, 0x90)
epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r4, &(0x7f00000005c0)={0x20000002}) (async)
ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r1, 0x89f3, &(0x7f0000000240)={'ip6tnl0\x00', &(0x7f0000000180)={'syztnl2\x00', r2, 0x4, 0xd7, 0xbc, 0x3, 0x40, @mcast1, @private0={0xfc, 0x0, '\x00', 0x1}, 0x3c00, 0x10, 0x1, 0x80000001}})
read$qrtrtun(r0, &(0x7f0000000340)=""/145, 0x74)
03:50:46 executing program 2:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x4c00, &(0x7f0000001240)=@raw=[@ldst], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:46 executing program 4:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
ioctl$IOC_WATCH_QUEUE_SET_FILTER(r0, 0x5761, &(0x7f00000010c0)={0x5, 0x0, [{0x81, 0xd07, 0x6, [0x6, 0x8, 0x5, 0x0, 0x7, 0xffffffc1, 0xfffffffb, 0x200]}, {0x401, 0xfffffff7, 0x80000000, [0x2, 0x79, 0x44ea, 0xfff, 0x2, 0x3, 0x9, 0x1]}, {0x1, 0x4, 0x5, [0x0, 0x5, 0x8, 0xffff, 0x8454, 0x8000, 0x0, 0x3f]}, {0x1f, 0x5, 0x2, [0x9, 0x8, 0x6, 0x91, 0x3ff, 0x3, 0x8, 0x6]}, {0x2, 0x8, 0x2, [0x9be, 0x8, 0x1f, 0x8, 0x7, 0x800, 0x6, 0x37]}]}) (async)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0xee01}}, './file0\x00'})
r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz0\x00', 0x200002, 0x0) (async)
bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000080)={0x2, 0x0}, 0x8)
bpf$BPF_LINK_CREATE(0x1c, &(0x7f00000011c0)={r1, r2, 0x1c, 0x0, @val=@tracing={r3, 0x81}}, 0x40)
03:50:46 executing program 2:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x16c00, &(0x7f0000001240)=@raw=[@ldst], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:46 executing program 3:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x1e, 0x0, &(0x7f0000001240), &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:46 executing program 5:
r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/protocols\x00')
read$qrtrtun(r0, &(0x7f0000000040)=""/85, 0x55) (async)
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r1, 0x0, 0xcf, 0x0, 0x0)
ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge0\x00', 0x0})
r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r3, 0x0, 0xcf, 0x0, 0x0) (async, rerun: 64)
ioctl$IOC_WATCH_QUEUE_SET_SIZE(r3, 0x5760, 0x0) (async, rerun: 64)
r4 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000500)={0x6, 0xc, &(0x7f0000000100)=@framed={{0x18, 0x0, 0x0, 0x0, 0x85, 0x0, 0x0, 0x0, 0x4}, [@map_idx_val={0x18, 0x2, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, @alu={0x4, 0x1, 0x8, 0xa, 0x4, 0xfffffffffffffffc}, @alu={0x7, 0x1, 0x7, 0x7, 0x0, 0x0, 0xffffffffffffffff}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @cb_func={0x18, 0xe, 0x4, 0x0, 0xffffffffffffffff}, @btf_id={0x18, 0xa, 0x3, 0x0, 0x5}]}, &(0x7f0000000000)='syzkaller\x00', 0x1, 0x98, &(0x7f0000000280)=""/152, 0x40f00, 0x8, '\x00', r2, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000400)={0x9, 0x3}, 0x8, 0x10, &(0x7f0000000440)={0x0, 0xb, 0x101, 0x7fff}, 0x10, 0x0, 0x0, 0x1, &(0x7f0000000480)=[r3, r0, r1, 0x1], &(0x7f00000004c0)=[{0x3, 0x2, 0xe, 0x9}], 0x10, 0x7ff}, 0x90)
epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r4, &(0x7f00000005c0)={0x20000002}) (async)
ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r1, 0x89f3, &(0x7f0000000240)={'ip6tnl0\x00', &(0x7f0000000180)={'syztnl2\x00', r2, 0x4, 0xd7, 0xbc, 0x3, 0x40, @mcast1, @private0={0xfc, 0x0, '\x00', 0x1}, 0x3c00, 0x10, 0x1, 0x80000001}})
read$qrtrtun(r0, &(0x7f0000000340)=""/145, 0x74)
03:50:46 executing program 3:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x1e, 0x1, &(0x7f0000001240)=@raw=[@ldst], 0x0, 0xb}, 0x90)
03:50:46 executing program 4:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x20, 0x442d, 0x3, 0x3, 0x24, r0, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2, 0x2}, 0x48)
bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000001100)={{r1}, &(0x7f0000000080), &(0x7f00000010c0)='%p \x00'}, 0x20)
03:50:46 executing program 0:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
syz_io_uring_setup(0xee0, &(0x7f0000000000)={0x0, 0x3132, 0x4, 0x1, 0x113, 0x0, r0}, &(0x7f0000000080)=0x0, &(0x7f00000000c0)) (async, rerun: 32)
r2 = syz_io_uring_setup(0x3598, &(0x7f0000000100)={0x0, 0xeb7b, 0x400, 0x1, 0x397, 0x0, r0}, &(0x7f0000000180), &(0x7f00000001c0)=0x0) (rerun: 32)
syz_io_uring_submit(r1, r3, &(0x7f0000000280)=@IORING_OP_OPENAT2={0x1c, 0x40, 0x0, 0xffffffffffffffff, &(0x7f0000000200)={0x200001, 0x82, 0x5}, &(0x7f0000000240)='./file0\x00', 0x18, 0x0, 0x12345}) (async)
read$qrtrtun(r0, &(0x7f00000012c0)=""/4096, 0x1000)
socketpair(0x3, 0x3, 0x2, &(0x7f00000004c0)={0xffffffffffffffff})
ioctl$sock_inet6_udp_SIOCOUTQ(r4, 0x5411, &(0x7f0000000500))
syz_io_uring_setup(0x7507, &(0x7f0000000340)={0x0, 0x1440, 0x820, 0x2, 0x30f}, &(0x7f00000003c0)=0x0, &(0x7f0000000400))
r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r6, 0x0, 0xcf, 0x0, 0x0)
r7 = open$dir(&(0x7f0000000480)='./file0\x00', 0x100, 0x1)
syz_io_uring_submit(r5, r3, &(0x7f0000000440)=@IORING_OP_SPLICE={0x1e, 0x4, 0x0, @fd=r7, 0x3, {0x0, r2}, 0x0, 0x2, 0x1, {0x0, 0x0, r6}}) (async)
r8 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x40000, 0x0)
write$P9_RMKDIR(r8, &(0x7f0000000300)={0x14, 0x49, 0x1, {0x1, 0x1, 0x5}}, 0x14)
r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r9, 0x0, 0xcf, 0x0, 0x0)
bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000540)={r8, r9, 0x4, r8}, 0x10)
03:50:46 executing program 1:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
syz_io_uring_setup(0x207, &(0x7f0000000000)={0x0, 0x30b8, 0x40, 0x3, 0x168, 0x0, r0}, &(0x7f0000000080), &(0x7f00000010c0)=0x0)
ioctl$SIOCGETSGCNT_IN6(r0, 0x89e1, &(0x7f0000001180)={@private2, @mcast1})
r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r2, 0x0, 0xcf, 0x0, 0x0)
openat$cgroup_type(r2, &(0x7f00000011c0), 0x2, 0x0)
io_uring_setup(0x2182, &(0x7f0000001200)={0x0, 0xb38f, 0x9c, 0x3, 0x34f})
syz_io_uring_submit(0x0, r1, &(0x7f0000001140)=@IORING_OP_UNLINKAT={0x24, 0x4, 0x0, r0, 0x0, &(0x7f0000001100)='./file0\x00', 0x0, 0x200})
03:50:46 executing program 5:
r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/protocols\x00')
read$qrtrtun(r0, &(0x7f0000000040)=""/85, 0x55)
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r1, 0x0, 0xcf, 0x0, 0x0)
memfd_secret(0x80000)
write$qrtrtun(r0, &(0x7f0000000180)="766e3bae1f9eacdeba4b658c04491c8d9b5ccc7c9d1dd7fa0e45cc3af40bbf9cac339cda66c1f9d5b88c798c629804bc81f526e514551e3061c3c869e55c7d", 0x3f)
write$qrtrtun(r1, &(0x7f0000000000)="e83e", 0x2)
read$qrtrtun(r0, &(0x7f00000000c0)=""/156, 0x9c)
03:50:46 executing program 2:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0xf4240, &(0x7f0000001240)=@raw=[@ldst], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:46 executing program 4:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x20, 0x442d, 0x3, 0x3, 0x24, r0, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2, 0x2}, 0x48)
bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000001100)={{r1}, &(0x7f0000000080), &(0x7f00000010c0)='%p \x00'}, 0x20)
syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00') (async)
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000) (async)
bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x20, 0x442d, 0x3, 0x3, 0x24, r0, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2, 0x2}, 0x48) (async)
bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000001100)={{r1}, &(0x7f0000000080), &(0x7f00000010c0)='%p \x00'}, 0x20) (async)
03:50:46 executing program 3:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x1e, 0x1, &(0x7f0000001240)=@raw=[@ldst], 0x0}, 0x90)
03:50:46 executing program 1:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
syz_io_uring_setup(0x207, &(0x7f0000000000)={0x0, 0x30b8, 0x40, 0x3, 0x168, 0x0, r0}, &(0x7f0000000080), &(0x7f00000010c0)=0x0)
ioctl$SIOCGETSGCNT_IN6(r0, 0x89e1, &(0x7f0000001180)={@private2, @mcast1}) (async)
r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r2, 0x0, 0xcf, 0x0, 0x0) (async)
openat$cgroup_type(r2, &(0x7f00000011c0), 0x2, 0x0)
io_uring_setup(0x2182, &(0x7f0000001200)={0x0, 0xb38f, 0x9c, 0x3, 0x34f}) (async)
syz_io_uring_submit(0x0, r1, &(0x7f0000001140)=@IORING_OP_UNLINKAT={0x24, 0x4, 0x0, r0, 0x0, &(0x7f0000001100)='./file0\x00', 0x0, 0x200})
03:50:46 executing program 3:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x16c00, &(0x7f0000001240)=@raw=[@ldst], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:46 executing program 5:
r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/protocols\x00')
read$qrtrtun(r0, &(0x7f0000000040)=""/85, 0x55)
syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00') (async)
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r1, 0x0, 0xcf, 0x0, 0x0)
memfd_secret(0x80000)
write$qrtrtun(r0, &(0x7f0000000180)="766e3bae1f9eacdeba4b658c04491c8d9b5ccc7c9d1dd7fa0e45cc3af40bbf9cac339cda66c1f9d5b88c798c629804bc81f526e514551e3061c3c869e55c7d", 0x3f)
write$qrtrtun(r1, &(0x7f0000000000)="e83e", 0x2) (async)
write$qrtrtun(r1, &(0x7f0000000000)="e83e", 0x2)
read$qrtrtun(r0, &(0x7f00000000c0)=""/156, 0x9c)
03:50:46 executing program 4:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x20, 0x442d, 0x3, 0x3, 0x24, r0, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2, 0x2}, 0x48)
bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000001100)={{r1}, &(0x7f0000000080), &(0x7f00000010c0)='%p \x00'}, 0x20) (async)
bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000001100)={{r1}, &(0x7f0000000080), &(0x7f00000010c0)='%p \x00'}, 0x20)
03:50:46 executing program 5:
r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/protocols\x00')
read$qrtrtun(r0, &(0x7f0000000040)=""/85, 0x55) (async, rerun: 64)
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00') (rerun: 64)
setsockopt$MRT_ASSERT(r1, 0x0, 0xcf, 0x0, 0x0) (async)
memfd_secret(0x80000)
write$qrtrtun(r0, &(0x7f0000000180)="766e3bae1f9eacdeba4b658c04491c8d9b5ccc7c9d1dd7fa0e45cc3af40bbf9cac339cda66c1f9d5b88c798c629804bc81f526e514551e3061c3c869e55c7d", 0x3f) (async)
write$qrtrtun(r1, &(0x7f0000000000)="e83e", 0x2) (async)
read$qrtrtun(r0, &(0x7f00000000c0)=""/156, 0x9c)
03:50:46 executing program 1:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000) (async)
syz_io_uring_setup(0x207, &(0x7f0000000000)={0x0, 0x30b8, 0x40, 0x3, 0x168, 0x0, r0}, &(0x7f0000000080), &(0x7f00000010c0)=0x0)
ioctl$SIOCGETSGCNT_IN6(r0, 0x89e1, &(0x7f0000001180)={@private2, @mcast1}) (async)
r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r2, 0x0, 0xcf, 0x0, 0x0) (async)
openat$cgroup_type(r2, &(0x7f00000011c0), 0x2, 0x0)
io_uring_setup(0x2182, &(0x7f0000001200)={0x0, 0xb38f, 0x9c, 0x3, 0x34f})
syz_io_uring_submit(0x0, r1, &(0x7f0000001140)=@IORING_OP_UNLINKAT={0x24, 0x4, 0x0, r0, 0x0, &(0x7f0000001100)='./file0\x00', 0x0, 0x200})
03:50:46 executing program 0:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
syz_io_uring_setup(0xee0, &(0x7f0000000000)={0x0, 0x3132, 0x4, 0x1, 0x113, 0x0, r0}, &(0x7f0000000080)=0x0, &(0x7f00000000c0))
r2 = syz_io_uring_setup(0x3598, &(0x7f0000000100)={0x0, 0xeb7b, 0x400, 0x1, 0x397, 0x0, r0}, &(0x7f0000000180), &(0x7f00000001c0)=0x0)
syz_io_uring_submit(r1, r3, &(0x7f0000000280)=@IORING_OP_OPENAT2={0x1c, 0x40, 0x0, 0xffffffffffffffff, &(0x7f0000000200)={0x200001, 0x82, 0x5}, &(0x7f0000000240)='./file0\x00', 0x18, 0x0, 0x12345}) (async, rerun: 64)
read$qrtrtun(r0, &(0x7f00000012c0)=""/4096, 0x1000) (async, rerun: 64)
socketpair(0x3, 0x3, 0x2, &(0x7f00000004c0)={0xffffffffffffffff})
ioctl$sock_inet6_udp_SIOCOUTQ(r4, 0x5411, &(0x7f0000000500)) (async)
syz_io_uring_setup(0x7507, &(0x7f0000000340)={0x0, 0x1440, 0x820, 0x2, 0x30f}, &(0x7f00000003c0)=0x0, &(0x7f0000000400))
r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r6, 0x0, 0xcf, 0x0, 0x0) (async)
r7 = open$dir(&(0x7f0000000480)='./file0\x00', 0x100, 0x1)
syz_io_uring_submit(r5, r3, &(0x7f0000000440)=@IORING_OP_SPLICE={0x1e, 0x4, 0x0, @fd=r7, 0x3, {0x0, r2}, 0x0, 0x2, 0x1, {0x0, 0x0, r6}})
r8 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x40000, 0x0)
write$P9_RMKDIR(r8, &(0x7f0000000300)={0x14, 0x49, 0x1, {0x1, 0x1, 0x5}}, 0x14) (async)
r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r9, 0x0, 0xcf, 0x0, 0x0)
bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000540)={r8, r9, 0x4, r8}, 0x10)
03:50:46 executing program 4:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0})
timerfd_settime(r0, 0x1, &(0x7f0000000040)={{0x0, 0x3938700}, {r1, r2+10000000}}, &(0x7f0000000080))
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
03:50:46 executing program 3:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x16c00, &(0x7f0000001240)=@raw=[@ldst], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:46 executing program 2:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x1ed512, &(0x7f0000001240)=@raw=[@ldst], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:46 executing program 1:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4092, 0xffc)
geteuid()
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0xee00}}, './file0\x00'})
03:50:46 executing program 5:
r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/anycast6\x00')
read$qrtrtun(r0, &(0x7f0000000040)=""/85, 0x55)
read$qrtrtun(r0, &(0x7f00000000c0)=""/156, 0x9c)
03:50:46 executing program 4:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00') (async)
clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0})
timerfd_settime(r0, 0x1, &(0x7f0000000040)={{0x0, 0x3938700}, {r1, r2+10000000}}, &(0x7f0000000080)) (async)
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
03:50:46 executing program 3:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x16c00, &(0x7f0000001240)=@raw=[@ldst], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:46 executing program 0:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r0, 0x0, 0xcf, 0x0, 0x0)
write$P9_RUNLINKAT(r0, &(0x7f00000011c0)={0x7, 0x4d, 0x2}, 0x7)
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
sendmsg$IPSET_CMD_DEL(r1, &(0x7f0000000080)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f00000010c0)={0xfc, 0xa, 0x6, 0x3, 0x0, 0x0, {0x0, 0x0, 0x6}, [@IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x6ae}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_PROTO={0x5, 0x7, 0x62}]}, @IPSET_ATTR_ADT={0x74, 0x8, 0x0, 0x1, [{0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_MARKMASK={0x8, 0xb, 0x1, 0x0, 0x69}}, {0x1c, 0x7, 0x0, 0x1, @IPSET_ATTR_IP2={0x18, 0x14, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @private2}}}, {0x18, 0x7, 0x0, 0x1, @IPSET_ATTR_IFACE={0x14, 0x17, 'bond_slave_1\x00'}}, {0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x8}}, {0x18, 0x7, 0x0, 0x1, @IPSET_ATTR_IFACE={0x14, 0x17, 'veth0_to_batadv\x00'}}, {0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_SKBPRIO={0x8, 0x1c, 0x1, 0x0, 0xb2}}]}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_DATA={0x14, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x6, 0x1, 0x0, 0x6}, @IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x81}]}, @IPSET_ATTR_DATA={0x44, 0x7, 0x0, 0x1, [@IPSET_ATTR_CIDR={0x5, 0x3, 0x5}, @IPSET_ATTR_NAMEREF={0x9, 0x13, 'syz0\x00'}, @IPSET_ATTR_SKBMARK={0xc, 0x1b, 0x1, 0x0, 0x5}, @IPSET_ATTR_IP2={0x18, 0x14, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @empty}}, @IPSET_ATTR_CADT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x20}]}]}, 0xfc}, 0x1, 0x0, 0x0, 0x1}, 0x20000080)
r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r2, 0x0, 0xcf, 0x0, 0x0)
ioctl$TFD_IOC_SET_TICKS(r2, 0x40085400, &(0x7f0000001200)=0x3ff)
r3 = bpf$ITER_CREATE(0x21, &(0x7f0000001240)={r0}, 0x8)
r4 = geteuid()
r5 = getegid()
write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000100)={0x5e, 0x7d, 0x1, {{0x0, 0x42, 0x2, 0x400, {0x4, 0x1, 0x4}, 0x680000, 0x7fffffff, 0x1, 0x5, 0x8, 'ip6gre0\x00', 0x0, '', 0x7, '-].^^\\-'}, 0x7, '@/,,]}*', 0xffffffffffffffff, r5, 0xee00}}, 0x5e)
write$P9_RSTATu(r3, &(0x7f00000012c0)={0x71, 0x7d, 0x1, {{0x0, 0x4e, 0x4, 0x5, {0x80, 0x0, 0x4}, 0x400000, 0x2, 0x0, 0xbfe, 0x6, 'smaps\x00', 0x10, 'veth0_to_batadv\x00', 0x4, '@)#!', 0x1, '+'}, 0xe, 'net/dev_snmp6\x00', r4, r5, 0xee00}}, 0x71)
read$qrtrtun(r1, &(0x7f00000000c0)=""/4096, 0x1000)
03:50:46 executing program 5:
r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/anycast6\x00')
read$qrtrtun(r0, &(0x7f0000000040)=""/85, 0x55) (async)
read$qrtrtun(r0, &(0x7f00000000c0)=""/156, 0x9c)
03:50:46 executing program 4:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0})
timerfd_settime(r0, 0x1, &(0x7f0000000040)={{0x0, 0x3938700}, {r1, r2+10000000}}, &(0x7f0000000080))
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00') (async)
clock_gettime(0x0, &(0x7f0000000000)) (async)
timerfd_settime(r0, 0x1, &(0x7f0000000040)={{0x0, 0x3938700}, {r1, r2+10000000}}, &(0x7f0000000080)) (async)
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000) (async)
03:50:46 executing program 0:
syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00') (async)
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r0, 0x0, 0xcf, 0x0, 0x0)
write$P9_RUNLINKAT(r0, &(0x7f00000011c0)={0x7, 0x4d, 0x2}, 0x7)
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
sendmsg$IPSET_CMD_DEL(r1, &(0x7f0000000080)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f00000010c0)={0xfc, 0xa, 0x6, 0x3, 0x0, 0x0, {0x0, 0x0, 0x6}, [@IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x6ae}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_PROTO={0x5, 0x7, 0x62}]}, @IPSET_ATTR_ADT={0x74, 0x8, 0x0, 0x1, [{0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_MARKMASK={0x8, 0xb, 0x1, 0x0, 0x69}}, {0x1c, 0x7, 0x0, 0x1, @IPSET_ATTR_IP2={0x18, 0x14, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @private2}}}, {0x18, 0x7, 0x0, 0x1, @IPSET_ATTR_IFACE={0x14, 0x17, 'bond_slave_1\x00'}}, {0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x8}}, {0x18, 0x7, 0x0, 0x1, @IPSET_ATTR_IFACE={0x14, 0x17, 'veth0_to_batadv\x00'}}, {0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_SKBPRIO={0x8, 0x1c, 0x1, 0x0, 0xb2}}]}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_DATA={0x14, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x6, 0x1, 0x0, 0x6}, @IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x81}]}, @IPSET_ATTR_DATA={0x44, 0x7, 0x0, 0x1, [@IPSET_ATTR_CIDR={0x5, 0x3, 0x5}, @IPSET_ATTR_NAMEREF={0x9, 0x13, 'syz0\x00'}, @IPSET_ATTR_SKBMARK={0xc, 0x1b, 0x1, 0x0, 0x5}, @IPSET_ATTR_IP2={0x18, 0x14, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @empty}}, @IPSET_ATTR_CADT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x20}]}]}, 0xfc}, 0x1, 0x0, 0x0, 0x1}, 0x20000080) (async)
sendmsg$IPSET_CMD_DEL(r1, &(0x7f0000000080)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f00000010c0)={0xfc, 0xa, 0x6, 0x3, 0x0, 0x0, {0x0, 0x0, 0x6}, [@IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x6ae}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_PROTO={0x5, 0x7, 0x62}]}, @IPSET_ATTR_ADT={0x74, 0x8, 0x0, 0x1, [{0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_MARKMASK={0x8, 0xb, 0x1, 0x0, 0x69}}, {0x1c, 0x7, 0x0, 0x1, @IPSET_ATTR_IP2={0x18, 0x14, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @private2}}}, {0x18, 0x7, 0x0, 0x1, @IPSET_ATTR_IFACE={0x14, 0x17, 'bond_slave_1\x00'}}, {0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x8}}, {0x18, 0x7, 0x0, 0x1, @IPSET_ATTR_IFACE={0x14, 0x17, 'veth0_to_batadv\x00'}}, {0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_SKBPRIO={0x8, 0x1c, 0x1, 0x0, 0xb2}}]}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_DATA={0x14, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x6, 0x1, 0x0, 0x6}, @IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x81}]}, @IPSET_ATTR_DATA={0x44, 0x7, 0x0, 0x1, [@IPSET_ATTR_CIDR={0x5, 0x3, 0x5}, @IPSET_ATTR_NAMEREF={0x9, 0x13, 'syz0\x00'}, @IPSET_ATTR_SKBMARK={0xc, 0x1b, 0x1, 0x0, 0x5}, @IPSET_ATTR_IP2={0x18, 0x14, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @empty}}, @IPSET_ATTR_CADT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x20}]}]}, 0xfc}, 0x1, 0x0, 0x0, 0x1}, 0x20000080)
syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00') (async)
r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r2, 0x0, 0xcf, 0x0, 0x0)
ioctl$TFD_IOC_SET_TICKS(r2, 0x40085400, &(0x7f0000001200)=0x3ff)
r3 = bpf$ITER_CREATE(0x21, &(0x7f0000001240)={r0}, 0x8)
r4 = geteuid()
r5 = getegid()
write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000100)={0x5e, 0x7d, 0x1, {{0x0, 0x42, 0x2, 0x400, {0x4, 0x1, 0x4}, 0x680000, 0x7fffffff, 0x1, 0x5, 0x8, 'ip6gre0\x00', 0x0, '', 0x7, '-].^^\\-'}, 0x7, '@/,,]}*', 0xffffffffffffffff, r5, 0xee00}}, 0x5e) (async)
write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000100)={0x5e, 0x7d, 0x1, {{0x0, 0x42, 0x2, 0x400, {0x4, 0x1, 0x4}, 0x680000, 0x7fffffff, 0x1, 0x5, 0x8, 'ip6gre0\x00', 0x0, '', 0x7, '-].^^\\-'}, 0x7, '@/,,]}*', 0xffffffffffffffff, r5, 0xee00}}, 0x5e)
write$P9_RSTATu(r3, &(0x7f00000012c0)={0x71, 0x7d, 0x1, {{0x0, 0x4e, 0x4, 0x5, {0x80, 0x0, 0x4}, 0x400000, 0x2, 0x0, 0xbfe, 0x6, 'smaps\x00', 0x10, 'veth0_to_batadv\x00', 0x4, '@)#!', 0x1, '+'}, 0xe, 'net/dev_snmp6\x00', r4, r5, 0xee00}}, 0x71)
read$qrtrtun(r1, &(0x7f00000000c0)=""/4096, 0x1000)
03:50:46 executing program 1:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4092, 0xffc) (async, rerun: 64)
geteuid() (async, rerun: 64)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0xee00}}, './file0\x00'})
03:50:46 executing program 2:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:46 executing program 3:
bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0)
03:50:46 executing program 5:
r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/anycast6\x00')
read$qrtrtun(r0, &(0x7f0000000040)=""/85, 0x55) (async)
read$qrtrtun(r0, &(0x7f00000000c0)=""/156, 0x9c)
03:50:46 executing program 4:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f0000000000)=""/4099, 0xff45)
03:50:46 executing program 2:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst={0x2}], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:46 executing program 5:
r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/protocols\x00')
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x0, 0xee01}}, './file0\x00'})
read$qrtrtun(r0, &(0x7f0000000040)=""/85, 0x55)
read$qrtrtun(r0, &(0x7f00000000c0)=""/156, 0x9c)
03:50:46 executing program 0:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r0, 0x0, 0xcf, 0x0, 0x0)
write$P9_RUNLINKAT(r0, &(0x7f00000011c0)={0x7, 0x4d, 0x2}, 0x7)
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
sendmsg$IPSET_CMD_DEL(r1, &(0x7f0000000080)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f00000010c0)={0xfc, 0xa, 0x6, 0x3, 0x0, 0x0, {0x0, 0x0, 0x6}, [@IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x6ae}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_PROTO={0x5, 0x7, 0x62}]}, @IPSET_ATTR_ADT={0x74, 0x8, 0x0, 0x1, [{0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_MARKMASK={0x8, 0xb, 0x1, 0x0, 0x69}}, {0x1c, 0x7, 0x0, 0x1, @IPSET_ATTR_IP2={0x18, 0x14, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @private2}}}, {0x18, 0x7, 0x0, 0x1, @IPSET_ATTR_IFACE={0x14, 0x17, 'bond_slave_1\x00'}}, {0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x8}}, {0x18, 0x7, 0x0, 0x1, @IPSET_ATTR_IFACE={0x14, 0x17, 'veth0_to_batadv\x00'}}, {0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_SKBPRIO={0x8, 0x1c, 0x1, 0x0, 0xb2}}]}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_DATA={0x14, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x6, 0x1, 0x0, 0x6}, @IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x81}]}, @IPSET_ATTR_DATA={0x44, 0x7, 0x0, 0x1, [@IPSET_ATTR_CIDR={0x5, 0x3, 0x5}, @IPSET_ATTR_NAMEREF={0x9, 0x13, 'syz0\x00'}, @IPSET_ATTR_SKBMARK={0xc, 0x1b, 0x1, 0x0, 0x5}, @IPSET_ATTR_IP2={0x18, 0x14, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @empty}}, @IPSET_ATTR_CADT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x20}]}]}, 0xfc}, 0x1, 0x0, 0x0, 0x1}, 0x20000080)
syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00') (async)
r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r2, 0x0, 0xcf, 0x0, 0x0)
ioctl$TFD_IOC_SET_TICKS(r2, 0x40085400, &(0x7f0000001200)=0x3ff) (async)
ioctl$TFD_IOC_SET_TICKS(r2, 0x40085400, &(0x7f0000001200)=0x3ff)
r3 = bpf$ITER_CREATE(0x21, &(0x7f0000001240)={r0}, 0x8)
r4 = geteuid()
getegid() (async)
r5 = getegid()
write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000100)={0x5e, 0x7d, 0x1, {{0x0, 0x42, 0x2, 0x400, {0x4, 0x1, 0x4}, 0x680000, 0x7fffffff, 0x1, 0x5, 0x8, 'ip6gre0\x00', 0x0, '', 0x7, '-].^^\\-'}, 0x7, '@/,,]}*', 0xffffffffffffffff, r5, 0xee00}}, 0x5e)
write$P9_RSTATu(r3, &(0x7f00000012c0)={0x71, 0x7d, 0x1, {{0x0, 0x4e, 0x4, 0x5, {0x80, 0x0, 0x4}, 0x400000, 0x2, 0x0, 0xbfe, 0x6, 'smaps\x00', 0x10, 'veth0_to_batadv\x00', 0x4, '@)#!', 0x1, '+'}, 0xe, 'net/dev_snmp6\x00', r4, r5, 0xee00}}, 0x71) (async)
write$P9_RSTATu(r3, &(0x7f00000012c0)={0x71, 0x7d, 0x1, {{0x0, 0x4e, 0x4, 0x5, {0x80, 0x0, 0x4}, 0x400000, 0x2, 0x0, 0xbfe, 0x6, 'smaps\x00', 0x10, 'veth0_to_batadv\x00', 0x4, '@)#!', 0x1, '+'}, 0xe, 'net/dev_snmp6\x00', r4, r5, 0xee00}}, 0x71)
read$qrtrtun(r1, &(0x7f00000000c0)=""/4096, 0x1000)
03:50:46 executing program 1:
syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00') (async)
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4092, 0xffc)
geteuid()
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0xee00}}, './file0\x00'})
03:50:46 executing program 3:
bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0)
03:50:46 executing program 2:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst={0x3}], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:46 executing program 1:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, 0xffffffffffffffff, &(0x7f0000001180)={0xba8fa0bfe2fe7bd5})
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000000)={r0}, 0x8)
r2 = bpf$ITER_CREATE(0x21, &(0x7f0000001240), 0x8)
epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f0000001300)={0x1})
ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r1, 0x89f3, &(0x7f00000010c0)={'ip6tnl0\x00', &(0x7f0000000040)={'syztnl0\x00', 0x0, 0x29, 0x81, 0x17, 0x5, 0x20, @loopback, @empty, 0x20, 0x7, 0x9, 0x2}})
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
syz_emit_ethernet(0x6e, &(0x7f0000000780)={@broadcast, @local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "7ff312", 0x38, 0x29, 0x0, @dev, @mcast2, {[], @param_prob={0x4, 0x0, 0x0, 0x0, {0x0, 0x6, "fb3085", 0x0, 0x0, 0x0, @empty, @remote, [@dstopts={0x33}]}}}}}}}, 0x0)
r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r3, 0x0, 0xcf, 0x0, 0x0)
ioctl$BLKROSET(r3, 0x125d, &(0x7f0000001100)=0x400)
ioctl$BLKBSZSET(r0, 0x40081271, &(0x7f00000011c0)=0x20)
syz_open_procfs(0xffffffffffffffff, &(0x7f0000001200)='syscall\x00')
r4 = openat$bsg(0xffffffffffffff9c, &(0x7f0000001140), 0x400000, 0x0)
timerfd_gettime(r4, &(0x7f0000001340))
03:50:47 executing program 2:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst={0x4}], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:47 executing program 3:
bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0)
03:50:47 executing program 4:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f0000000000)=""/4099, 0xff45)
03:50:47 executing program 5:
r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/protocols\x00')
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x0, 0xee01}}, './file0\x00'}) (async)
read$qrtrtun(r0, &(0x7f0000000040)=""/85, 0x55) (async, rerun: 32)
read$qrtrtun(r0, &(0x7f00000000c0)=""/156, 0x9c) (rerun: 32)
03:50:47 executing program 0:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r1, 0x0, 0xcf, 0x0, 0x0)
mmap$qrtrtun(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x9, 0x12, r1, 0x3f)
statx(r0, &(0x7f0000000000)='./file0\x00', 0x1000, 0x4, &(0x7f00000010c0))
03:50:47 executing program 3:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x0, 0x0, &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:47 executing program 0:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000) (async)
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r1, 0x0, 0xcf, 0x0, 0x0) (async)
setsockopt$MRT_ASSERT(r1, 0x0, 0xcf, 0x0, 0x0)
mmap$qrtrtun(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x9, 0x12, r1, 0x3f)
statx(r0, &(0x7f0000000000)='./file0\x00', 0x1000, 0x4, &(0x7f00000010c0))
03:50:47 executing program 5:
r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/protocols\x00')
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x0, 0xee01}}, './file0\x00'})
read$qrtrtun(r0, &(0x7f0000000040)=""/85, 0x55) (async)
read$qrtrtun(r0, &(0x7f0000000040)=""/85, 0x55)
read$qrtrtun(r0, &(0x7f00000000c0)=""/156, 0x9c)
03:50:47 executing program 4:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f0000000000)=""/4099, 0xff45)
03:50:47 executing program 1:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, 0xffffffffffffffff, &(0x7f0000001180)={0xba8fa0bfe2fe7bd5})
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000000)={r0}, 0x8)
r2 = bpf$ITER_CREATE(0x21, &(0x7f0000001240), 0x8)
epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f0000001300)={0x1})
ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r1, 0x89f3, &(0x7f00000010c0)={'ip6tnl0\x00', &(0x7f0000000040)={'syztnl0\x00', 0x0, 0x29, 0x81, 0x17, 0x5, 0x20, @loopback, @empty, 0x20, 0x7, 0x9, 0x2}})
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
syz_emit_ethernet(0x6e, &(0x7f0000000780)={@broadcast, @local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "7ff312", 0x38, 0x29, 0x0, @dev, @mcast2, {[], @param_prob={0x4, 0x0, 0x0, 0x0, {0x0, 0x6, "fb3085", 0x0, 0x0, 0x0, @empty, @remote, [@dstopts={0x33}]}}}}}}}, 0x0)
r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r3, 0x0, 0xcf, 0x0, 0x0)
ioctl$BLKROSET(r3, 0x125d, &(0x7f0000001100)=0x400)
ioctl$BLKBSZSET(r0, 0x40081271, &(0x7f00000011c0)=0x20)
syz_open_procfs(0xffffffffffffffff, &(0x7f0000001200)='syscall\x00')
r4 = openat$bsg(0xffffffffffffff9c, &(0x7f0000001140), 0x400000, 0x0)
timerfd_gettime(r4, &(0x7f0000001340))
syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00') (async)
epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, 0xffffffffffffffff, &(0x7f0000001180)={0xba8fa0bfe2fe7bd5}) (async)
bpf$ITER_CREATE(0x21, &(0x7f0000000000)={r0}, 0x8) (async)
bpf$ITER_CREATE(0x21, &(0x7f0000001240), 0x8) (async)
epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f0000001300)={0x1}) (async)
ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r1, 0x89f3, &(0x7f00000010c0)={'ip6tnl0\x00', &(0x7f0000000040)={'syztnl0\x00', 0x0, 0x29, 0x81, 0x17, 0x5, 0x20, @loopback, @empty, 0x20, 0x7, 0x9, 0x2}}) (async)
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000) (async)
syz_emit_ethernet(0x6e, &(0x7f0000000780)={@broadcast, @local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "7ff312", 0x38, 0x29, 0x0, @dev, @mcast2, {[], @param_prob={0x4, 0x0, 0x0, 0x0, {0x0, 0x6, "fb3085", 0x0, 0x0, 0x0, @empty, @remote, [@dstopts={0x33}]}}}}}}}, 0x0) (async)
syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00') (async)
setsockopt$MRT_ASSERT(r3, 0x0, 0xcf, 0x0, 0x0) (async)
ioctl$BLKROSET(r3, 0x125d, &(0x7f0000001100)=0x400) (async)
ioctl$BLKBSZSET(r0, 0x40081271, &(0x7f00000011c0)=0x20) (async)
syz_open_procfs(0xffffffffffffffff, &(0x7f0000001200)='syscall\x00') (async)
openat$bsg(0xffffffffffffff9c, &(0x7f0000001140), 0x400000, 0x0) (async)
timerfd_gettime(r4, &(0x7f0000001340)) (async)
03:50:47 executing program 2:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst={0x5}], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:47 executing program 0:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r1, 0x0, 0xcf, 0x0, 0x0)
mmap$qrtrtun(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x9, 0x12, r1, 0x3f)
statx(r0, &(0x7f0000000000)='./file0\x00', 0x1000, 0x4, &(0x7f00000010c0))
syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00') (async)
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000) (async)
syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00') (async)
setsockopt$MRT_ASSERT(r1, 0x0, 0xcf, 0x0, 0x0) (async)
mmap$qrtrtun(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x9, 0x12, r1, 0x3f) (async)
statx(r0, &(0x7f0000000000)='./file0\x00', 0x1000, 0x4, &(0x7f00000010c0)) (async)
03:50:47 executing program 3:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x0, 0x0, &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:47 executing program 4:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/packet\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
socket$phonet(0x23, 0x2, 0x1)
03:50:47 executing program 5:
r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/protocols\x00')
read$qrtrtun(r0, &(0x7f0000000040)=""/85, 0x55)
r1 = getpid()
r2 = getpid()
kcmp$KCMP_EPOLL_TFD(r2, r1, 0x7, 0xffffffffffffffff, &(0x7f0000001840))
kcmp$KCMP_EPOLL_TFD(0x0, r2, 0x7, 0xffffffffffffffff, &(0x7f0000000000)={r0, r0, 0x83})
r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r3, 0x0, 0xcf, 0x0, 0x0)
ioctl$sock_inet6_udp_SIOCOUTQ(r3, 0x5411, &(0x7f0000000180))
read$qrtrtun(r0, &(0x7f00000000c0)=""/156, 0x9c)
03:50:47 executing program 3:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x0, 0x0, &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:47 executing program 1:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, 0xffffffffffffffff, &(0x7f0000001180)={0xba8fa0bfe2fe7bd5}) (async)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000000)={r0}, 0x8)
r2 = bpf$ITER_CREATE(0x21, &(0x7f0000001240), 0x8)
epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f0000001300)={0x1}) (async)
ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r1, 0x89f3, &(0x7f00000010c0)={'ip6tnl0\x00', &(0x7f0000000040)={'syztnl0\x00', 0x0, 0x29, 0x81, 0x17, 0x5, 0x20, @loopback, @empty, 0x20, 0x7, 0x9, 0x2}})
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
syz_emit_ethernet(0x6e, &(0x7f0000000780)={@broadcast, @local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "7ff312", 0x38, 0x29, 0x0, @dev, @mcast2, {[], @param_prob={0x4, 0x0, 0x0, 0x0, {0x0, 0x6, "fb3085", 0x0, 0x0, 0x0, @empty, @remote, [@dstopts={0x33}]}}}}}}}, 0x0) (async)
r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r3, 0x0, 0xcf, 0x0, 0x0) (async)
ioctl$BLKROSET(r3, 0x125d, &(0x7f0000001100)=0x400) (async)
ioctl$BLKBSZSET(r0, 0x40081271, &(0x7f00000011c0)=0x20) (async)
syz_open_procfs(0xffffffffffffffff, &(0x7f0000001200)='syscall\x00') (async)
r4 = openat$bsg(0xffffffffffffff9c, &(0x7f0000001140), 0x400000, 0x0)
timerfd_gettime(r4, &(0x7f0000001340))
03:50:47 executing program 2:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst={0x6}], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:47 executing program 3:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x0, &(0x7f0000001240), &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:47 executing program 0:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
recvfrom$phonet(r0, &(0x7f00000012c0)=""/4096, 0x1000, 0x10000, &(0x7f0000000000)={0x23, 0x10, 0x8, 0x9}, 0x10)
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
03:50:47 executing program 5:
r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/protocols\x00')
read$qrtrtun(r0, &(0x7f0000000040)=""/85, 0x55)
r1 = getpid() (async)
r2 = getpid()
kcmp$KCMP_EPOLL_TFD(r2, r1, 0x7, 0xffffffffffffffff, &(0x7f0000001840))
kcmp$KCMP_EPOLL_TFD(0x0, r2, 0x7, 0xffffffffffffffff, &(0x7f0000000000)={r0, r0, 0x83}) (async)
r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r3, 0x0, 0xcf, 0x0, 0x0) (async)
ioctl$sock_inet6_udp_SIOCOUTQ(r3, 0x5411, &(0x7f0000000180)) (async)
read$qrtrtun(r0, &(0x7f00000000c0)=""/156, 0x9c)
03:50:47 executing program 2:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst={0x7}], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:47 executing program 4:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/packet\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
socket$phonet(0x23, 0x2, 0x1)
syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/packet\x00') (async)
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000) (async)
socket$phonet(0x23, 0x2, 0x1) (async)
03:50:47 executing program 1:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r1, 0x0, 0xcf, 0x0, 0x0)
mmap$qrtrtun(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x2, 0x110, r1, 0x3)
r2 = getpid()
r3 = syz_open_procfs(0x0, &(0x7f0000000000)='attr/prev\x00')
r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r4, 0x0, 0xcf, 0x0, 0x0)
kcmp$KCMP_EPOLL_TFD(r2, 0xffffffffffffffff, 0x7, 0xffffffffffffffff, &(0x7f0000000040)={r3, r4, 0x8000})
03:50:47 executing program 5:
r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/protocols\x00')
read$qrtrtun(r0, &(0x7f0000000040)=""/85, 0x55) (async)
r1 = getpid() (async)
r2 = getpid()
kcmp$KCMP_EPOLL_TFD(r2, r1, 0x7, 0xffffffffffffffff, &(0x7f0000001840)) (async)
kcmp$KCMP_EPOLL_TFD(0x0, r2, 0x7, 0xffffffffffffffff, &(0x7f0000000000)={r0, r0, 0x83}) (async)
r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r3, 0x0, 0xcf, 0x0, 0x0) (async)
ioctl$sock_inet6_udp_SIOCOUTQ(r3, 0x5411, &(0x7f0000000180)) (async)
read$qrtrtun(r0, &(0x7f00000000c0)=""/156, 0x9c)
03:50:47 executing program 0:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
recvfrom$phonet(r0, &(0x7f00000012c0)=""/4096, 0x1000, 0x10000, &(0x7f0000000000)={0x23, 0x10, 0x8, 0x9}, 0x10) (async)
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
03:50:47 executing program 1:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000) (async)
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r1, 0x0, 0xcf, 0x0, 0x0) (async)
mmap$qrtrtun(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x2, 0x110, r1, 0x3)
r2 = getpid()
r3 = syz_open_procfs(0x0, &(0x7f0000000000)='attr/prev\x00')
r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r4, 0x0, 0xcf, 0x0, 0x0)
kcmp$KCMP_EPOLL_TFD(r2, 0xffffffffffffffff, 0x7, 0xffffffffffffffff, &(0x7f0000000040)={r3, r4, 0x8000})
03:50:47 executing program 3:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x0, &(0x7f0000001240), &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:47 executing program 2:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:47 executing program 0:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
recvfrom$phonet(r0, &(0x7f00000012c0)=""/4096, 0x1000, 0x10000, &(0x7f0000000000)={0x23, 0x10, 0x8, 0x9}, 0x10)
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
03:50:47 executing program 4:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/packet\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
socket$phonet(0x23, 0x2, 0x1)
03:50:47 executing program 5:
r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/protocols\x00')
read$qrtrtun(r0, &(0x7f0000000040)=""/85, 0x55)
read$qrtrtun(r0, &(0x7f00000000c0)=""/156, 0x9c)
sendmsg$NFNL_MSG_ACCT_GET_CTRZERO(r0, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000180)={&(0x7f0000000240)={0xa4, 0x2, 0x7, 0x5, 0x0, 0x0, {0x1, 0x0, 0x8}, [@NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x3}, @NFACCT_NAME={0x9, 0x1, 'syz0\x00'}, @NFACCT_NAME={0x9, 0x1, 'syz0\x00'}, @NFACCT_FILTER={0x44, 0x7, 0x0, 0x1, [@NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x10001}, @NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x6}, @NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x2}, @NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x80000000}, @NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0xfe5b}, @NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x4}, @NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x2}, @NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0xb89}]}, @NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x3}, @NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x2}, @NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x2}, @NFACCT_FILTER={0x14, 0x7, 0x0, 0x1, [@NFACCT_FILTER_MASK={0x8}, @NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x5a}]}]}, 0xa4}, 0x1, 0x0, 0x0, 0x4040080}, 0x20040090)
03:50:47 executing program 1:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r1, 0x0, 0xcf, 0x0, 0x0)
mmap$qrtrtun(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x2, 0x110, r1, 0x3) (async)
r2 = getpid() (async)
r3 = syz_open_procfs(0x0, &(0x7f0000000000)='attr/prev\x00') (async)
r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r4, 0x0, 0xcf, 0x0, 0x0) (async)
kcmp$KCMP_EPOLL_TFD(r2, 0xffffffffffffffff, 0x7, 0xffffffffffffffff, &(0x7f0000000040)={r3, r4, 0x8000})
03:50:47 executing program 3:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x0, &(0x7f0000001240), &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:47 executing program 0:
sendto$phonet(0xffffffffffffffff, &(0x7f00000010c0)="ab6de86118e773763b02c4b16736dc8227a856fc13db48ba00e0208d7f356c695d3270bd075b3e1ef552f4d0feff07f37d64049d33a37781f6b0b5f6d65c85e97c07d2ce0822fd6300af103115e6e6bafb52d1439b2e93ada6e8be4ba3154587117415ff6a66e746b49310bf18744913460f12c82d14fd5dfff914620054b6fe8e397b0e6a427e29a68c7126808701c83d2f7dee012bc19e63c049d685d22f2cfb42ae42cace2c5e2037493672a5ee129b398c1a117b0e2a21dd04f2cfe1893104ce294c96fa4ece642c17193f8dea07f78ee5a8fb766351bb06029f924993605d08f6", 0xe3, 0x40000, &(0x7f0000000000)={0x23, 0x8, 0x40}, 0x10)
r0 = syz_genetlink_get_family_id$nbd(&(0x7f0000000080), 0xffffffffffffffff)
sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f00000012c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001240)={&(0x7f0000001340)=ANY=[@ANYBLOB='P\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="00012abd7000fddbdf25010000000c0008005b000000000000000c0002000700000000f1e5a4a1710000000c00050020000020000000000c00020020000000000000000c000800021c00000000000030a73e28fd32aa327e1716c65742ba81a376f3015608496f1dee2adfdda4ef7d0d07dbec8a9c2d3add854b18a00cb82efe57b5b07b28bfdf02d91995291704eb816da9a7fad6fc5d524fbb5a57d672aac7896bbb6fb96d73daeceef12e0800000090938c8534d6f58db86b74065021fed9ff34a6bf2de6910f5af827f973b9741a4e88b48fd2f3db40d503a6972036cf09df292e75d49adf932313ff27e87ca45972efea6cef7ad9ddd8657b6b730c0f70badd99edfa0e12d4b29b9665f081d64e2ae36ddc821519a6"], 0x50}, 0x1, 0x0, 0x0, 0x20008000}, 0x20000840)
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r1, &(0x7f00000000c0)=""/4096, 0x1000)
accept4$phonet_pipe(r1, 0x0, &(0x7f0000001300), 0x0)
03:50:47 executing program 2:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst={0x0, 0x2}], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:47 executing program 3:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst], 0x0, 0xb}, 0x90)
03:50:47 executing program 5:
r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/protocols\x00')
read$qrtrtun(r0, &(0x7f0000000040)=""/85, 0x55)
read$qrtrtun(r0, &(0x7f00000000c0)=""/156, 0x9c)
sendmsg$NFNL_MSG_ACCT_GET_CTRZERO(r0, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000180)={&(0x7f0000000240)={0xa4, 0x2, 0x7, 0x5, 0x0, 0x0, {0x1, 0x0, 0x8}, [@NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x3}, @NFACCT_NAME={0x9, 0x1, 'syz0\x00'}, @NFACCT_NAME={0x9, 0x1, 'syz0\x00'}, @NFACCT_FILTER={0x44, 0x7, 0x0, 0x1, [@NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x10001}, @NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x6}, @NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x2}, @NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x80000000}, @NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0xfe5b}, @NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x4}, @NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x2}, @NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0xb89}]}, @NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x3}, @NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x2}, @NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x2}, @NFACCT_FILTER={0x14, 0x7, 0x0, 0x1, [@NFACCT_FILTER_MASK={0x8}, @NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x5a}]}]}, 0xa4}, 0x1, 0x0, 0x0, 0x4040080}, 0x20040090)
syz_open_procfs(0x0, &(0x7f0000000200)='net/protocols\x00') (async)
read$qrtrtun(r0, &(0x7f0000000040)=""/85, 0x55) (async)
read$qrtrtun(r0, &(0x7f00000000c0)=""/156, 0x9c) (async)
sendmsg$NFNL_MSG_ACCT_GET_CTRZERO(r0, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000180)={&(0x7f0000000240)={0xa4, 0x2, 0x7, 0x5, 0x0, 0x0, {0x1, 0x0, 0x8}, [@NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x3}, @NFACCT_NAME={0x9, 0x1, 'syz0\x00'}, @NFACCT_NAME={0x9, 0x1, 'syz0\x00'}, @NFACCT_FILTER={0x44, 0x7, 0x0, 0x1, [@NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x10001}, @NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x6}, @NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x2}, @NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x80000000}, @NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0xfe5b}, @NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x4}, @NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x2}, @NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0xb89}]}, @NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x3}, @NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x2}, @NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x2}, @NFACCT_FILTER={0x14, 0x7, 0x0, 0x1, [@NFACCT_FILTER_MASK={0x8}, @NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x5a}]}]}, 0xa4}, 0x1, 0x0, 0x0, 0x4040080}, 0x20040090) (async)
03:50:47 executing program 2:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst={0x0, 0x3}], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:47 executing program 3:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst], 0x0, 0xb}, 0x90)
03:50:47 executing program 0:
sendto$phonet(0xffffffffffffffff, &(0x7f00000010c0)="ab6de86118e773763b02c4b16736dc8227a856fc13db48ba00e0208d7f356c695d3270bd075b3e1ef552f4d0feff07f37d64049d33a37781f6b0b5f6d65c85e97c07d2ce0822fd6300af103115e6e6bafb52d1439b2e93ada6e8be4ba3154587117415ff6a66e746b49310bf18744913460f12c82d14fd5dfff914620054b6fe8e397b0e6a427e29a68c7126808701c83d2f7dee012bc19e63c049d685d22f2cfb42ae42cace2c5e2037493672a5ee129b398c1a117b0e2a21dd04f2cfe1893104ce294c96fa4ece642c17193f8dea07f78ee5a8fb766351bb06029f924993605d08f6", 0xe3, 0x40000, &(0x7f0000000000)={0x23, 0x8, 0x40}, 0x10)
r0 = syz_genetlink_get_family_id$nbd(&(0x7f0000000080), 0xffffffffffffffff)
sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f00000012c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001240)={&(0x7f0000001340)=ANY=[@ANYBLOB='P\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="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"], 0x50}, 0x1, 0x0, 0x0, 0x20008000}, 0x20000840) (async)
sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f00000012c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001240)={&(0x7f0000001340)=ANY=[@ANYBLOB='P\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="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"], 0x50}, 0x1, 0x0, 0x0, 0x20008000}, 0x20000840)
syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00') (async)
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r1, &(0x7f00000000c0)=""/4096, 0x1000)
accept4$phonet_pipe(r1, 0x0, &(0x7f0000001300), 0x0)
03:50:47 executing program 2:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:47 executing program 5:
r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/protocols\x00')
read$qrtrtun(r0, &(0x7f0000000040)=""/85, 0x55)
read$qrtrtun(r0, &(0x7f00000000c0)=""/156, 0x9c)
sendmsg$NFNL_MSG_ACCT_GET_CTRZERO(r0, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000180)={&(0x7f0000000240)={0xa4, 0x2, 0x7, 0x5, 0x0, 0x0, {0x1, 0x0, 0x8}, [@NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x3}, @NFACCT_NAME={0x9, 0x1, 'syz0\x00'}, @NFACCT_NAME={0x9, 0x1, 'syz0\x00'}, @NFACCT_FILTER={0x44, 0x7, 0x0, 0x1, [@NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x10001}, @NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x6}, @NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x2}, @NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x80000000}, @NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0xfe5b}, @NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x4}, @NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x2}, @NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0xb89}]}, @NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x3}, @NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x2}, @NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x2}, @NFACCT_FILTER={0x14, 0x7, 0x0, 0x1, [@NFACCT_FILTER_MASK={0x8}, @NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x5a}]}]}, 0xa4}, 0x1, 0x0, 0x0, 0x4040080}, 0x20040090) (async)
sendmsg$NFNL_MSG_ACCT_GET_CTRZERO(r0, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000180)={&(0x7f0000000240)={0xa4, 0x2, 0x7, 0x5, 0x0, 0x0, {0x1, 0x0, 0x8}, [@NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x3}, @NFACCT_NAME={0x9, 0x1, 'syz0\x00'}, @NFACCT_NAME={0x9, 0x1, 'syz0\x00'}, @NFACCT_FILTER={0x44, 0x7, 0x0, 0x1, [@NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x10001}, @NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x6}, @NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x2}, @NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x80000000}, @NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0xfe5b}, @NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x4}, @NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x2}, @NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0xb89}]}, @NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x3}, @NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x2}, @NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x2}, @NFACCT_FILTER={0x14, 0x7, 0x0, 0x1, [@NFACCT_FILTER_MASK={0x8}, @NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x5a}]}]}, 0xa4}, 0x1, 0x0, 0x0, 0x4040080}, 0x20040090)
03:50:47 executing program 3:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst], 0x0, 0xb}, 0x90)
03:50:47 executing program 4:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10)
r2 = syz_genetlink_get_family_id$nbd(&(0x7f0000000040), 0xffffffffffffffff)
sendmsg$NBD_CMD_RECONFIGURE(r1, &(0x7f0000001140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000080)={&(0x7f00000010c0)={0x58, r2, 0x100, 0x70bd2b, 0x25dfdbfc, {}, [@NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x8d98}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x8000000000000001}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x9}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x5}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0xfff}]}, 0x58}}, 0x44840)
r3 = syz_genetlink_get_family_id$nbd(&(0x7f00000011c0), r1)
sendmsg$NBD_CMD_STATUS(r1, &(0x7f0000001300)={&(0x7f0000001180)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000012c0)={&(0x7f0000001200)={0x58, r3, 0x531, 0x70bd2a, 0x25dfdbfd, {}, [@NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x5}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_SERVER_FLAGS={0xc}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x3}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x14}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x9}]}, 0x58}, 0x1, 0x0, 0x0, 0x10}, 0x800)
03:50:47 executing program 2:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst={0x0, 0x0, 0x2}], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:47 executing program 3:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x16c00, &(0x7f0000001240)=@raw=[@ldst], &(0x7f0000001340)='GPL\x00'}, 0x90)
03:50:47 executing program 5:
r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/protocols\x00')
setsockopt$MRT_DEL_MFC_PROXY(r0, 0x0, 0xd3, &(0x7f0000000180)={@loopback, @private=0xa010100, 0xffffffffffffffff, "ef74a1555e7433c81e10d52e1c93f1df457a422f3b8ba8c2b4ba06bbbd566fc6", 0x6f, 0x67, 0x80000001, 0x7}, 0x3c)
read$qrtrtun(r0, &(0x7f0000000040)=""/85, 0x55)
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r1, 0x0, 0xcf, 0x0, 0x0)
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r1, 0xc0c89425, &(0x7f0000000240)={"80152cff7f0000de1c8fa5c687722ab3", 0x0, 0x0, {0x80000001, 0xfffffffd}, {0x4, 0x3e7}, 0xfffffffffffffffb, [0x400, 0x0, 0x0, 0x5, 0x0, 0x9, 0x8000, 0x9, 0xab6, 0x100, 0xffffffffffffffff, 0xfffffffffffffffb, 0x81, 0x4, 0x6, 0xffff]})
bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000001c0)={0x1}, 0x8)
read$qrtrtun(r0, &(0x7f00000000c0)=""/156, 0x9c)
r2 = memfd_secret(0x80000)
write$qrtrtun(r2, &(0x7f0000000340)="94e8df7197f0b3f3f159270d688d2baf4e91c8f3ce2ef1f658ed46a9435d44293c28a308895d4bbcc6148800888eef237f257a04676f8550534879d7d7bccfb5feac818558f8567d618b5526ef9c40778be760a4b99355cd79fdf96d22d802533268db23f44c5498497c5dc8e07e32121995eb0d8b0ab4fabad38dfa3c4b640afc380b580d81267c4d18a31c384636647f7a9b8d6cd00752308a022c75c9ad3a9e250d1788a5f5279fe69aa45dde45d9e62382d679d3a0b12c198e0897c8999e96e6c25a0f1e853b60981b36d7b0d651fee83fffc270584734586e79ae91eebb2253b752c24b223e77b0f6d5d2f3a7bb6ee4", 0xf2)
bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000440)={0xffff7fff}, 0x8)
ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, &(0x7f0000000000)={0xfff, 0x6})
03:50:47 executing program 0:
sendto$phonet(0xffffffffffffffff, &(0x7f00000010c0)="ab6de86118e773763b02c4b16736dc8227a856fc13db48ba00e0208d7f356c695d3270bd075b3e1ef552f4d0feff07f37d64049d33a37781f6b0b5f6d65c85e97c07d2ce0822fd6300af103115e6e6bafb52d1439b2e93ada6e8be4ba3154587117415ff6a66e746b49310bf18744913460f12c82d14fd5dfff914620054b6fe8e397b0e6a427e29a68c7126808701c83d2f7dee012bc19e63c049d685d22f2cfb42ae42cace2c5e2037493672a5ee129b398c1a117b0e2a21dd04f2cfe1893104ce294c96fa4ece642c17193f8dea07f78ee5a8fb766351bb06029f924993605d08f6", 0xe3, 0x40000, &(0x7f0000000000)={0x23, 0x8, 0x40}, 0x10)
r0 = syz_genetlink_get_family_id$nbd(&(0x7f0000000080), 0xffffffffffffffff)
sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f00000012c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001240)={&(0x7f0000001340)=ANY=[@ANYBLOB='P\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="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"], 0x50}, 0x1, 0x0, 0x0, 0x20008000}, 0x20000840) (async)
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r1, &(0x7f00000000c0)=""/4096, 0x1000) (async)
accept4$phonet_pipe(r1, 0x0, &(0x7f0000001300), 0x0)
03:50:47 executing program 2:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst={0x0, 0x0, 0x3}], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:47 executing program 4:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10)
r2 = syz_genetlink_get_family_id$nbd(&(0x7f0000000040), 0xffffffffffffffff)
sendmsg$NBD_CMD_RECONFIGURE(r1, &(0x7f0000001140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000080)={&(0x7f00000010c0)={0x58, r2, 0x100, 0x70bd2b, 0x25dfdbfc, {}, [@NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x8d98}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x8000000000000001}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x9}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x5}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0xfff}]}, 0x58}}, 0x44840)
r3 = syz_genetlink_get_family_id$nbd(&(0x7f00000011c0), r1)
sendmsg$NBD_CMD_STATUS(r1, &(0x7f0000001300)={&(0x7f0000001180)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000012c0)={&(0x7f0000001200)={0x58, r3, 0x531, 0x70bd2a, 0x25dfdbfd, {}, [@NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x5}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_SERVER_FLAGS={0xc}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x3}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x14}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x9}]}, 0x58}, 0x1, 0x0, 0x0, 0x10}, 0x800)
syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00') (async)
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000) (async)
syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) (async)
syz_genetlink_get_family_id$nbd(&(0x7f0000000040), 0xffffffffffffffff) (async)
sendmsg$NBD_CMD_RECONFIGURE(r1, &(0x7f0000001140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000080)={&(0x7f00000010c0)={0x58, r2, 0x100, 0x70bd2b, 0x25dfdbfc, {}, [@NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x8d98}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x8000000000000001}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x9}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x5}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0xfff}]}, 0x58}}, 0x44840) (async)
syz_genetlink_get_family_id$nbd(&(0x7f00000011c0), r1) (async)
sendmsg$NBD_CMD_STATUS(r1, &(0x7f0000001300)={&(0x7f0000001180)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000012c0)={&(0x7f0000001200)={0x58, r3, 0x531, 0x70bd2a, 0x25dfdbfd, {}, [@NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x5}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_SERVER_FLAGS={0xc}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x3}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x14}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x9}]}, 0x58}, 0x1, 0x0, 0x0, 0x10}, 0x800) (async)
03:50:47 executing program 5:
r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/protocols\x00')
setsockopt$MRT_DEL_MFC_PROXY(r0, 0x0, 0xd3, &(0x7f0000000180)={@loopback, @private=0xa010100, 0xffffffffffffffff, "ef74a1555e7433c81e10d52e1c93f1df457a422f3b8ba8c2b4ba06bbbd566fc6", 0x6f, 0x67, 0x80000001, 0x7}, 0x3c) (async)
read$qrtrtun(r0, &(0x7f0000000040)=""/85, 0x55) (async, rerun: 32)
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00') (rerun: 32)
setsockopt$MRT_ASSERT(r1, 0x0, 0xcf, 0x0, 0x0)
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r1, 0xc0c89425, &(0x7f0000000240)={"80152cff7f0000de1c8fa5c687722ab3", 0x0, 0x0, {0x80000001, 0xfffffffd}, {0x4, 0x3e7}, 0xfffffffffffffffb, [0x400, 0x0, 0x0, 0x5, 0x0, 0x9, 0x8000, 0x9, 0xab6, 0x100, 0xffffffffffffffff, 0xfffffffffffffffb, 0x81, 0x4, 0x6, 0xffff]})
bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000001c0)={0x1}, 0x8)
read$qrtrtun(r0, &(0x7f00000000c0)=""/156, 0x9c)
r2 = memfd_secret(0x80000)
write$qrtrtun(r2, &(0x7f0000000340)="94e8df7197f0b3f3f159270d688d2baf4e91c8f3ce2ef1f658ed46a9435d44293c28a308895d4bbcc6148800888eef237f257a04676f8550534879d7d7bccfb5feac818558f8567d618b5526ef9c40778be760a4b99355cd79fdf96d22d802533268db23f44c5498497c5dc8e07e32121995eb0d8b0ab4fabad38dfa3c4b640afc380b580d81267c4d18a31c384636647f7a9b8d6cd00752308a022c75c9ad3a9e250d1788a5f5279fe69aa45dde45d9e62382d679d3a0b12c198e0897c8999e96e6c25a0f1e853b60981b36d7b0d651fee83fffc270584734586e79ae91eebb2253b752c24b223e77b0f6d5d2f3a7bb6ee4", 0xf2) (async)
bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000440)={0xffff7fff}, 0x8) (async)
ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, &(0x7f0000000000)={0xfff, 0x6})
03:50:47 executing program 3:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst={0x0, 0x0, 0x2}], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:47 executing program 1:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f00000010c0)={"a1a21fbc407553e3a212b80e9416b832", 0x0, 0x0, {0x8000, 0x9}, {0x0, 0x2c8}, 0x31e, [0x2, 0x0, 0x3, 0x80000000, 0x8000000000000000, 0x0, 0x1, 0x3, 0x2, 0x9, 0x2, 0x1d, 0xffff, 0x200, 0x200, 0x540]})
03:50:47 executing program 3:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst={0x0, 0x0, 0x2}], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:47 executing program 1:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000) (async)
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f00000010c0)={"a1a21fbc407553e3a212b80e9416b832", 0x0, 0x0, {0x8000, 0x9}, {0x0, 0x2c8}, 0x31e, [0x2, 0x0, 0x3, 0x80000000, 0x8000000000000000, 0x0, 0x1, 0x3, 0x2, 0x9, 0x2, 0x1d, 0xffff, 0x200, 0x200, 0x540]})
03:50:47 executing program 2:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst={0x0, 0x0, 0x4}], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:47 executing program 0:
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000040)=0x7fffffffffffffff)
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r1, 0x0, 0xcf, 0x0, 0x0)
mmap$qrtrtun(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x30, r1, 0x9)
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f00000010c0)={"b2351c2d2eca98b5f8683191b549a394", 0x0, 0x0, {0xffff}, {0x8, 0x7}, 0x8, [0x9, 0x101, 0x100000001, 0x1ff, 0x401, 0x73d, 0x3, 0x3, 0x2, 0x7, 0xffffffff, 0x4, 0x4, 0x5, 0xffffffffffffffff, 0x2]})
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc0c89425, &(0x7f00000012c0)={"9f0a7f93c1692aaa28cecf1a59cb4a6c", 0x0, r2, {0x8000, 0x8}, {0x1, 0x7}, 0xffffffff, [0x1ff, 0xff, 0x0, 0xffffffffffffff2b, 0x0, 0x1, 0x9, 0x401, 0x1, 0x7ff, 0xc2, 0x7, 0x46, 0xfffffffffffffffa, 0x1, 0x5]})
openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x101002, 0x0)
03:50:47 executing program 3:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst={0x0, 0x0, 0x2}], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:47 executing program 5:
r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/protocols\x00')
setsockopt$MRT_DEL_MFC_PROXY(r0, 0x0, 0xd3, &(0x7f0000000180)={@loopback, @private=0xa010100, 0xffffffffffffffff, "ef74a1555e7433c81e10d52e1c93f1df457a422f3b8ba8c2b4ba06bbbd566fc6", 0x6f, 0x67, 0x80000001, 0x7}, 0x3c)
read$qrtrtun(r0, &(0x7f0000000040)=""/85, 0x55)
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r1, 0x0, 0xcf, 0x0, 0x0)
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r1, 0xc0c89425, &(0x7f0000000240)={"80152cff7f0000de1c8fa5c687722ab3", 0x0, 0x0, {0x80000001, 0xfffffffd}, {0x4, 0x3e7}, 0xfffffffffffffffb, [0x400, 0x0, 0x0, 0x5, 0x0, 0x9, 0x8000, 0x9, 0xab6, 0x100, 0xffffffffffffffff, 0xfffffffffffffffb, 0x81, 0x4, 0x6, 0xffff]})
bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000001c0)={0x1}, 0x8)
read$qrtrtun(r0, &(0x7f00000000c0)=""/156, 0x9c)
r2 = memfd_secret(0x80000)
write$qrtrtun(r2, &(0x7f0000000340)="94e8df7197f0b3f3f159270d688d2baf4e91c8f3ce2ef1f658ed46a9435d44293c28a308895d4bbcc6148800888eef237f257a04676f8550534879d7d7bccfb5feac818558f8567d618b5526ef9c40778be760a4b99355cd79fdf96d22d802533268db23f44c5498497c5dc8e07e32121995eb0d8b0ab4fabad38dfa3c4b640afc380b580d81267c4d18a31c384636647f7a9b8d6cd00752308a022c75c9ad3a9e250d1788a5f5279fe69aa45dde45d9e62382d679d3a0b12c198e0897c8999e96e6c25a0f1e853b60981b36d7b0d651fee83fffc270584734586e79ae91eebb2253b752c24b223e77b0f6d5d2f3a7bb6ee4", 0xf2)
bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000440)={0xffff7fff}, 0x8)
ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, &(0x7f0000000000)={0xfff, 0x6})
syz_open_procfs(0x0, &(0x7f0000000200)='net/protocols\x00') (async)
setsockopt$MRT_DEL_MFC_PROXY(r0, 0x0, 0xd3, &(0x7f0000000180)={@loopback, @private=0xa010100, 0xffffffffffffffff, "ef74a1555e7433c81e10d52e1c93f1df457a422f3b8ba8c2b4ba06bbbd566fc6", 0x6f, 0x67, 0x80000001, 0x7}, 0x3c) (async)
read$qrtrtun(r0, &(0x7f0000000040)=""/85, 0x55) (async)
syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00') (async)
setsockopt$MRT_ASSERT(r1, 0x0, 0xcf, 0x0, 0x0) (async)
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r1, 0xc0c89425, &(0x7f0000000240)={"80152cff7f0000de1c8fa5c687722ab3", 0x0, 0x0, {0x80000001, 0xfffffffd}, {0x4, 0x3e7}, 0xfffffffffffffffb, [0x400, 0x0, 0x0, 0x5, 0x0, 0x9, 0x8000, 0x9, 0xab6, 0x100, 0xffffffffffffffff, 0xfffffffffffffffb, 0x81, 0x4, 0x6, 0xffff]}) (async)
bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000001c0)={0x1}, 0x8) (async)
read$qrtrtun(r0, &(0x7f00000000c0)=""/156, 0x9c) (async)
memfd_secret(0x80000) (async)
write$qrtrtun(r2, &(0x7f0000000340)="94e8df7197f0b3f3f159270d688d2baf4e91c8f3ce2ef1f658ed46a9435d44293c28a308895d4bbcc6148800888eef237f257a04676f8550534879d7d7bccfb5feac818558f8567d618b5526ef9c40778be760a4b99355cd79fdf96d22d802533268db23f44c5498497c5dc8e07e32121995eb0d8b0ab4fabad38dfa3c4b640afc380b580d81267c4d18a31c384636647f7a9b8d6cd00752308a022c75c9ad3a9e250d1788a5f5279fe69aa45dde45d9e62382d679d3a0b12c198e0897c8999e96e6c25a0f1e853b60981b36d7b0d651fee83fffc270584734586e79ae91eebb2253b752c24b223e77b0f6d5d2f3a7bb6ee4", 0xf2) (async)
bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000440)={0xffff7fff}, 0x8) (async)
ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, &(0x7f0000000000)={0xfff, 0x6}) (async)
03:50:47 executing program 2:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst={0x0, 0x0, 0x5}], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:47 executing program 1:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f00000010c0)={"a1a21fbc407553e3a212b80e9416b832", 0x0, 0x0, {0x8000, 0x9}, {0x0, 0x2c8}, 0x31e, [0x2, 0x0, 0x3, 0x80000000, 0x8000000000000000, 0x0, 0x1, 0x3, 0x2, 0x9, 0x2, 0x1d, 0xffff, 0x200, 0x200, 0x540]})
03:50:47 executing program 4:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) (async)
r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10)
r2 = syz_genetlink_get_family_id$nbd(&(0x7f0000000040), 0xffffffffffffffff)
sendmsg$NBD_CMD_RECONFIGURE(r1, &(0x7f0000001140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000080)={&(0x7f00000010c0)={0x58, r2, 0x100, 0x70bd2b, 0x25dfdbfc, {}, [@NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x8d98}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x8000000000000001}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x9}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x5}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0xfff}]}, 0x58}}, 0x44840)
r3 = syz_genetlink_get_family_id$nbd(&(0x7f00000011c0), r1)
sendmsg$NBD_CMD_STATUS(r1, &(0x7f0000001300)={&(0x7f0000001180)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000012c0)={&(0x7f0000001200)={0x58, r3, 0x531, 0x70bd2a, 0x25dfdbfd, {}, [@NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x5}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_SERVER_FLAGS={0xc}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x3}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x14}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x9}]}, 0x58}, 0x1, 0x0, 0x0, 0x10}, 0x800) (async)
sendmsg$NBD_CMD_STATUS(r1, &(0x7f0000001300)={&(0x7f0000001180)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000012c0)={&(0x7f0000001200)={0x58, r3, 0x531, 0x70bd2a, 0x25dfdbfd, {}, [@NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x5}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_SERVER_FLAGS={0xc}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x3}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x14}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x9}]}, 0x58}, 0x1, 0x0, 0x0, 0x10}, 0x800)
03:50:47 executing program 3:
bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0)
03:50:47 executing program 0:
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000040)=0x7fffffffffffffff) (async)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000040)=0x7fffffffffffffff)
syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00') (async)
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r1, 0x0, 0xcf, 0x0, 0x0)
mmap$qrtrtun(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x30, r1, 0x9)
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f00000010c0)={"b2351c2d2eca98b5f8683191b549a394", 0x0, 0x0, {0xffff}, {0x8, 0x7}, 0x8, [0x9, 0x101, 0x100000001, 0x1ff, 0x401, 0x73d, 0x3, 0x3, 0x2, 0x7, 0xffffffff, 0x4, 0x4, 0x5, 0xffffffffffffffff, 0x2]}) (async)
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f00000010c0)={"b2351c2d2eca98b5f8683191b549a394", 0x0, 0x0, {0xffff}, {0x8, 0x7}, 0x8, [0x9, 0x101, 0x100000001, 0x1ff, 0x401, 0x73d, 0x3, 0x3, 0x2, 0x7, 0xffffffff, 0x4, 0x4, 0x5, 0xffffffffffffffff, 0x2]})
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc0c89425, &(0x7f00000012c0)={"9f0a7f93c1692aaa28cecf1a59cb4a6c", 0x0, r2, {0x8000, 0x8}, {0x1, 0x7}, 0xffffffff, [0x1ff, 0xff, 0x0, 0xffffffffffffff2b, 0x0, 0x1, 0x9, 0x401, 0x1, 0x7ff, 0xc2, 0x7, 0x46, 0xfffffffffffffffa, 0x1, 0x5]})
openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x101002, 0x0)
03:50:47 executing program 5:
r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/protocols\x00')
read$qrtrtun(r0, &(0x7f0000000040)=""/85, 0x55)
syz_open_procfs(0x0, &(0x7f0000000000)='net/fib_trie\x00')
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r1, 0x0, 0xcf, 0x0, 0x0)
r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r2, 0x0, 0xcf, 0x0, 0x0)
write$P9_RSTATu(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="7a0000007d0100009d0844ff0f887f5e15020300000006000000c9a90827c524b57b86c3eabb000e007e65742f70726f746f636f6c73000e000087007d25b3ab2b255b0100570e006e657400000000000000076c730000000000000000f7000900000000000000bc98caa985bba5922200"/127, @ANYRES32=0xee00, @ANYRES16=r2, @ANYRES32=0x0], 0x7a)
r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r3, 0x0, 0xcf, 0x0, 0x0)
r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/nf_conntrack_expect\x00')
ioctl$BLKSECTGET(r4, 0x1267, &(0x7f0000000180))
read$qrtrtun(r0, &(0x7f00000000c0)=""/156, 0x9c)
03:50:47 executing program 1:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
r1 = memfd_secret(0x0)
write$P9_RATTACH(r1, &(0x7f0000000000)={0x14, 0x69, 0x1, {0x20, 0x1, 0x3}}, 0x14)
write$P9_RCREATE(r1, &(0x7f0000000040)={0x18, 0x73, 0x2, {{0x10, 0x0, 0x7}, 0xffffffff}}, 0x18)
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
03:50:47 executing program 2:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst={0x0, 0x0, 0x6}], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:47 executing program 0:
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000040)=0x7fffffffffffffff) (async)
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000) (async)
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r1, 0x0, 0xcf, 0x0, 0x0) (async)
mmap$qrtrtun(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x30, r1, 0x9) (async)
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f00000010c0)={"b2351c2d2eca98b5f8683191b549a394", 0x0, 0x0, {0xffff}, {0x8, 0x7}, 0x8, [0x9, 0x101, 0x100000001, 0x1ff, 0x401, 0x73d, 0x3, 0x3, 0x2, 0x7, 0xffffffff, 0x4, 0x4, 0x5, 0xffffffffffffffff, 0x2]})
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc0c89425, &(0x7f00000012c0)={"9f0a7f93c1692aaa28cecf1a59cb4a6c", 0x0, r2, {0x8000, 0x8}, {0x1, 0x7}, 0xffffffff, [0x1ff, 0xff, 0x0, 0xffffffffffffff2b, 0x0, 0x1, 0x9, 0x401, 0x1, 0x7ff, 0xc2, 0x7, 0x46, 0xfffffffffffffffa, 0x1, 0x5]})
openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x101002, 0x0)
03:50:47 executing program 1:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
r1 = memfd_secret(0x0)
write$P9_RATTACH(r1, &(0x7f0000000000)={0x14, 0x69, 0x1, {0x20, 0x1, 0x3}}, 0x14)
write$P9_RCREATE(r1, &(0x7f0000000040)={0x18, 0x73, 0x2, {{0x10, 0x0, 0x7}, 0xffffffff}}, 0x18)
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00') (async)
memfd_secret(0x0) (async)
write$P9_RATTACH(r1, &(0x7f0000000000)={0x14, 0x69, 0x1, {0x20, 0x1, 0x3}}, 0x14) (async)
write$P9_RCREATE(r1, &(0x7f0000000040)={0x18, 0x73, 0x2, {{0x10, 0x0, 0x7}, 0xffffffff}}, 0x18) (async)
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000) (async)
03:50:47 executing program 3:
bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0)
03:50:47 executing program 4:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
sendmsg$IPCTNL_MSG_TIMEOUT_GET(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x1, 0x8, 0x3, 0x0, 0x0, {0x0, 0x0, 0x6}}, 0x14}, 0x1, 0x0, 0x0, 0xc000}, 0x0)
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
r1 = memfd_secret(0x80000)
sendmsg$NFNL_MSG_ACCT_DEL(r1, &(0x7f0000001200)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000011c0)={&(0x7f0000001140)={0x44, 0x3, 0x7, 0x201, 0x0, 0x0, {0x1, 0x0, 0x4}, [@NFACCT_QUOTA={0xc, 0x6, 0x1, 0x0, 0x9}, @NFACCT_PKTS={0xc, 0x2, 0x1, 0x0, 0x1}, @NFACCT_FILTER={0xc, 0x7, 0x0, 0x1, [@NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0xf0}]}, @NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x60c4}]}, 0x44}, 0x1, 0x0, 0x0, 0x4000800}, 0x810)
03:50:47 executing program 5:
r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/protocols\x00')
read$qrtrtun(r0, &(0x7f0000000040)=""/85, 0x55) (async)
syz_open_procfs(0x0, &(0x7f0000000000)='net/fib_trie\x00')
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r1, 0x0, 0xcf, 0x0, 0x0)
r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r2, 0x0, 0xcf, 0x0, 0x0)
write$P9_RSTATu(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="7a0000007d0100009d0844ff0f887f5e15020300000006000000c9a90827c524b57b86c3eabb000e007e65742f70726f746f636f6c73000e000087007d25b3ab2b255b0100570e006e657400000000000000076c730000000000000000f7000900000000000000bc98caa985bba5922200"/127, @ANYRES32=0xee00, @ANYRES16=r2, @ANYRES32=0x0], 0x7a) (async)
r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r3, 0x0, 0xcf, 0x0, 0x0) (async)
r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/nf_conntrack_expect\x00')
ioctl$BLKSECTGET(r4, 0x1267, &(0x7f0000000180))
read$qrtrtun(r0, &(0x7f00000000c0)=""/156, 0x9c)
03:50:47 executing program 0:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0xee01, 0xee01}}, './file0\x00'})
read$qrtrtun(r1, &(0x7f00000010c0)=""/169, 0xa9)
ioctl$BLKROGET(r1, 0x125e, &(0x7f0000000040))
03:50:47 executing program 2:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst={0x0, 0x0, 0x7}], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:47 executing program 3:
bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0)
03:50:47 executing program 0:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0xee01, 0xee01}}, './file0\x00'})
read$qrtrtun(r1, &(0x7f00000010c0)=""/169, 0xa9)
ioctl$BLKROGET(r1, 0x125e, &(0x7f0000000040)) (async)
ioctl$BLKROGET(r1, 0x125e, &(0x7f0000000040))
03:50:47 executing program 3:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x0, 0x0, &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:47 executing program 2:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:47 executing program 4:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00') (async)
sendmsg$IPCTNL_MSG_TIMEOUT_GET(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x1, 0x8, 0x3, 0x0, 0x0, {0x0, 0x0, 0x6}}, 0x14}, 0x1, 0x0, 0x0, 0xc000}, 0x0)
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000) (async)
r1 = memfd_secret(0x80000)
sendmsg$NFNL_MSG_ACCT_DEL(r1, &(0x7f0000001200)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000011c0)={&(0x7f0000001140)={0x44, 0x3, 0x7, 0x201, 0x0, 0x0, {0x1, 0x0, 0x4}, [@NFACCT_QUOTA={0xc, 0x6, 0x1, 0x0, 0x9}, @NFACCT_PKTS={0xc, 0x2, 0x1, 0x0, 0x1}, @NFACCT_FILTER={0xc, 0x7, 0x0, 0x1, [@NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0xf0}]}, @NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x60c4}]}, 0x44}, 0x1, 0x0, 0x0, 0x4000800}, 0x810)
03:50:47 executing program 3:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x0, 0x0, &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:47 executing program 1:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00') (async)
r1 = memfd_secret(0x0)
write$P9_RATTACH(r1, &(0x7f0000000000)={0x14, 0x69, 0x1, {0x20, 0x1, 0x3}}, 0x14) (async)
write$P9_RCREATE(r1, &(0x7f0000000040)={0x18, 0x73, 0x2, {{0x10, 0x0, 0x7}, 0xffffffff}}, 0x18) (async)
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
03:50:47 executing program 5:
r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/protocols\x00')
read$qrtrtun(r0, &(0x7f0000000040)=""/85, 0x55)
syz_open_procfs(0x0, &(0x7f0000000000)='net/fib_trie\x00')
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r1, 0x0, 0xcf, 0x0, 0x0) (async)
r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r2, 0x0, 0xcf, 0x0, 0x0)
write$P9_RSTATu(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="7a0000007d0100009d0844ff0f887f5e15020300000006000000c9a90827c524b57b86c3eabb000e007e65742f70726f746f636f6c73000e000087007d25b3ab2b255b0100570e006e657400000000000000076c730000000000000000f7000900000000000000bc98caa985bba5922200"/127, @ANYRES32=0xee00, @ANYRES16=r2, @ANYRES32=0x0], 0x7a) (async, rerun: 64)
r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00') (rerun: 64)
setsockopt$MRT_ASSERT(r3, 0x0, 0xcf, 0x0, 0x0)
r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/nf_conntrack_expect\x00')
ioctl$BLKSECTGET(r4, 0x1267, &(0x7f0000000180))
read$qrtrtun(r0, &(0x7f00000000c0)=""/156, 0x9c)
03:50:47 executing program 2:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst={0x0, 0x0, 0x0, 0x2}], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:47 executing program 4:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
sendmsg$IPCTNL_MSG_TIMEOUT_GET(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x1, 0x8, 0x3, 0x0, 0x0, {0x0, 0x0, 0x6}}, 0x14}, 0x1, 0x0, 0x0, 0xc000}, 0x0) (async)
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
r1 = memfd_secret(0x80000)
sendmsg$NFNL_MSG_ACCT_DEL(r1, &(0x7f0000001200)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000011c0)={&(0x7f0000001140)={0x44, 0x3, 0x7, 0x201, 0x0, 0x0, {0x1, 0x0, 0x4}, [@NFACCT_QUOTA={0xc, 0x6, 0x1, 0x0, 0x9}, @NFACCT_PKTS={0xc, 0x2, 0x1, 0x0, 0x1}, @NFACCT_FILTER={0xc, 0x7, 0x0, 0x1, [@NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0xf0}]}, @NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x60c4}]}, 0x44}, 0x1, 0x0, 0x0, 0x4000800}, 0x810)
03:50:47 executing program 0:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0xee01, 0xee01}}, './file0\x00'})
read$qrtrtun(r1, &(0x7f00000010c0)=""/169, 0xa9)
ioctl$BLKROGET(r1, 0x125e, &(0x7f0000000040))
syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00') (async)
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000) (async)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0xee01, 0xee01}}, './file0\x00'}) (async)
read$qrtrtun(r1, &(0x7f00000010c0)=""/169, 0xa9) (async)
ioctl$BLKROGET(r1, 0x125e, &(0x7f0000000040)) (async)
03:50:47 executing program 3:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x0, 0x0, &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:47 executing program 1:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/unix\x00')
setsockopt$MRT_ASSERT(r1, 0x0, 0xcf, 0x0, 0x0)
r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r2, 0x0, 0xcf, 0x0, 0x0)
read$qrtrtun(r2, &(0x7f0000000000)=""/29, 0x1d)
03:50:47 executing program 4:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
ioctl$BTRFS_IOC_START_SYNC(r0, 0x80089418, &(0x7f0000000000))
syz_open_procfs(0x0, &(0x7f0000000040)='loginuid\x00')
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r1, 0x0, 0xcf, 0x0, 0x0)
ioctl$BLKBSZGET(r1, 0x80081270, &(0x7f0000000080))
03:50:47 executing program 2:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst={0x0, 0x0, 0x0, 0x3}], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:47 executing program 3:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x0, &(0x7f0000001240), &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:47 executing program 1:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000) (async, rerun: 64)
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/unix\x00') (rerun: 64)
setsockopt$MRT_ASSERT(r1, 0x0, 0xcf, 0x0, 0x0) (async)
r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r2, 0x0, 0xcf, 0x0, 0x0) (async)
read$qrtrtun(r2, &(0x7f0000000000)=""/29, 0x1d)
03:50:47 executing program 0:
bind$phonet(0xffffffffffffffff, &(0x7f0000000000)={0x23, 0x2, 0x5, 0x9}, 0x10)
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8)
r2 = socket$isdn_base(0x22, 0x3, 0x0)
ioctl$IMSETDEVNAME(r2, 0x80184947, &(0x7f0000001180)={0x2, 'syz1\x00'})
epoll_pwait2(r1, &(0x7f00000010c0)=[{}, {}, {}, {}, {}, {}, {}], 0x7, &(0x7f0000000080)={0x0, 0x3938700}, &(0x7f0000001140)={[0xe9]}, 0x8)
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
03:50:47 executing program 4:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
ioctl$BTRFS_IOC_START_SYNC(r0, 0x80089418, &(0x7f0000000000))
syz_open_procfs(0x0, &(0x7f0000000040)='loginuid\x00') (async)
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r1, 0x0, 0xcf, 0x0, 0x0) (async)
ioctl$BLKBSZGET(r1, 0x80081270, &(0x7f0000000080))
03:50:47 executing program 3:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x0, &(0x7f0000001240), &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:47 executing program 2:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst={0x0, 0x0, 0x0, 0x4}], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:47 executing program 4:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
ioctl$BTRFS_IOC_START_SYNC(r0, 0x80089418, &(0x7f0000000000))
syz_open_procfs(0x0, &(0x7f0000000040)='loginuid\x00')
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r1, 0x0, 0xcf, 0x0, 0x0)
ioctl$BLKBSZGET(r1, 0x80081270, &(0x7f0000000080))
syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00') (async)
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000) (async)
ioctl$BTRFS_IOC_START_SYNC(r0, 0x80089418, &(0x7f0000000000)) (async)
syz_open_procfs(0x0, &(0x7f0000000040)='loginuid\x00') (async)
syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00') (async)
setsockopt$MRT_ASSERT(r1, 0x0, 0xcf, 0x0, 0x0) (async)
ioctl$BLKBSZGET(r1, 0x80081270, &(0x7f0000000080)) (async)
03:50:47 executing program 2:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst={0x0, 0x0, 0x0, 0x5}], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:47 executing program 0:
bind$phonet(0xffffffffffffffff, &(0x7f0000000000)={0x23, 0x2, 0x5, 0x9}, 0x10)
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8)
r2 = socket$isdn_base(0x22, 0x3, 0x0)
ioctl$IMSETDEVNAME(r2, 0x80184947, &(0x7f0000001180)={0x2, 'syz1\x00'})
epoll_pwait2(r1, &(0x7f00000010c0)=[{}, {}, {}, {}, {}, {}, {}], 0x7, &(0x7f0000000080)={0x0, 0x3938700}, &(0x7f0000001140)={[0xe9]}, 0x8)
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
bind$phonet(0xffffffffffffffff, &(0x7f0000000000)={0x23, 0x2, 0x5, 0x9}, 0x10) (async)
syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00') (async)
bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) (async)
socket$isdn_base(0x22, 0x3, 0x0) (async)
ioctl$IMSETDEVNAME(r2, 0x80184947, &(0x7f0000001180)={0x2, 'syz1\x00'}) (async)
epoll_pwait2(r1, &(0x7f00000010c0)=[{}, {}, {}, {}, {}, {}, {}], 0x7, &(0x7f0000000080)={0x0, 0x3938700}, &(0x7f0000001140)={[0xe9]}, 0x8) (async)
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000) (async)
03:50:47 executing program 3:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x0, &(0x7f0000001240), &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:47 executing program 1:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/unix\x00')
setsockopt$MRT_ASSERT(r1, 0x0, 0xcf, 0x0, 0x0) (async)
r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r2, 0x0, 0xcf, 0x0, 0x0) (async)
read$qrtrtun(r2, &(0x7f0000000000)=""/29, 0x1d)
03:50:47 executing program 4:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0xee00, 0x0}}, './file0\x00'})
r4 = syz_io_uring_setup(0x4016, &(0x7f0000000040)={0x0, 0x6e0f, 0x40, 0x1, 0x2bf}, &(0x7f0000001140), &(0x7f00000010c0))
r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r5, 0x0, 0xcf, 0x0, 0x0)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000001b40)={{0x1, 0x1, 0x18, r4, {r2, r3}}, './file0\x00'})
ioctl$IOC_PR_RESERVE(r6, 0x401070c9, &(0x7f0000001b80)={0x401, 0x4, 0x1})
r7 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001380)={0x6, 0xa, &(0x7f0000001180)=ANY=[@ANYBLOB="1800000000800000000000000600000018350000050000000000000000000000181a0000", @ANYRES32=r1, @ANYBLOB="0000000000000000000100000000f0ffff34c59b5474a7aff39e5b9f512800000000"], &(0x7f0000001200)='syzkaller\x00', 0x1, 0xa0, &(0x7f00000012c0)=""/160, 0x40f00, 0x14, '\x00', 0x0, 0x25, r1, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001240)={0x4, 0x6, 0xd4c, 0x6}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x490}, 0x90)
sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000001ac0)={&(0x7f0000001a00)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001a80)={&(0x7f0000001a40)={0x28, 0x4, 0x6, 0x201, 0x0, 0x0, {0x3, 0x0, 0xa}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}]}, 0x28}, 0x1, 0x0, 0x0, 0x41}, 0x4000)
ioctl$BTRFS_IOC_START_SYNC(r0, 0x80089418, &(0x7f0000001480)=0x0)
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r4, 0xc0c89425, &(0x7f00000014c0)={"10d9f9c4e28744502344b92301984750", r8, 0x0, {0x3, 0x4000000}, {0x800, 0x1}, 0x19, [0x100, 0x4, 0x4000000000, 0xffff, 0x4, 0x80, 0x99e, 0x6, 0x1240, 0x10, 0x2e0bb7f6, 0x2, 0x1, 0x2, 0xc58e, 0x6]})
r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r9, 0x0, 0xcf, 0x0, 0x0)
bpf$ITER_CREATE(0x21, &(0x7f0000001b00)={r9}, 0x8)
r10 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r10, 0x0, 0xcf, 0x0, 0x0)
bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000001440)={r5, r7, 0x0, r10}, 0x10)
r11 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001800)={0x6, 0x5, &(0x7f00000015c0)=ANY=[@ANYBLOB="1800000000f80002000000000000000000002d00000085000000350000009500000000000000"], &(0x7f0000001600)='GPL\x00', 0x4, 0xbf, &(0x7f0000001640)=""/191, 0x41100, 0x40, '\x00', 0x0, 0x25, r1, 0x8, &(0x7f0000001700)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000001740)={0x5, 0x0, 0x48, 0x4}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001780)=[r1, r0, r5, r0, r0, r0, r1, r5, r5, r1], &(0x7f00000017c0)=[{0x2, 0x1, 0xc, 0x7}, {0x4, 0x3, 0xb, 0x6}, {0x5, 0x3, 0xb, 0x4}, {0x0, 0x3, 0x5}], 0x10, 0x82}, 0x90)
write$P9_RWRITE(r0, &(0x7f00000019c0)={0xb, 0x77, 0x1, 0x1}, 0xb)
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000001940)={'syztnl2\x00', &(0x7f00000018c0)={'syztnl1\x00', 0x0, 0x2f, 0x4, 0x5f, 0x7, 0x0, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x1, 0x40, 0x6, 0x4}})
bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000001980)=ANY=[@ANYRES32=r11, @ANYRES32=r12, @ANYBLOB="95e7f70105000000"], 0x10)
syz_genetlink_get_family_id$l2tp(&(0x7f0000001100), r1)
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
03:50:47 executing program 5:
r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/protocols\x00')
read$qrtrtun(r0, &(0x7f0000000040)=""/85, 0x55)
socket$l2tp(0x2, 0x2, 0x73)
read$qrtrtun(r0, &(0x7f00000000c0)=""/156, 0x9c)
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/netstat\x00')
r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$NBD_CMD_RECONFIGURE(r2, &(0x7f0000001980)={&(0x7f0000001880)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000001940)={&(0x7f00000018c0)={0x14}, 0x14}}, 0x0)
sendmsg$NBD_CMD_STATUS(r2, &(0x7f0000000380)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000001c0)={&(0x7f0000000300)={0x5c, 0x0, 0x8, 0x70bd2c, 0x25dfdbfe, {}, [@NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x47c6271a}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x2}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x3}, @NBD_ATTR_BACKEND_IDENTIFIER={0x4}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x3}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x6}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}]}, 0x5c}, 0x1, 0x0, 0x0, 0x20008000}, 0x1)
read$qrtrtun(r1, &(0x7f0000000240)=""/191, 0xbf)
03:50:48 executing program 3:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:48 executing program 2:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst={0x0, 0x0, 0x0, 0x6}], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:48 executing program 1:
ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000080)={'ip6tnl0\x00', &(0x7f0000000000)={'ip6_vti0\x00', 0x0, 0x0, 0x0, 0x4, 0x20, 0x20, @dev={0xfe, 0x80, '\x00', 0x16}, @rand_addr=' \x01\x00', 0x20, 0x8, 0x800, 0x1000}})
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r1, 0x0, 0xcf, 0x0, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f00000010c0)=@bloom_filter={0x1e, 0x7, 0xfffffffe, 0x9, 0x100, 0x1, 0x8, '\x00', r0, r1, 0x0, 0x4, 0x5, 0xd}, 0x48)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f00000011c0)=[@in6={0xa, 0x4e22, 0x4, @mcast2, 0x1f}, @in={0x2, 0x4e24, @local}, @in={0x2, 0x4e21, @broadcast}, @in={0x2, 0x4e20, @empty}, @in={0x2, 0x4e20, @broadcast}], 0x5c)
r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r2, &(0x7f00000000c0)=""/4096, 0x1000)
r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r3, 0x0, 0xcf, 0x0, 0x0)
ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000001140)={'batadv_slave_0\x00', 0x0})
bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000001180)={r3, r4, 0x25, 0x3, @void}, 0x10)
03:50:48 executing program 0:
bind$phonet(0xffffffffffffffff, &(0x7f0000000000)={0x23, 0x2, 0x5, 0x9}, 0x10)
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8)
r2 = socket$isdn_base(0x22, 0x3, 0x0)
ioctl$IMSETDEVNAME(r2, 0x80184947, &(0x7f0000001180)={0x2, 'syz1\x00'})
epoll_pwait2(r1, &(0x7f00000010c0)=[{}, {}, {}, {}, {}, {}, {}], 0x7, &(0x7f0000000080)={0x0, 0x3938700}, &(0x7f0000001140)={[0xe9]}, 0x8)
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
bind$phonet(0xffffffffffffffff, &(0x7f0000000000)={0x23, 0x2, 0x5, 0x9}, 0x10) (async)
syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00') (async)
bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) (async)
socket$isdn_base(0x22, 0x3, 0x0) (async)
ioctl$IMSETDEVNAME(r2, 0x80184947, &(0x7f0000001180)={0x2, 'syz1\x00'}) (async)
epoll_pwait2(r1, &(0x7f00000010c0)=[{}, {}, {}, {}, {}, {}, {}], 0x7, &(0x7f0000000080)={0x0, 0x3938700}, &(0x7f0000001140)={[0xe9]}, 0x8) (async)
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000) (async)
03:50:48 executing program 2:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst={0x0, 0x0, 0x0, 0x7}], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:48 executing program 3:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:48 executing program 5:
r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/protocols\x00')
read$qrtrtun(r0, &(0x7f0000000040)=""/85, 0x55)
socket$l2tp(0x2, 0x2, 0x73) (async)
read$qrtrtun(r0, &(0x7f00000000c0)=""/156, 0x9c)
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/netstat\x00') (async)
r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$NBD_CMD_RECONFIGURE(r2, &(0x7f0000001980)={&(0x7f0000001880)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000001940)={&(0x7f00000018c0)={0x14}, 0x14}}, 0x0)
sendmsg$NBD_CMD_STATUS(r2, &(0x7f0000000380)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000001c0)={&(0x7f0000000300)={0x5c, 0x0, 0x8, 0x70bd2c, 0x25dfdbfe, {}, [@NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x47c6271a}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x2}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x3}, @NBD_ATTR_BACKEND_IDENTIFIER={0x4}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x3}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x6}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}]}, 0x5c}, 0x1, 0x0, 0x0, 0x20008000}, 0x1) (async)
read$qrtrtun(r1, &(0x7f0000000240)=""/191, 0xbf)
03:50:48 executing program 4:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0xee00, 0x0}}, './file0\x00'}) (async)
r4 = syz_io_uring_setup(0x4016, &(0x7f0000000040)={0x0, 0x6e0f, 0x40, 0x1, 0x2bf}, &(0x7f0000001140), &(0x7f00000010c0))
r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r5, 0x0, 0xcf, 0x0, 0x0)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000001b40)={{0x1, 0x1, 0x18, r4, {r2, r3}}, './file0\x00'})
ioctl$IOC_PR_RESERVE(r6, 0x401070c9, &(0x7f0000001b80)={0x401, 0x4, 0x1}) (async)
r7 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001380)={0x6, 0xa, &(0x7f0000001180)=ANY=[@ANYBLOB="1800000000800000000000000600000018350000050000000000000000000000181a0000", @ANYRES32=r1, @ANYBLOB="0000000000000000000100000000f0ffff34c59b5474a7aff39e5b9f512800000000"], &(0x7f0000001200)='syzkaller\x00', 0x1, 0xa0, &(0x7f00000012c0)=""/160, 0x40f00, 0x14, '\x00', 0x0, 0x25, r1, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001240)={0x4, 0x6, 0xd4c, 0x6}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x490}, 0x90) (async)
sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000001ac0)={&(0x7f0000001a00)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001a80)={&(0x7f0000001a40)={0x28, 0x4, 0x6, 0x201, 0x0, 0x0, {0x3, 0x0, 0xa}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}]}, 0x28}, 0x1, 0x0, 0x0, 0x41}, 0x4000)
ioctl$BTRFS_IOC_START_SYNC(r0, 0x80089418, &(0x7f0000001480)=0x0)
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r4, 0xc0c89425, &(0x7f00000014c0)={"10d9f9c4e28744502344b92301984750", r8, 0x0, {0x3, 0x4000000}, {0x800, 0x1}, 0x19, [0x100, 0x4, 0x4000000000, 0xffff, 0x4, 0x80, 0x99e, 0x6, 0x1240, 0x10, 0x2e0bb7f6, 0x2, 0x1, 0x2, 0xc58e, 0x6]}) (async, rerun: 64)
r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00') (rerun: 64)
setsockopt$MRT_ASSERT(r9, 0x0, 0xcf, 0x0, 0x0) (async)
bpf$ITER_CREATE(0x21, &(0x7f0000001b00)={r9}, 0x8)
r10 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r10, 0x0, 0xcf, 0x0, 0x0)
bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000001440)={r5, r7, 0x0, r10}, 0x10) (async, rerun: 64)
r11 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001800)={0x6, 0x5, &(0x7f00000015c0)=ANY=[@ANYBLOB="1800000000f80002000000000000000000002d00000085000000350000009500000000000000"], &(0x7f0000001600)='GPL\x00', 0x4, 0xbf, &(0x7f0000001640)=""/191, 0x41100, 0x40, '\x00', 0x0, 0x25, r1, 0x8, &(0x7f0000001700)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000001740)={0x5, 0x0, 0x48, 0x4}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001780)=[r1, r0, r5, r0, r0, r0, r1, r5, r5, r1], &(0x7f00000017c0)=[{0x2, 0x1, 0xc, 0x7}, {0x4, 0x3, 0xb, 0x6}, {0x5, 0x3, 0xb, 0x4}, {0x0, 0x3, 0x5}], 0x10, 0x82}, 0x90) (async, rerun: 64)
write$P9_RWRITE(r0, &(0x7f00000019c0)={0xb, 0x77, 0x1, 0x1}, 0xb) (async)
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000001940)={'syztnl2\x00', &(0x7f00000018c0)={'syztnl1\x00', 0x0, 0x2f, 0x4, 0x5f, 0x7, 0x0, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x1, 0x40, 0x6, 0x4}})
bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000001980)=ANY=[@ANYRES32=r11, @ANYRES32=r12, @ANYBLOB="95e7f70105000000"], 0x10) (async)
syz_genetlink_get_family_id$l2tp(&(0x7f0000001100), r1)
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
03:50:48 executing program 1:
ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000080)={'ip6tnl0\x00', &(0x7f0000000000)={'ip6_vti0\x00', 0x0, 0x0, 0x0, 0x4, 0x20, 0x20, @dev={0xfe, 0x80, '\x00', 0x16}, @rand_addr=' \x01\x00', 0x20, 0x8, 0x800, 0x1000}}) (async, rerun: 64)
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00') (rerun: 64)
setsockopt$MRT_ASSERT(r1, 0x0, 0xcf, 0x0, 0x0) (async, rerun: 32)
bpf$MAP_CREATE(0x0, &(0x7f00000010c0)=@bloom_filter={0x1e, 0x7, 0xfffffffe, 0x9, 0x100, 0x1, 0x8, '\x00', r0, r1, 0x0, 0x4, 0x5, 0xd}, 0x48) (async, rerun: 32)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f00000011c0)=[@in6={0xa, 0x4e22, 0x4, @mcast2, 0x1f}, @in={0x2, 0x4e24, @local}, @in={0x2, 0x4e21, @broadcast}, @in={0x2, 0x4e20, @empty}, @in={0x2, 0x4e20, @broadcast}], 0x5c) (async, rerun: 64)
r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00') (rerun: 64)
read$qrtrtun(r2, &(0x7f00000000c0)=""/4096, 0x1000)
r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r3, 0x0, 0xcf, 0x0, 0x0)
ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000001140)={'batadv_slave_0\x00', 0x0})
bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000001180)={r3, r4, 0x25, 0x3, @void}, 0x10)
03:50:48 executing program 3:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:48 executing program 5:
r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/protocols\x00')
read$qrtrtun(r0, &(0x7f0000000040)=""/85, 0x55)
socket$l2tp(0x2, 0x2, 0x73)
read$qrtrtun(r0, &(0x7f00000000c0)=""/156, 0x9c)
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/netstat\x00')
r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$NBD_CMD_RECONFIGURE(r2, &(0x7f0000001980)={&(0x7f0000001880)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000001940)={&(0x7f00000018c0)={0x14}, 0x14}}, 0x0)
sendmsg$NBD_CMD_STATUS(r2, &(0x7f0000000380)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000001c0)={&(0x7f0000000300)={0x5c, 0x0, 0x8, 0x70bd2c, 0x25dfdbfe, {}, [@NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x47c6271a}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x2}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x3}, @NBD_ATTR_BACKEND_IDENTIFIER={0x4}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x3}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x6}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}]}, 0x5c}, 0x1, 0x0, 0x0, 0x20008000}, 0x1)
read$qrtrtun(r1, &(0x7f0000000240)=""/191, 0xbf)
syz_open_procfs(0x0, &(0x7f0000000200)='net/protocols\x00') (async)
read$qrtrtun(r0, &(0x7f0000000040)=""/85, 0x55) (async)
socket$l2tp(0x2, 0x2, 0x73) (async)
read$qrtrtun(r0, &(0x7f00000000c0)=""/156, 0x9c) (async)
syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/netstat\x00') (async)
syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) (async)
sendmsg$NBD_CMD_RECONFIGURE(r2, &(0x7f0000001980)={&(0x7f0000001880)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000001940)={&(0x7f00000018c0)={0x14}, 0x14}}, 0x0) (async)
sendmsg$NBD_CMD_STATUS(r2, &(0x7f0000000380)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000001c0)={&(0x7f0000000300)={0x5c, 0x0, 0x8, 0x70bd2c, 0x25dfdbfe, {}, [@NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x47c6271a}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x2}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x3}, @NBD_ATTR_BACKEND_IDENTIFIER={0x4}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x3}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x6}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}]}, 0x5c}, 0x1, 0x0, 0x0, 0x20008000}, 0x1) (async)
read$qrtrtun(r1, &(0x7f0000000240)=""/191, 0xbf) (async)
03:50:48 executing program 2:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst={0x0, 0x0, 0x0, 0x8}], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:48 executing program 0:
syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r0, 0x0, 0xcf, 0x0, 0x0)
read$qrtrtun(r0, &(0x7f00000012c0)=""/4085, 0xff5)
03:50:48 executing program 3:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst={0x0, 0x0, 0x2}], 0x0, 0xb}, 0x90)
03:50:48 executing program 4:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0xee00, 0x0}}, './file0\x00'})
r4 = syz_io_uring_setup(0x4016, &(0x7f0000000040)={0x0, 0x6e0f, 0x40, 0x1, 0x2bf}, &(0x7f0000001140), &(0x7f00000010c0)) (async)
r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r5, 0x0, 0xcf, 0x0, 0x0)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000001b40)={{0x1, 0x1, 0x18, r4, {r2, r3}}, './file0\x00'})
ioctl$IOC_PR_RESERVE(r6, 0x401070c9, &(0x7f0000001b80)={0x401, 0x4, 0x1})
r7 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001380)={0x6, 0xa, &(0x7f0000001180)=ANY=[@ANYBLOB="1800000000800000000000000600000018350000050000000000000000000000181a0000", @ANYRES32=r1, @ANYBLOB="0000000000000000000100000000f0ffff34c59b5474a7aff39e5b9f512800000000"], &(0x7f0000001200)='syzkaller\x00', 0x1, 0xa0, &(0x7f00000012c0)=""/160, 0x40f00, 0x14, '\x00', 0x0, 0x25, r1, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001240)={0x4, 0x6, 0xd4c, 0x6}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x490}, 0x90) (async)
sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000001ac0)={&(0x7f0000001a00)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001a80)={&(0x7f0000001a40)={0x28, 0x4, 0x6, 0x201, 0x0, 0x0, {0x3, 0x0, 0xa}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}]}, 0x28}, 0x1, 0x0, 0x0, 0x41}, 0x4000) (async)
ioctl$BTRFS_IOC_START_SYNC(r0, 0x80089418, &(0x7f0000001480)=0x0)
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r4, 0xc0c89425, &(0x7f00000014c0)={"10d9f9c4e28744502344b92301984750", r8, 0x0, {0x3, 0x4000000}, {0x800, 0x1}, 0x19, [0x100, 0x4, 0x4000000000, 0xffff, 0x4, 0x80, 0x99e, 0x6, 0x1240, 0x10, 0x2e0bb7f6, 0x2, 0x1, 0x2, 0xc58e, 0x6]}) (async)
r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r9, 0x0, 0xcf, 0x0, 0x0) (async)
bpf$ITER_CREATE(0x21, &(0x7f0000001b00)={r9}, 0x8) (async)
r10 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r10, 0x0, 0xcf, 0x0, 0x0)
bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000001440)={r5, r7, 0x0, r10}, 0x10) (async)
r11 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001800)={0x6, 0x5, &(0x7f00000015c0)=ANY=[@ANYBLOB="1800000000f80002000000000000000000002d00000085000000350000009500000000000000"], &(0x7f0000001600)='GPL\x00', 0x4, 0xbf, &(0x7f0000001640)=""/191, 0x41100, 0x40, '\x00', 0x0, 0x25, r1, 0x8, &(0x7f0000001700)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000001740)={0x5, 0x0, 0x48, 0x4}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001780)=[r1, r0, r5, r0, r0, r0, r1, r5, r5, r1], &(0x7f00000017c0)=[{0x2, 0x1, 0xc, 0x7}, {0x4, 0x3, 0xb, 0x6}, {0x5, 0x3, 0xb, 0x4}, {0x0, 0x3, 0x5}], 0x10, 0x82}, 0x90) (async)
write$P9_RWRITE(r0, &(0x7f00000019c0)={0xb, 0x77, 0x1, 0x1}, 0xb) (async)
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000001940)={'syztnl2\x00', &(0x7f00000018c0)={'syztnl1\x00', 0x0, 0x2f, 0x4, 0x5f, 0x7, 0x0, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x1, 0x40, 0x6, 0x4}})
bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000001980)=ANY=[@ANYRES32=r11, @ANYRES32=r12, @ANYBLOB="95e7f70105000000"], 0x10) (async)
syz_genetlink_get_family_id$l2tp(&(0x7f0000001100), r1)
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
03:50:48 executing program 0:
syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00') (async)
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r0, 0x0, 0xcf, 0x0, 0x0) (async)
read$qrtrtun(r0, &(0x7f00000012c0)=""/4085, 0xff5)
03:50:48 executing program 2:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst={0x0, 0x0, 0x0, 0x9}], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:48 executing program 1:
ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000080)={'ip6tnl0\x00', &(0x7f0000000000)={'ip6_vti0\x00', 0x0, 0x0, 0x0, 0x4, 0x20, 0x20, @dev={0xfe, 0x80, '\x00', 0x16}, @rand_addr=' \x01\x00', 0x20, 0x8, 0x800, 0x1000}})
syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00') (async)
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r1, 0x0, 0xcf, 0x0, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f00000010c0)=@bloom_filter={0x1e, 0x7, 0xfffffffe, 0x9, 0x100, 0x1, 0x8, '\x00', r0, r1, 0x0, 0x4, 0x5, 0xd}, 0x48) (async)
bpf$MAP_CREATE(0x0, &(0x7f00000010c0)=@bloom_filter={0x1e, 0x7, 0xfffffffe, 0x9, 0x100, 0x1, 0x8, '\x00', r0, r1, 0x0, 0x4, 0x5, 0xd}, 0x48)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f00000011c0)=[@in6={0xa, 0x4e22, 0x4, @mcast2, 0x1f}, @in={0x2, 0x4e24, @local}, @in={0x2, 0x4e21, @broadcast}, @in={0x2, 0x4e20, @empty}, @in={0x2, 0x4e20, @broadcast}], 0x5c)
r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r2, &(0x7f00000000c0)=""/4096, 0x1000)
r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r3, 0x0, 0xcf, 0x0, 0x0)
ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000001140)={'batadv_slave_0\x00'}) (async)
ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000001140)={'batadv_slave_0\x00', 0x0})
bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000001180)={r3, r4, 0x25, 0x3, @void}, 0x10)
03:50:48 executing program 5:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r0, 0x0, 0xcf, 0x0, 0x0)
sendmsg$NFT_MSG_GETRULE(r0, &(0x7f00000003c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000380)={&(0x7f0000000240)={0x114, 0x7, 0xa, 0x3, 0x0, 0x0, {0x7, 0x0, 0x5}, [@NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_USERDATA={0xaf, 0x7, 0x1, 0x0, "2dabc18cf1ab93c458b20df8133b4958456e48a3a0605968b5786e7fe0f5cd1fea9f47f8e33736919c271f276d50f7a93295c5d13cbffa078a8b0336c04584b1d5bcf491ecd92e60437556578dba46eb719c1fabccb8a479e077de6e9b51e2b03e588e7d4335bb3de0f3790463229fdbdd922e7c9559abbca7e3e2a06396eab2d260ecefa53f4838c65ab5370b4a19e06f7d1ba46deb842bba742f3b05a992ff38294ee86cc6610173acec"}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_RULE_HANDLE={0xc, 0x3, 0x1, 0x0, 0x1}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_RULE_CHAIN_ID={0x8}]}, 0x114}, 0x1, 0x0, 0x0, 0x20008084}, 0x0)
r1 = syz_open_procfs(0x0, &(0x7f0000000200)='oom_adj\x00')
read$qrtrtun(r1, &(0x7f0000000040)=""/85, 0x55)
read$qrtrtun(r1, &(0x7f00000000c0)=""/156, 0x9c)
r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r2, 0x0, 0xcf, 0x0, 0x0)
write$P9_RMKDIR(r2, &(0x7f00000001c0)={0x14, 0x49, 0x1, {0x0, 0x0, 0x8}}, 0x14)
ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f0000000180))
03:50:48 executing program 0:
syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00') (async)
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r0, 0x0, 0xcf, 0x0, 0x0)
read$qrtrtun(r0, &(0x7f00000012c0)=""/4085, 0xff5)
03:50:48 executing program 4:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
mknodat(r0, &(0x7f0000001100)='./file0\x00', 0x4, 0x1)
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f0000000080))
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r1, 0x0, 0xcf, 0x0, 0x0)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYRES32=0x0, @ANYRES32=0xee01, @ANYBLOB="332f666900690100"])
r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001140)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r3, 0x0, 0xcf, 0x0, 0x0)
setsockopt$MRT_DEL_VIF(r3, 0x0, 0xcb, &(0x7f00000010c0)={0xffffffffffffffff, 0x4, 0xfb, 0xd54, @vifc_lcl_addr=@remote, @broadcast}, 0x10)
kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, 0xffffffffffffffff, 0x7, r1, &(0x7f0000000040)={r2, r0, 0x8000})
03:50:48 executing program 2:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst={0x0, 0x0, 0x0, 0xa}], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:48 executing program 3:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst={0x0, 0x0, 0x2}], 0x0, 0xb}, 0x90)
03:50:48 executing program 5:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r0, 0x0, 0xcf, 0x0, 0x0) (async)
sendmsg$NFT_MSG_GETRULE(r0, &(0x7f00000003c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000380)={&(0x7f0000000240)={0x114, 0x7, 0xa, 0x3, 0x0, 0x0, {0x7, 0x0, 0x5}, [@NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_USERDATA={0xaf, 0x7, 0x1, 0x0, "2dabc18cf1ab93c458b20df8133b4958456e48a3a0605968b5786e7fe0f5cd1fea9f47f8e33736919c271f276d50f7a93295c5d13cbffa078a8b0336c04584b1d5bcf491ecd92e60437556578dba46eb719c1fabccb8a479e077de6e9b51e2b03e588e7d4335bb3de0f3790463229fdbdd922e7c9559abbca7e3e2a06396eab2d260ecefa53f4838c65ab5370b4a19e06f7d1ba46deb842bba742f3b05a992ff38294ee86cc6610173acec"}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_RULE_HANDLE={0xc, 0x3, 0x1, 0x0, 0x1}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_RULE_CHAIN_ID={0x8}]}, 0x114}, 0x1, 0x0, 0x0, 0x20008084}, 0x0) (async)
r1 = syz_open_procfs(0x0, &(0x7f0000000200)='oom_adj\x00')
read$qrtrtun(r1, &(0x7f0000000040)=""/85, 0x55) (async, rerun: 32)
read$qrtrtun(r1, &(0x7f00000000c0)=""/156, 0x9c) (rerun: 32)
r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r2, 0x0, 0xcf, 0x0, 0x0) (async)
write$P9_RMKDIR(r2, &(0x7f00000001c0)={0x14, 0x49, 0x1, {0x0, 0x0, 0x8}}, 0x14) (async, rerun: 64)
ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f0000000180)) (rerun: 64)
03:50:48 executing program 1:
read$qrtrtun(0xffffffffffffffff, &(0x7f00000000c0)=""/4083, 0xff3)
03:50:48 executing program 0:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
03:50:48 executing program 2:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst={0x0, 0x0, 0x0, 0xb}], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:48 executing program 5:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r0, 0x0, 0xcf, 0x0, 0x0) (async)
sendmsg$NFT_MSG_GETRULE(r0, &(0x7f00000003c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000380)={&(0x7f0000000240)={0x114, 0x7, 0xa, 0x3, 0x0, 0x0, {0x7, 0x0, 0x5}, [@NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_USERDATA={0xaf, 0x7, 0x1, 0x0, "2dabc18cf1ab93c458b20df8133b4958456e48a3a0605968b5786e7fe0f5cd1fea9f47f8e33736919c271f276d50f7a93295c5d13cbffa078a8b0336c04584b1d5bcf491ecd92e60437556578dba46eb719c1fabccb8a479e077de6e9b51e2b03e588e7d4335bb3de0f3790463229fdbdd922e7c9559abbca7e3e2a06396eab2d260ecefa53f4838c65ab5370b4a19e06f7d1ba46deb842bba742f3b05a992ff38294ee86cc6610173acec"}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_RULE_HANDLE={0xc, 0x3, 0x1, 0x0, 0x1}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_RULE_CHAIN_ID={0x8}]}, 0x114}, 0x1, 0x0, 0x0, 0x20008084}, 0x0) (async, rerun: 32)
r1 = syz_open_procfs(0x0, &(0x7f0000000200)='oom_adj\x00') (rerun: 32)
read$qrtrtun(r1, &(0x7f0000000040)=""/85, 0x55) (async)
read$qrtrtun(r1, &(0x7f00000000c0)=""/156, 0x9c) (async)
r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r2, 0x0, 0xcf, 0x0, 0x0) (async)
write$P9_RMKDIR(r2, &(0x7f00000001c0)={0x14, 0x49, 0x1, {0x0, 0x0, 0x8}}, 0x14) (async)
ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f0000000180))
03:50:48 executing program 3:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst={0x0, 0x0, 0x2}], 0x0, 0xb}, 0x90)
03:50:48 executing program 4:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
mknodat(r0, &(0x7f0000001100)='./file0\x00', 0x4, 0x1)
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f0000000080))
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r1, 0x0, 0xcf, 0x0, 0x0)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYRES32=0x0, @ANYRES32=0xee01, @ANYBLOB="332f666900690100"])
r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001140)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r3, 0x0, 0xcf, 0x0, 0x0)
setsockopt$MRT_DEL_VIF(r3, 0x0, 0xcb, &(0x7f00000010c0)={0xffffffffffffffff, 0x4, 0xfb, 0xd54, @vifc_lcl_addr=@remote, @broadcast}, 0x10)
kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, 0xffffffffffffffff, 0x7, r1, &(0x7f0000000040)={r2, r0, 0x8000})
syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00') (async)
mknodat(r0, &(0x7f0000001100)='./file0\x00', 0x4, 0x1) (async)
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000) (async)
ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f0000000080)) (async)
syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00') (async)
setsockopt$MRT_ASSERT(r1, 0x0, 0xcf, 0x0, 0x0) (async)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYRES32=0x0, @ANYRES32=0xee01, @ANYBLOB="332f666900690100"]) (async)
syz_open_procfs(0xffffffffffffffff, &(0x7f0000001140)='net/dev_snmp6\x00') (async)
setsockopt$MRT_ASSERT(r3, 0x0, 0xcf, 0x0, 0x0) (async)
setsockopt$MRT_DEL_VIF(r3, 0x0, 0xcb, &(0x7f00000010c0)={0xffffffffffffffff, 0x4, 0xfb, 0xd54, @vifc_lcl_addr=@remote, @broadcast}, 0x10) (async)
kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, 0xffffffffffffffff, 0x7, r1, &(0x7f0000000040)={r2, r0, 0x8000}) (async)
03:50:48 executing program 0:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
03:50:48 executing program 1:
read$qrtrtun(0xffffffffffffffff, &(0x7f00000000c0)=""/4083, 0xff3)
03:50:48 executing program 2:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst={0x0, 0x0, 0x0, 0xc}], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:48 executing program 3:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst={0x0, 0x0, 0x2}], &(0x7f0000001340)='GPL\x00'}, 0x90)
03:50:48 executing program 0:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps\x00') (async)
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000) (async)
03:50:48 executing program 1:
read$qrtrtun(0xffffffffffffffff, &(0x7f00000000c0)=""/4083, 0xff3)
read$qrtrtun(0xffffffffffffffff, &(0x7f00000000c0)=""/4083, 0xff3) (async)
03:50:48 executing program 4:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
mknodat(r0, &(0x7f0000001100)='./file0\x00', 0x4, 0x1)
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f0000000080))
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r1, 0x0, 0xcf, 0x0, 0x0)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYRES32=0x0, @ANYRES32=0xee01, @ANYBLOB="332f666900690100"])
r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001140)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r3, 0x0, 0xcf, 0x0, 0x0)
setsockopt$MRT_DEL_VIF(r3, 0x0, 0xcb, &(0x7f00000010c0)={0xffffffffffffffff, 0x4, 0xfb, 0xd54, @vifc_lcl_addr=@remote, @broadcast}, 0x10)
kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, 0xffffffffffffffff, 0x7, r1, &(0x7f0000000040)={r2, r0, 0x8000})
syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00') (async)
mknodat(r0, &(0x7f0000001100)='./file0\x00', 0x4, 0x1) (async)
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000) (async)
ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f0000000080)) (async)
syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00') (async)
setsockopt$MRT_ASSERT(r1, 0x0, 0xcf, 0x0, 0x0) (async)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYRES32=0x0, @ANYRES32=0xee01, @ANYBLOB="332f666900690100"]) (async)
syz_open_procfs(0xffffffffffffffff, &(0x7f0000001140)='net/dev_snmp6\x00') (async)
setsockopt$MRT_ASSERT(r3, 0x0, 0xcf, 0x0, 0x0) (async)
setsockopt$MRT_DEL_VIF(r3, 0x0, 0xcb, &(0x7f00000010c0)={0xffffffffffffffff, 0x4, 0xfb, 0xd54, @vifc_lcl_addr=@remote, @broadcast}, 0x10) (async)
kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, 0xffffffffffffffff, 0x7, r1, &(0x7f0000000040)={r2, r0, 0x8000}) (async)
03:50:48 executing program 2:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst={0x0, 0x0, 0x0, 0xd}], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:48 executing program 1:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='sched\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r1, 0x0, 0xcf, 0x0, 0x0)
ioctl$SIOCGETSGCNT_IN6(r1, 0x89e1, &(0x7f0000001140)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @rand_addr=' \x01\x00'})
r2 = socket$phonet_pipe(0x23, 0x5, 0x2)
r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r3, 0x0, 0xcf, 0x0, 0x0)
setsockopt$MRT_PIM(r3, 0x0, 0xcf, &(0x7f0000001180)=0x1, 0x4)
r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r4, 0x0, 0xcf, 0x0, 0x0)
openat$bsg(0xffffffffffffff9c, &(0x7f0000001240), 0x4b0a40, 0x0)
sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(r4, &(0x7f0000001100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000010c0)={&(0x7f0000000080)={0x14, 0x7, 0x1, 0x201, 0x0, 0x0, {0x9}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x40004}, 0x20000001)
accept4$phonet_pipe(r2, 0x0, &(0x7f0000000040), 0x80000)
getpid()
r5 = getpid()
r6 = getpid()
kcmp$KCMP_EPOLL_TFD(r6, r5, 0x7, 0xffffffffffffffff, &(0x7f0000001840))
r7 = syz_open_procfs(r6, &(0x7f00000011c0)='timers\x00')
setsockopt$MRT_ADD_MFC_PROXY(r7, 0x0, 0xd2, &(0x7f0000001200)={@multicast2, @loopback, 0x1, "f17ae64d727c8aa05772e7d5f814292293e446e7b7dd3a296e05ba76c5ddc6a3", 0x7f, 0x8000, 0x1ff, 0x4}, 0x3c)
03:50:48 executing program 3:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst], 0x0, 0xb}, 0x90)
03:50:48 executing program 2:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst={0x0, 0x0, 0x0, 0xe}], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:48 executing program 3:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst={0x0, 0x3}], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:48 executing program 1:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='sched\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000) (async)
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r1, 0x0, 0xcf, 0x0, 0x0) (async)
ioctl$SIOCGETSGCNT_IN6(r1, 0x89e1, &(0x7f0000001140)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @rand_addr=' \x01\x00'})
r2 = socket$phonet_pipe(0x23, 0x5, 0x2) (async)
r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r3, 0x0, 0xcf, 0x0, 0x0)
setsockopt$MRT_PIM(r3, 0x0, 0xcf, &(0x7f0000001180)=0x1, 0x4) (async)
r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r4, 0x0, 0xcf, 0x0, 0x0) (async)
openat$bsg(0xffffffffffffff9c, &(0x7f0000001240), 0x4b0a40, 0x0) (async)
sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(r4, &(0x7f0000001100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000010c0)={&(0x7f0000000080)={0x14, 0x7, 0x1, 0x201, 0x0, 0x0, {0x9}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x40004}, 0x20000001) (async)
accept4$phonet_pipe(r2, 0x0, &(0x7f0000000040), 0x80000) (async)
getpid() (async)
r5 = getpid()
r6 = getpid()
kcmp$KCMP_EPOLL_TFD(r6, r5, 0x7, 0xffffffffffffffff, &(0x7f0000001840)) (async)
r7 = syz_open_procfs(r6, &(0x7f00000011c0)='timers\x00')
setsockopt$MRT_ADD_MFC_PROXY(r7, 0x0, 0xd2, &(0x7f0000001200)={@multicast2, @loopback, 0x1, "f17ae64d727c8aa05772e7d5f814292293e446e7b7dd3a296e05ba76c5ddc6a3", 0x7f, 0x8000, 0x1ff, 0x4}, 0x3c)
03:50:48 executing program 2:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:48 executing program 4:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r0, 0x0, 0xcf, 0x0, 0x0)
ioctl$SIOCPNGETOBJECT(r0, 0x89e0, &(0x7f0000000040))
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
r2 = epoll_create(0x1)
epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r1, &(0x7f0000000000)={0x80000001})
read$qrtrtun(r1, &(0x7f00000000c0)=""/4096, 0x1000)
03:50:48 executing program 5:
r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/protocols\x00')
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r1, 0x0, 0xcf, 0x0, 0x0)
r2 = getegid()
write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000100)={0x5e, 0x7d, 0x1, {{0x0, 0x42, 0x2, 0x400, {0x4, 0x1, 0x4}, 0x680000, 0x7fffffff, 0x1, 0x5, 0x8, 'ip6gre0\x00', 0x0, '', 0x7, '-].^^\\-'}, 0x7, '@/,,]}*', 0xffffffffffffffff, r2, 0xee00}}, 0x5e)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r1, 0xc018937b, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0, {0xee01, r2}}, './file0\x00'})
read$qrtrtun(r0, &(0x7f0000000040)=""/85, 0x55)
read$qrtrtun(r0, &(0x7f00000000c0)=""/156, 0x9c)
ioctl$SIOCPNADDRESOURCE(r0, 0x89e0, &(0x7f0000000000)=0xfffffba7)
03:50:48 executing program 3:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst={0x0, 0x3}], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:48 executing program 1:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='sched\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r1, 0x0, 0xcf, 0x0, 0x0) (async)
ioctl$SIOCGETSGCNT_IN6(r1, 0x89e1, &(0x7f0000001140)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @rand_addr=' \x01\x00'}) (async)
r2 = socket$phonet_pipe(0x23, 0x5, 0x2) (async)
r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r3, 0x0, 0xcf, 0x0, 0x0) (async)
setsockopt$MRT_PIM(r3, 0x0, 0xcf, &(0x7f0000001180)=0x1, 0x4) (async)
r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r4, 0x0, 0xcf, 0x0, 0x0) (async)
openat$bsg(0xffffffffffffff9c, &(0x7f0000001240), 0x4b0a40, 0x0)
sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(r4, &(0x7f0000001100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000010c0)={&(0x7f0000000080)={0x14, 0x7, 0x1, 0x201, 0x0, 0x0, {0x9}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x40004}, 0x20000001) (async)
accept4$phonet_pipe(r2, 0x0, &(0x7f0000000040), 0x80000) (async)
getpid() (async)
r5 = getpid() (async)
r6 = getpid()
kcmp$KCMP_EPOLL_TFD(r6, r5, 0x7, 0xffffffffffffffff, &(0x7f0000001840))
r7 = syz_open_procfs(r6, &(0x7f00000011c0)='timers\x00')
setsockopt$MRT_ADD_MFC_PROXY(r7, 0x0, 0xd2, &(0x7f0000001200)={@multicast2, @loopback, 0x1, "f17ae64d727c8aa05772e7d5f814292293e446e7b7dd3a296e05ba76c5ddc6a3", 0x7f, 0x8000, 0x1ff, 0x4}, 0x3c)
03:50:48 executing program 5:
r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/protocols\x00')
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r1, 0x0, 0xcf, 0x0, 0x0)
r2 = getegid()
write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000100)={0x5e, 0x7d, 0x1, {{0x0, 0x42, 0x2, 0x400, {0x4, 0x1, 0x4}, 0x680000, 0x7fffffff, 0x1, 0x5, 0x8, 'ip6gre0\x00', 0x0, '', 0x7, '-].^^\\-'}, 0x7, '@/,,]}*', 0xffffffffffffffff, r2, 0xee00}}, 0x5e) (async)
write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000100)={0x5e, 0x7d, 0x1, {{0x0, 0x42, 0x2, 0x400, {0x4, 0x1, 0x4}, 0x680000, 0x7fffffff, 0x1, 0x5, 0x8, 'ip6gre0\x00', 0x0, '', 0x7, '-].^^\\-'}, 0x7, '@/,,]}*', 0xffffffffffffffff, r2, 0xee00}}, 0x5e)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r1, 0xc018937b, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0, {0xee01, r2}}, './file0\x00'})
read$qrtrtun(r0, &(0x7f0000000040)=""/85, 0x55) (async)
read$qrtrtun(r0, &(0x7f0000000040)=""/85, 0x55)
read$qrtrtun(r0, &(0x7f00000000c0)=""/156, 0x9c) (async)
read$qrtrtun(r0, &(0x7f00000000c0)=""/156, 0x9c)
ioctl$SIOCPNADDRESOURCE(r0, 0x89e0, &(0x7f0000000000)=0xfffffba7)
03:50:48 executing program 4:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r0, 0x0, 0xcf, 0x0, 0x0)
ioctl$SIOCPNGETOBJECT(r0, 0x89e0, &(0x7f0000000040))
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
r2 = epoll_create(0x1)
epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r1, &(0x7f0000000000)={0x80000001})
read$qrtrtun(r1, &(0x7f00000000c0)=""/4096, 0x1000)
syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00') (async)
setsockopt$MRT_ASSERT(r0, 0x0, 0xcf, 0x0, 0x0) (async)
ioctl$SIOCPNGETOBJECT(r0, 0x89e0, &(0x7f0000000040)) (async)
syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00') (async)
epoll_create(0x1) (async)
epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r1, &(0x7f0000000000)={0x80000001}) (async)
read$qrtrtun(r1, &(0x7f00000000c0)=""/4096, 0x1000) (async)
03:50:48 executing program 3:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst={0x0, 0x3}], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:48 executing program 2:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst={0x0, 0x0, 0x0, 0x0, 0x2}], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:48 executing program 5:
r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/protocols\x00')
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r1, 0x0, 0xcf, 0x0, 0x0)
r2 = getegid()
write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000100)={0x5e, 0x7d, 0x1, {{0x0, 0x42, 0x2, 0x400, {0x4, 0x1, 0x4}, 0x680000, 0x7fffffff, 0x1, 0x5, 0x8, 'ip6gre0\x00', 0x0, '', 0x7, '-].^^\\-'}, 0x7, '@/,,]}*', 0xffffffffffffffff, r2, 0xee00}}, 0x5e)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r1, 0xc018937b, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0, {0xee01, r2}}, './file0\x00'}) (async)
read$qrtrtun(r0, &(0x7f0000000040)=""/85, 0x55) (async)
read$qrtrtun(r0, &(0x7f00000000c0)=""/156, 0x9c)
ioctl$SIOCPNADDRESOURCE(r0, 0x89e0, &(0x7f0000000000)=0xfffffba7)
03:50:48 executing program 1:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='io\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
03:50:48 executing program 4:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r0, 0x0, 0xcf, 0x0, 0x0)
ioctl$SIOCPNGETOBJECT(r0, 0x89e0, &(0x7f0000000040)) (async)
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00') (async)
r2 = epoll_create(0x1)
epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r1, &(0x7f0000000000)={0x80000001}) (async)
read$qrtrtun(r1, &(0x7f00000000c0)=""/4096, 0x1000)
03:50:48 executing program 2:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst={0x0, 0x0, 0x0, 0x0, 0x3}], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:48 executing program 1:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='io\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
03:50:48 executing program 3:
bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0)
03:50:48 executing program 5:
r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/protocols\x00')
r1 = syz_open_dev$loop(&(0x7f0000000000), 0x7, 0x208000)
ioctl$BLKROSET(r1, 0x125d, &(0x7f0000000180)=0x5)
read$qrtrtun(r0, &(0x7f0000000040)=""/85, 0x55)
read$qrtrtun(r0, &(0x7f00000000c0)=""/156, 0x9c)
r2 = timerfd_create(0x7, 0x80000)
ioctl$TFD_IOC_SET_TICKS(r2, 0x40085400, &(0x7f00000001c0)=0xcef4)
03:50:48 executing program 4:
syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
r0 = memfd_secret(0x80000)
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r1, 0x0, 0xcf, 0x0, 0x0)
openat$bsg(0xffffffffffffff9c, &(0x7f0000000080), 0x525400, 0x0)
ioctl$BTRFS_IOC_START_SYNC(r1, 0x80089418, &(0x7f0000000040))
setsockopt$MRT_DEL_MFC_PROXY(r0, 0x0, 0xd3, &(0x7f0000000000)={@remote, @rand_addr=0x64010100, 0x0, "dad81f04000000001100010000000000944a1d0799b395026ae866ef32810200", 0xb, 0x6, 0x7fffffff, 0x1}, 0x3c)
03:50:48 executing program 2:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst={0x0, 0x0, 0x0, 0x0, 0x4}], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:48 executing program 3:
bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0)
03:50:48 executing program 1:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='io\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000) (async)
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
03:50:48 executing program 5:
r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/protocols\x00')
r1 = syz_open_dev$loop(&(0x7f0000000000), 0x7, 0x208000)
ioctl$BLKROSET(r1, 0x125d, &(0x7f0000000180)=0x5)
read$qrtrtun(r0, &(0x7f0000000040)=""/85, 0x55)
read$qrtrtun(r0, &(0x7f00000000c0)=""/156, 0x9c)
r2 = timerfd_create(0x7, 0x80000)
ioctl$TFD_IOC_SET_TICKS(r2, 0x40085400, &(0x7f00000001c0)=0xcef4)
syz_open_procfs(0x0, &(0x7f0000000200)='net/protocols\x00') (async)
syz_open_dev$loop(&(0x7f0000000000), 0x7, 0x208000) (async)
ioctl$BLKROSET(r1, 0x125d, &(0x7f0000000180)=0x5) (async)
read$qrtrtun(r0, &(0x7f0000000040)=""/85, 0x55) (async)
read$qrtrtun(r0, &(0x7f00000000c0)=""/156, 0x9c) (async)
timerfd_create(0x7, 0x80000) (async)
ioctl$TFD_IOC_SET_TICKS(r2, 0x40085400, &(0x7f00000001c0)=0xcef4) (async)
03:50:48 executing program 1:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r1, 0x0, 0xcf, 0x0, 0x0)
sendmsg$IPCTNL_MSG_EXP_GET(r1, &(0x7f0000000300)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x801010}, 0xc, &(0x7f00000002c0)={&(0x7f0000000040)={0x248, 0x1, 0x2, 0x101, 0x0, 0x0, {0x3, 0x0, 0x3}, [@CTA_EXPECT_HELP_NAME={0x8, 0x6, 'RAS\x00'}, @CTA_EXPECT_MASK={0x3c, 0x3, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x6}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @remote}, {0x14, 0x4, @mcast1}}}]}, @CTA_EXPECT_NAT={0x190, 0xa, 0x0, 0x1, [@CTA_EXPECT_NAT_TUPLE={0x78, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x3a}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0x1a}}}, {0x14, 0x4, @remote}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x8, 0x2, @remote}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x6}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8, 0x2, @empty}}}]}, @CTA_EXPECT_NAT_TUPLE={0x48, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8, 0x2, @loopback}}}]}, @CTA_EXPECT_NAT_TUPLE={0x6c, 0x2, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @broadcast}, {0x8, 0x2, @rand_addr=0x64010100}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @private1}, {0x14, 0x4, @dev={0xfe, 0x80, '\x00', 0x28}}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}]}, @CTA_EXPECT_NAT_TUPLE={0x54, 0x2, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast2}, {0x8, 0x2, @empty}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, {0x14, 0x4, @private2={0xfc, 0x2, '\x00', 0x1}}}}]}, @CTA_EXPECT_NAT_TUPLE={0xc, 0x2, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6}]}]}, @CTA_EXPECT_MASTER={0x50, 0x1, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x6}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @local}, {0x14, 0x4, @mcast1}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x5}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x3}]}, 0x248}, 0x1, 0x0, 0x0, 0x50050}, 0x20000000)
read$qrtrtun(r0, &(0x7f00000012c0)=""/4105, 0x1009)
03:50:48 executing program 5:
r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/protocols\x00') (async)
r1 = syz_open_dev$loop(&(0x7f0000000000), 0x7, 0x208000)
ioctl$BLKROSET(r1, 0x125d, &(0x7f0000000180)=0x5) (async)
read$qrtrtun(r0, &(0x7f0000000040)=""/85, 0x55)
read$qrtrtun(r0, &(0x7f00000000c0)=""/156, 0x9c)
r2 = timerfd_create(0x7, 0x80000)
ioctl$TFD_IOC_SET_TICKS(r2, 0x40085400, &(0x7f00000001c0)=0xcef4)
03:50:48 executing program 4:
syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
r0 = memfd_secret(0x80000)
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r1, 0x0, 0xcf, 0x0, 0x0) (async)
setsockopt$MRT_ASSERT(r1, 0x0, 0xcf, 0x0, 0x0)
openat$bsg(0xffffffffffffff9c, &(0x7f0000000080), 0x525400, 0x0)
ioctl$BTRFS_IOC_START_SYNC(r1, 0x80089418, &(0x7f0000000040)) (async)
ioctl$BTRFS_IOC_START_SYNC(r1, 0x80089418, &(0x7f0000000040))
setsockopt$MRT_DEL_MFC_PROXY(r0, 0x0, 0xd3, &(0x7f0000000000)={@remote, @rand_addr=0x64010100, 0x0, "dad81f04000000001100010000000000944a1d0799b395026ae866ef32810200", 0xb, 0x6, 0x7fffffff, 0x1}, 0x3c)
03:50:48 executing program 0:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc0c89425, &(0x7f00000014c0)={"bf0f6873b82fe1095ce57e758853fb57", 0x0, 0x0, {0x8, 0x3}, {0x7fffffff, 0xa71}, 0x2, [0xdf, 0x9, 0x400, 0x4, 0xfffffffffffffffc, 0x7000000000000003, 0x6, 0x8551, 0x6, 0x9, 0xfffffffe, 0x4, 0x401, 0x5, 0x5, 0x3f]})
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc0c89425, &(0x7f00000013c0)={"35edce05eda3f4542f444172a0005b12", r1, r1, {0x3, 0x5}, {0x2, 0x3f}, 0x3f, [0x3, 0x6, 0x8, 0x8000000000000001, 0x9, 0x0, 0x1, 0x2, 0x0, 0x20, 0xffffffffffff8001, 0x1e8179e6, 0x7, 0x0, 0x3, 0x45c]})
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc0c89425, &(0x7f00000012c0)={"46444632227204108ff121df56801ad6", r3, r2, {0x80000001, 0x3}, {0x8, 0x5}, 0x6, [0x4, 0x7fffffffffffffff, 0x9, 0x7, 0x1, 0x5, 0x3f, 0x80000001, 0x5, 0x4d1, 0x3, 0x80000001, 0x5, 0x4, 0x9, 0x9]})
r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r4, 0x0, 0xcf, 0x0, 0x0)
write$P9_RREADLINK(r4, &(0x7f0000000000)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10)
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
03:50:48 executing program 2:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst={0x0, 0x0, 0x0, 0x0, 0x5}], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:48 executing program 3:
bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0)
03:50:48 executing program 5:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r0, 0x0, 0xcf, 0x0, 0x0)
ioctl$BLKPG(r0, 0x1269, &(0x7f0000000000)={0x2, 0x0, 0x98, &(0x7f0000000240)={0x9, 0x4, 0xe}})
r1 = syz_open_procfs(0x0, &(0x7f0000000200)='net/protocols\x00')
read$qrtrtun(r1, &(0x7f0000000040)=""/85, 0x55)
read$qrtrtun(r1, &(0x7f00000000c0)=""/156, 0x9c)
03:50:48 executing program 0:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc0c89425, &(0x7f00000014c0)={"bf0f6873b82fe1095ce57e758853fb57", 0x0, 0x0, {0x8, 0x3}, {0x7fffffff, 0xa71}, 0x2, [0xdf, 0x9, 0x400, 0x4, 0xfffffffffffffffc, 0x7000000000000003, 0x6, 0x8551, 0x6, 0x9, 0xfffffffe, 0x4, 0x401, 0x5, 0x5, 0x3f]})
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc0c89425, &(0x7f00000013c0)={"35edce05eda3f4542f444172a0005b12", r1, r1, {0x3, 0x5}, {0x2, 0x3f}, 0x3f, [0x3, 0x6, 0x8, 0x8000000000000001, 0x9, 0x0, 0x1, 0x2, 0x0, 0x20, 0xffffffffffff8001, 0x1e8179e6, 0x7, 0x0, 0x3, 0x45c]})
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc0c89425, &(0x7f00000012c0)={"46444632227204108ff121df56801ad6", r3, r2, {0x80000001, 0x3}, {0x8, 0x5}, 0x6, [0x4, 0x7fffffffffffffff, 0x9, 0x7, 0x1, 0x5, 0x3f, 0x80000001, 0x5, 0x4d1, 0x3, 0x80000001, 0x5, 0x4, 0x9, 0x9]})
r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r4, 0x0, 0xcf, 0x0, 0x0)
write$P9_RREADLINK(r4, &(0x7f0000000000)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10)
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00') (async)
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc0c89425, &(0x7f00000014c0)={"bf0f6873b82fe1095ce57e758853fb57", 0x0, 0x0, {0x8, 0x3}, {0x7fffffff, 0xa71}, 0x2, [0xdf, 0x9, 0x400, 0x4, 0xfffffffffffffffc, 0x7000000000000003, 0x6, 0x8551, 0x6, 0x9, 0xfffffffe, 0x4, 0x401, 0x5, 0x5, 0x3f]}) (async)
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc0c89425, &(0x7f00000013c0)={"35edce05eda3f4542f444172a0005b12", r1, r1, {0x3, 0x5}, {0x2, 0x3f}, 0x3f, [0x3, 0x6, 0x8, 0x8000000000000001, 0x9, 0x0, 0x1, 0x2, 0x0, 0x20, 0xffffffffffff8001, 0x1e8179e6, 0x7, 0x0, 0x3, 0x45c]}) (async)
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc0c89425, &(0x7f00000012c0)={"46444632227204108ff121df56801ad6", r3, r2, {0x80000001, 0x3}, {0x8, 0x5}, 0x6, [0x4, 0x7fffffffffffffff, 0x9, 0x7, 0x1, 0x5, 0x3f, 0x80000001, 0x5, 0x4d1, 0x3, 0x80000001, 0x5, 0x4, 0x9, 0x9]}) (async)
syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00') (async)
setsockopt$MRT_ASSERT(r4, 0x0, 0xcf, 0x0, 0x0) (async)
write$P9_RREADLINK(r4, &(0x7f0000000000)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) (async)
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000) (async)
03:50:48 executing program 1:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00') (async)
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r1, 0x0, 0xcf, 0x0, 0x0)
sendmsg$IPCTNL_MSG_EXP_GET(r1, &(0x7f0000000300)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x801010}, 0xc, &(0x7f00000002c0)={&(0x7f0000000040)={0x248, 0x1, 0x2, 0x101, 0x0, 0x0, {0x3, 0x0, 0x3}, [@CTA_EXPECT_HELP_NAME={0x8, 0x6, 'RAS\x00'}, @CTA_EXPECT_MASK={0x3c, 0x3, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x6}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @remote}, {0x14, 0x4, @mcast1}}}]}, @CTA_EXPECT_NAT={0x190, 0xa, 0x0, 0x1, [@CTA_EXPECT_NAT_TUPLE={0x78, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x3a}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0x1a}}}, {0x14, 0x4, @remote}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x8, 0x2, @remote}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x6}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8, 0x2, @empty}}}]}, @CTA_EXPECT_NAT_TUPLE={0x48, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8, 0x2, @loopback}}}]}, @CTA_EXPECT_NAT_TUPLE={0x6c, 0x2, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @broadcast}, {0x8, 0x2, @rand_addr=0x64010100}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @private1}, {0x14, 0x4, @dev={0xfe, 0x80, '\x00', 0x28}}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}]}, @CTA_EXPECT_NAT_TUPLE={0x54, 0x2, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast2}, {0x8, 0x2, @empty}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, {0x14, 0x4, @private2={0xfc, 0x2, '\x00', 0x1}}}}]}, @CTA_EXPECT_NAT_TUPLE={0xc, 0x2, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6}]}]}, @CTA_EXPECT_MASTER={0x50, 0x1, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x6}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @local}, {0x14, 0x4, @mcast1}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x5}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x3}]}, 0x248}, 0x1, 0x0, 0x0, 0x50050}, 0x20000000)
read$qrtrtun(r0, &(0x7f00000012c0)=""/4105, 0x1009)
03:50:48 executing program 3:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x0, 0x0, &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:48 executing program 2:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst={0x0, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:48 executing program 4:
syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00') (async)
r0 = memfd_secret(0x80000) (async)
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r1, 0x0, 0xcf, 0x0, 0x0) (async)
openat$bsg(0xffffffffffffff9c, &(0x7f0000000080), 0x525400, 0x0) (async)
ioctl$BTRFS_IOC_START_SYNC(r1, 0x80089418, &(0x7f0000000040)) (async)
setsockopt$MRT_DEL_MFC_PROXY(r0, 0x0, 0xd3, &(0x7f0000000000)={@remote, @rand_addr=0x64010100, 0x0, "dad81f04000000001100010000000000944a1d0799b395026ae866ef32810200", 0xb, 0x6, 0x7fffffff, 0x1}, 0x3c)
03:50:48 executing program 0:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc0c89425, &(0x7f00000014c0)={"bf0f6873b82fe1095ce57e758853fb57", 0x0, 0x0, {0x8, 0x3}, {0x7fffffff, 0xa71}, 0x2, [0xdf, 0x9, 0x400, 0x4, 0xfffffffffffffffc, 0x7000000000000003, 0x6, 0x8551, 0x6, 0x9, 0xfffffffe, 0x4, 0x401, 0x5, 0x5, 0x3f]}) (async)
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc0c89425, &(0x7f00000014c0)={"bf0f6873b82fe1095ce57e758853fb57", 0x0, 0x0, {0x8, 0x3}, {0x7fffffff, 0xa71}, 0x2, [0xdf, 0x9, 0x400, 0x4, 0xfffffffffffffffc, 0x7000000000000003, 0x6, 0x8551, 0x6, 0x9, 0xfffffffe, 0x4, 0x401, 0x5, 0x5, 0x3f]})
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc0c89425, &(0x7f00000013c0)={"35edce05eda3f4542f444172a0005b12", r1, r1, {0x3, 0x5}, {0x2, 0x3f}, 0x3f, [0x3, 0x6, 0x8, 0x8000000000000001, 0x9, 0x0, 0x1, 0x2, 0x0, 0x20, 0xffffffffffff8001, 0x1e8179e6, 0x7, 0x0, 0x3, 0x45c]})
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc0c89425, &(0x7f00000012c0)={"46444632227204108ff121df56801ad6", r3, r2, {0x80000001, 0x3}, {0x8, 0x5}, 0x6, [0x4, 0x7fffffffffffffff, 0x9, 0x7, 0x1, 0x5, 0x3f, 0x80000001, 0x5, 0x4d1, 0x3, 0x80000001, 0x5, 0x4, 0x9, 0x9]})
r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r4, 0x0, 0xcf, 0x0, 0x0)
write$P9_RREADLINK(r4, &(0x7f0000000000)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) (async)
write$P9_RREADLINK(r4, &(0x7f0000000000)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10)
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
03:50:48 executing program 5:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r0, 0x0, 0xcf, 0x0, 0x0) (async)
ioctl$BLKPG(r0, 0x1269, &(0x7f0000000000)={0x2, 0x0, 0x98, &(0x7f0000000240)={0x9, 0x4, 0xe}})
r1 = syz_open_procfs(0x0, &(0x7f0000000200)='net/protocols\x00')
read$qrtrtun(r1, &(0x7f0000000040)=""/85, 0x55) (async, rerun: 32)
read$qrtrtun(r1, &(0x7f00000000c0)=""/156, 0x9c) (rerun: 32)
03:50:48 executing program 2:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst={0x0, 0x0, 0x0, 0x0, 0x7}], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:48 executing program 0:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r0, 0x0, 0xcf, 0x0, 0x0)
write$9p(r0, &(0x7f0000000000)="6af5c02d46f27c94f22b6e1a8cce14583d2629d9a5286e46e6c5c5e30e44beb313e09ca2eda87a41b8303adf241279f71ba0dbcb447ae8a9388ccdc3858e018c6981aa62b4f1cb1a28dff2d2", 0x4c)
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r1, &(0x7f00000000c0)=""/4096, 0x1000)
03:50:48 executing program 1:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r1, 0x0, 0xcf, 0x0, 0x0)
sendmsg$IPCTNL_MSG_EXP_GET(r1, &(0x7f0000000300)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x801010}, 0xc, &(0x7f00000002c0)={&(0x7f0000000040)={0x248, 0x1, 0x2, 0x101, 0x0, 0x0, {0x3, 0x0, 0x3}, [@CTA_EXPECT_HELP_NAME={0x8, 0x6, 'RAS\x00'}, @CTA_EXPECT_MASK={0x3c, 0x3, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x6}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @remote}, {0x14, 0x4, @mcast1}}}]}, @CTA_EXPECT_NAT={0x190, 0xa, 0x0, 0x1, [@CTA_EXPECT_NAT_TUPLE={0x78, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x3a}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0x1a}}}, {0x14, 0x4, @remote}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x8, 0x2, @remote}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x6}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8, 0x2, @empty}}}]}, @CTA_EXPECT_NAT_TUPLE={0x48, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8, 0x2, @loopback}}}]}, @CTA_EXPECT_NAT_TUPLE={0x6c, 0x2, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @broadcast}, {0x8, 0x2, @rand_addr=0x64010100}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @private1}, {0x14, 0x4, @dev={0xfe, 0x80, '\x00', 0x28}}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}]}, @CTA_EXPECT_NAT_TUPLE={0x54, 0x2, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast2}, {0x8, 0x2, @empty}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, {0x14, 0x4, @private2={0xfc, 0x2, '\x00', 0x1}}}}]}, @CTA_EXPECT_NAT_TUPLE={0xc, 0x2, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6}]}]}, @CTA_EXPECT_MASTER={0x50, 0x1, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x6}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @local}, {0x14, 0x4, @mcast1}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x5}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x3}]}, 0x248}, 0x1, 0x0, 0x0, 0x50050}, 0x20000000)
read$qrtrtun(r0, &(0x7f00000012c0)=""/4105, 0x1009)
syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00') (async)
syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00') (async)
setsockopt$MRT_ASSERT(r1, 0x0, 0xcf, 0x0, 0x0) (async)
sendmsg$IPCTNL_MSG_EXP_GET(r1, &(0x7f0000000300)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x801010}, 0xc, &(0x7f00000002c0)={&(0x7f0000000040)={0x248, 0x1, 0x2, 0x101, 0x0, 0x0, {0x3, 0x0, 0x3}, [@CTA_EXPECT_HELP_NAME={0x8, 0x6, 'RAS\x00'}, @CTA_EXPECT_MASK={0x3c, 0x3, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x6}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @remote}, {0x14, 0x4, @mcast1}}}]}, @CTA_EXPECT_NAT={0x190, 0xa, 0x0, 0x1, [@CTA_EXPECT_NAT_TUPLE={0x78, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x3a}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0x1a}}}, {0x14, 0x4, @remote}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x8, 0x2, @remote}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x6}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8, 0x2, @empty}}}]}, @CTA_EXPECT_NAT_TUPLE={0x48, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8, 0x2, @loopback}}}]}, @CTA_EXPECT_NAT_TUPLE={0x6c, 0x2, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @broadcast}, {0x8, 0x2, @rand_addr=0x64010100}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @private1}, {0x14, 0x4, @dev={0xfe, 0x80, '\x00', 0x28}}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}]}, @CTA_EXPECT_NAT_TUPLE={0x54, 0x2, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast2}, {0x8, 0x2, @empty}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, {0x14, 0x4, @private2={0xfc, 0x2, '\x00', 0x1}}}}]}, @CTA_EXPECT_NAT_TUPLE={0xc, 0x2, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6}]}]}, @CTA_EXPECT_MASTER={0x50, 0x1, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x6}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @local}, {0x14, 0x4, @mcast1}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x5}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x3}]}, 0x248}, 0x1, 0x0, 0x0, 0x50050}, 0x20000000) (async)
read$qrtrtun(r0, &(0x7f00000012c0)=""/4105, 0x1009) (async)
03:50:48 executing program 4:
syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r0, 0x0, 0xcf, 0x0, 0x0)
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0xb5547c1124811a85)
03:50:48 executing program 3:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x0, 0x0, &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:48 executing program 5:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r0, 0x0, 0xcf, 0x0, 0x0)
ioctl$BLKPG(r0, 0x1269, &(0x7f0000000000)={0x2, 0x0, 0x98, &(0x7f0000000240)={0x9, 0x4, 0xe}})
r1 = syz_open_procfs(0x0, &(0x7f0000000200)='net/protocols\x00')
read$qrtrtun(r1, &(0x7f0000000040)=""/85, 0x55)
read$qrtrtun(r1, &(0x7f00000000c0)=""/156, 0x9c)
syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00') (async)
setsockopt$MRT_ASSERT(r0, 0x0, 0xcf, 0x0, 0x0) (async)
ioctl$BLKPG(r0, 0x1269, &(0x7f0000000000)={0x2, 0x0, 0x98, &(0x7f0000000240)={0x9, 0x4, 0xe}}) (async)
syz_open_procfs(0x0, &(0x7f0000000200)='net/protocols\x00') (async)
read$qrtrtun(r1, &(0x7f0000000040)=""/85, 0x55) (async)
read$qrtrtun(r1, &(0x7f00000000c0)=""/156, 0x9c) (async)
03:50:48 executing program 0:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r0, 0x0, 0xcf, 0x0, 0x0) (async)
write$9p(r0, &(0x7f0000000000)="6af5c02d46f27c94f22b6e1a8cce14583d2629d9a5286e46e6c5c5e30e44beb313e09ca2eda87a41b8303adf241279f71ba0dbcb447ae8a9388ccdc3858e018c6981aa62b4f1cb1a28dff2d2", 0x4c) (async)
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r1, &(0x7f00000000c0)=""/4096, 0x1000)
03:50:48 executing program 4:
syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00') (async)
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r0, 0x0, 0xcf, 0x0, 0x0) (async)
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0xb5547c1124811a85)
03:50:48 executing program 3:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x0, 0x0, &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:48 executing program 2:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst={0x0, 0x0, 0x0, 0x0, 0x8}], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:48 executing program 0:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r0, 0x0, 0xcf, 0x0, 0x0)
write$9p(r0, &(0x7f0000000000)="6af5c02d46f27c94f22b6e1a8cce14583d2629d9a5286e46e6c5c5e30e44beb313e09ca2eda87a41b8303adf241279f71ba0dbcb447ae8a9388ccdc3858e018c6981aa62b4f1cb1a28dff2d2", 0x4c)
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r1, &(0x7f00000000c0)=""/4096, 0x1000)
syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00') (async)
setsockopt$MRT_ASSERT(r0, 0x0, 0xcf, 0x0, 0x0) (async)
write$9p(r0, &(0x7f0000000000)="6af5c02d46f27c94f22b6e1a8cce14583d2629d9a5286e46e6c5c5e30e44beb313e09ca2eda87a41b8303adf241279f71ba0dbcb447ae8a9388ccdc3858e018c6981aa62b4f1cb1a28dff2d2", 0x4c) (async)
syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00') (async)
read$qrtrtun(r1, &(0x7f00000000c0)=""/4096, 0x1000) (async)
03:50:48 executing program 5:
r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/protocols\x00')
read$qrtrtun(r0, &(0x7f0000000040)=""/85, 0x55)
read$qrtrtun(r0, &(0x7f00000000c0)=""/156, 0x9c)
ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000000)={'ip6_vti0\x00', &(0x7f0000000180)={'ip6gre0\x00', 0x0, 0x29, 0x5, 0x0, 0x6, 0x9, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x20, 0x8000, 0x1000, 0x7fff}})
bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000240)=ANY=[@ANYRES32=r0, @ANYRES32=r1, @ANYBLOB="2500000011000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000080000000000"], 0x40)
03:50:48 executing program 4:
syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r0, 0x0, 0xcf, 0x0, 0x0)
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0xb5547c1124811a85) (async)
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0xb5547c1124811a85)
03:50:48 executing program 0:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000012c0)=""/4091, 0xffb)
mmap$qrtrtun(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x2000005, 0x4000010, r0, 0x1)
03:50:48 executing program 5:
r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/protocols\x00')
read$qrtrtun(r0, &(0x7f0000000040)=""/85, 0x55)
read$qrtrtun(r0, &(0x7f00000000c0)=""/156, 0x9c)
ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000000)={'ip6_vti0\x00', &(0x7f0000000180)={'ip6gre0\x00', 0x0, 0x29, 0x5, 0x0, 0x6, 0x9, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x20, 0x8000, 0x1000, 0x7fff}})
bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000240)=ANY=[@ANYRES32=r0, @ANYRES32=r1, @ANYBLOB="2500000011000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000080000000000"], 0x40) (async)
bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000240)=ANY=[@ANYRES32=r0, @ANYRES32=r1, @ANYBLOB="2500000011000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000080000000000"], 0x40)
03:50:48 executing program 2:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst={0x0, 0x0, 0x0, 0x0, 0x9}], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:48 executing program 3:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x0, &(0x7f0000001240), &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:48 executing program 0:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000012c0)=""/4091, 0xffb)
mmap$qrtrtun(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x2000005, 0x4000010, r0, 0x1) (async)
mmap$qrtrtun(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x2000005, 0x4000010, r0, 0x1)
03:50:48 executing program 3:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x0, &(0x7f0000001240), &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:48 executing program 2:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst={0x0, 0x0, 0x0, 0x0, 0xa}], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:48 executing program 4:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='statm\x00')
pipe2$watch_queue(&(0x7f0000000040), 0x80)
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/rfcomm\x00')
03:50:48 executing program 5:
r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/protocols\x00')
read$qrtrtun(r0, &(0x7f0000000040)=""/85, 0x55) (async)
read$qrtrtun(r0, &(0x7f00000000c0)=""/156, 0x9c)
ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000000)={'ip6_vti0\x00', &(0x7f0000000180)={'ip6gre0\x00', 0x0, 0x29, 0x5, 0x0, 0x6, 0x9, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x20, 0x8000, 0x1000, 0x7fff}})
bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000240)=ANY=[@ANYRES32=r0, @ANYRES32=r1, @ANYBLOB="2500000011000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000080000000000"], 0x40)
03:50:48 executing program 0:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000012c0)=""/4091, 0xffb)
mmap$qrtrtun(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x2000005, 0x4000010, r0, 0x1)
syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00') (async)
read$qrtrtun(r0, &(0x7f00000012c0)=""/4091, 0xffb) (async)
mmap$qrtrtun(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x2000005, 0x4000010, r0, 0x1) (async)
03:50:48 executing program 5:
r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/protocols\x00')
read$qrtrtun(r0, &(0x7f0000000040)=""/85, 0x55)
read$qrtrtun(r0, &(0x7f00000000c0)=""/156, 0x9c)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000000)={r0}, 0x8)
r2 = getpid()
bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000240)={r1, 0x0, 0x25, 0xb, @val=@uprobe_multi={&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=[0x8, 0x7ff, 0x9, 0x7], 0x0, 0x9, 0x4, 0x1, r2}}, 0x40)
ioctl$IMGETVERSION(r1, 0x80044942, &(0x7f0000000280))
03:50:48 executing program 3:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x0, &(0x7f0000001240), &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:48 executing program 4:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='statm\x00')
pipe2$watch_queue(&(0x7f0000000040), 0x80)
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/rfcomm\x00') (async)
syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/rfcomm\x00')
03:50:48 executing program 2:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst={0x0, 0x0, 0x0, 0x0, 0xb}], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:48 executing program 4:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='statm\x00')
pipe2$watch_queue(&(0x7f0000000040), 0x80) (async, rerun: 64)
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000) (async, rerun: 64)
syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/rfcomm\x00')
03:50:49 executing program 3:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:49 executing program 0:
r0 = getpid()
r1 = getpid()
kcmp$KCMP_EPOLL_TFD(r1, r0, 0x7, 0xffffffffffffffff, &(0x7f0000001840))
r2 = syz_open_procfs(r1, &(0x7f0000000040)='net/stat\x00')
read$qrtrtun(r2, &(0x7f00000000c0)=""/4096, 0x1000)
03:50:49 executing program 1:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f0000001440)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0f2f66696c653000fbf5f057d9611499aca9e7f10f592ab3ed0600000000000000ce502e46a5002f1f2055692c00005aad8bb955634e5d268fa84e320b4661d1dfece3c1eeb80800000090e49fc4a19e4087250ff19106d7521d981151db6bd42ae4bb2d2c42434476ffa6a1232b891fdafd83fc7030c7b50613971a48e4a4df4f319096efcc7d3fe3ae84a1fd34fe8b90b050623bd3bfb38369ce6f8c0dabed0c3cf6afaed925804f26f0b1c70aa2c1100e06f0a86edd360535"])
bpf$BPF_PROG_QUERY(0x10, &(0x7f0000001180)={@map=r1, 0x5, 0x0, 0x800, &(0x7f0000001340), 0x0, 0x0, &(0x7f00000011c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000001200)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000001240)=[0x0, 0x0]}, 0x40)
r2 = getuid()
r3 = getegid()
write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000100)={0x5e, 0x7d, 0x1, {{0x0, 0x42, 0x2, 0x400, {0x4, 0x1, 0x4}, 0x680000, 0x7fffffff, 0x1, 0x5, 0x8, 'ip6gre0\x00', 0x0, '', 0x7, '-].^^\\-'}, 0x7, '@/,,]}*', 0xffffffffffffffff, r3, 0xee00}}, 0x5e)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f0000001400)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {r2, r3}}, './file0\x00'})
r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080), 0xffffffffffffffff)
epoll_pwait2(0xffffffffffffffff, &(0x7f0000000000)=[{}, {}, {}, {}], 0x4, &(0x7f00000012c0)={0x0, 0x989680}, &(0x7f0000001340)={[0x1]}, 0x8)
r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r5, 0x0, 0xcf, 0x0, 0x0)
statx(r0, &(0x7f0000001380)='./file0\x00', 0x1000, 0x100, &(0x7f0000001540)={0x0, 0x0, 0x0, 0x0, 0x0})
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f00000013c0)={{0x1, 0x1, 0x18, r0, {0xee00, 0x0}}, './file0\x00'})
write$P9_RSTATu(r5, &(0x7f0000001640)={0x63, 0x7d, 0x2, {{0x0, 0x49, 0x400, 0x4, {0x10}, 0x10800000, 0x7, 0x10000, 0x8001, 0x1, '%', 0x5, 'TIPC\x00', 0x7, ':}\\\'--.', 0x9, '*}\\${!*,['}, 0x5, 'TIPC\x00', r6, r7, 0xee01}}, 0x63)
epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r0, &(0x7f0000001300)={0x60000016})
sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000001140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000001100)={&(0x7f00000010c0)={0x30, r4, 0x200, 0x70bd2d, 0x25dfdbff, {{}, {}, {0x14, 0x19, {0xde54, 0x5, 0xa0fe, 0x5e0f}}}, ["", "", "", "", "", "", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x4000001}, 0x4000000)
03:50:49 executing program 5:
r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/protocols\x00')
read$qrtrtun(r0, &(0x7f0000000040)=""/85, 0x55)
read$qrtrtun(r0, &(0x7f00000000c0)=""/156, 0x9c)
bpf$ITER_CREATE(0x21, &(0x7f0000000000)={r0}, 0x8) (async)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000000)={r0}, 0x8)
r2 = getpid()
bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000240)={r1, 0x0, 0x25, 0xb, @val=@uprobe_multi={&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=[0x8, 0x7ff, 0x9, 0x7], 0x0, 0x9, 0x4, 0x1, r2}}, 0x40) (async)
bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000240)={r1, 0x0, 0x25, 0xb, @val=@uprobe_multi={&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=[0x8, 0x7ff, 0x9, 0x7], 0x0, 0x9, 0x4, 0x1, r2}}, 0x40)
ioctl$IMGETVERSION(r1, 0x80044942, &(0x7f0000000280))
03:50:49 executing program 1:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f0000001440)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0f2f66696c653000fbf5f057d9611499aca9e7f10f592ab3ed0600000000000000ce502e46a5002f1f2055692c00005aad8bb955634e5d268fa84e320b4661d1dfece3c1eeb80800000090e49fc4a19e4087250ff19106d7521d981151db6bd42ae4bb2d2c42434476ffa6a1232b891fdafd83fc7030c7b50613971a48e4a4df4f319096efcc7d3fe3ae84a1fd34fe8b90b050623bd3bfb38369ce6f8c0dabed0c3cf6afaed925804f26f0b1c70aa2c1100e06f0a86edd360535"])
bpf$BPF_PROG_QUERY(0x10, &(0x7f0000001180)={@map=r1, 0x5, 0x0, 0x800, &(0x7f0000001340), 0x0, 0x0, &(0x7f00000011c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000001200)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000001240)=[0x0, 0x0]}, 0x40) (async)
r2 = getuid() (async)
r3 = getegid()
write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000100)={0x5e, 0x7d, 0x1, {{0x0, 0x42, 0x2, 0x400, {0x4, 0x1, 0x4}, 0x680000, 0x7fffffff, 0x1, 0x5, 0x8, 'ip6gre0\x00', 0x0, '', 0x7, '-].^^\\-'}, 0x7, '@/,,]}*', 0xffffffffffffffff, r3, 0xee00}}, 0x5e) (async)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f0000001400)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {r2, r3}}, './file0\x00'}) (async)
r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080), 0xffffffffffffffff)
epoll_pwait2(0xffffffffffffffff, &(0x7f0000000000)=[{}, {}, {}, {}], 0x4, &(0x7f00000012c0)={0x0, 0x989680}, &(0x7f0000001340)={[0x1]}, 0x8)
r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r5, 0x0, 0xcf, 0x0, 0x0) (async)
statx(r0, &(0x7f0000001380)='./file0\x00', 0x1000, 0x100, &(0x7f0000001540)={0x0, 0x0, 0x0, 0x0, 0x0})
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f00000013c0)={{0x1, 0x1, 0x18, r0, {0xee00, 0x0}}, './file0\x00'})
write$P9_RSTATu(r5, &(0x7f0000001640)={0x63, 0x7d, 0x2, {{0x0, 0x49, 0x400, 0x4, {0x10}, 0x10800000, 0x7, 0x10000, 0x8001, 0x1, '%', 0x5, 'TIPC\x00', 0x7, ':}\\\'--.', 0x9, '*}\\${!*,['}, 0x5, 'TIPC\x00', r6, r7, 0xee01}}, 0x63) (async)
epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r0, &(0x7f0000001300)={0x60000016}) (async)
sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000001140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000001100)={&(0x7f00000010c0)={0x30, r4, 0x200, 0x70bd2d, 0x25dfdbff, {{}, {}, {0x14, 0x19, {0xde54, 0x5, 0xa0fe, 0x5e0f}}}, ["", "", "", "", "", "", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x4000001}, 0x4000000)
03:50:49 executing program 3:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:49 executing program 2:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst={0x0, 0x0, 0x0, 0x0, 0xc}], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:49 executing program 5:
r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/protocols\x00')
read$qrtrtun(r0, &(0x7f0000000040)=""/85, 0x55) (async)
read$qrtrtun(r0, &(0x7f00000000c0)=""/156, 0x9c) (async, rerun: 32)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000000)={r0}, 0x8) (async, rerun: 32)
r2 = getpid()
bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000240)={r1, 0x0, 0x25, 0xb, @val=@uprobe_multi={&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=[0x8, 0x7ff, 0x9, 0x7], 0x0, 0x9, 0x4, 0x1, r2}}, 0x40)
ioctl$IMGETVERSION(r1, 0x80044942, &(0x7f0000000280))
03:50:49 executing program 0:
r0 = getpid()
r1 = getpid()
kcmp$KCMP_EPOLL_TFD(r1, r0, 0x7, 0xffffffffffffffff, &(0x7f0000001840)) (async)
r2 = syz_open_procfs(r1, &(0x7f0000000040)='net/stat\x00')
read$qrtrtun(r2, &(0x7f00000000c0)=""/4096, 0x1000)
03:50:49 executing program 3:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:49 executing program 1:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000) (async)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f0000001440)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0f2f66696c653000fbf5f057d9611499aca9e7f10f592ab3ed0600000000000000ce502e46a5002f1f2055692c00005aad8bb955634e5d268fa84e320b4661d1dfece3c1eeb80800000090e49fc4a19e4087250ff19106d7521d981151db6bd42ae4bb2d2c42434476ffa6a1232b891fdafd83fc7030c7b50613971a48e4a4df4f319096efcc7d3fe3ae84a1fd34fe8b90b050623bd3bfb38369ce6f8c0dabed0c3cf6afaed925804f26f0b1c70aa2c1100e06f0a86edd360535"])
bpf$BPF_PROG_QUERY(0x10, &(0x7f0000001180)={@map=r1, 0x5, 0x0, 0x800, &(0x7f0000001340), 0x0, 0x0, &(0x7f00000011c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000001200)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000001240)=[0x0, 0x0]}, 0x40) (async)
r2 = getuid() (async)
r3 = getegid()
write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000100)={0x5e, 0x7d, 0x1, {{0x0, 0x42, 0x2, 0x400, {0x4, 0x1, 0x4}, 0x680000, 0x7fffffff, 0x1, 0x5, 0x8, 'ip6gre0\x00', 0x0, '', 0x7, '-].^^\\-'}, 0x7, '@/,,]}*', 0xffffffffffffffff, r3, 0xee00}}, 0x5e) (async)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f0000001400)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {r2, r3}}, './file0\x00'}) (async)
r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080), 0xffffffffffffffff) (async)
epoll_pwait2(0xffffffffffffffff, &(0x7f0000000000)=[{}, {}, {}, {}], 0x4, &(0x7f00000012c0)={0x0, 0x989680}, &(0x7f0000001340)={[0x1]}, 0x8) (async)
r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r5, 0x0, 0xcf, 0x0, 0x0)
statx(r0, &(0x7f0000001380)='./file0\x00', 0x1000, 0x100, &(0x7f0000001540)={0x0, 0x0, 0x0, 0x0, 0x0}) (async)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f00000013c0)={{0x1, 0x1, 0x18, r0, {0xee00, 0x0}}, './file0\x00'})
write$P9_RSTATu(r5, &(0x7f0000001640)={0x63, 0x7d, 0x2, {{0x0, 0x49, 0x400, 0x4, {0x10}, 0x10800000, 0x7, 0x10000, 0x8001, 0x1, '%', 0x5, 'TIPC\x00', 0x7, ':}\\\'--.', 0x9, '*}\\${!*,['}, 0x5, 'TIPC\x00', r6, r7, 0xee01}}, 0x63) (async)
epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r0, &(0x7f0000001300)={0x60000016}) (async)
sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000001140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000001100)={&(0x7f00000010c0)={0x30, r4, 0x200, 0x70bd2d, 0x25dfdbff, {{}, {}, {0x14, 0x19, {0xde54, 0x5, 0xa0fe, 0x5e0f}}}, ["", "", "", "", "", "", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x4000001}, 0x4000000)
03:50:49 executing program 4:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='comm\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
03:50:49 executing program 2:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst={0x0, 0x0, 0x0, 0x0, 0xd}], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:49 executing program 5:
r0 = syz_open_procfs(0x0, &(0x7f0000000180)='attr/exec\x00')
epoll_wait(0xffffffffffffffff, &(0x7f0000000000)=[{}], 0x1, 0xfdc8)
memfd_secret(0x80000)
read$qrtrtun(r0, &(0x7f0000000040)=""/85, 0x55)
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r1, 0x0, 0xcf, 0x0, 0x0)
epoll_pwait(r1, &(0x7f00000001c0)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}], 0xa, 0x6, &(0x7f0000000240)={[0x2]}, 0x8)
read$qrtrtun(r0, &(0x7f00000000c0)=""/156, 0x9c)
03:50:49 executing program 3:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst={0x0, 0x3}], 0x0, 0xb}, 0x90)
03:50:49 executing program 0:
r0 = getpid()
r1 = getpid()
kcmp$KCMP_EPOLL_TFD(r1, r0, 0x7, 0xffffffffffffffff, &(0x7f0000001840))
r2 = syz_open_procfs(r1, &(0x7f0000000040)='net/stat\x00')
read$qrtrtun(r2, &(0x7f00000000c0)=""/4096, 0x1000)
03:50:49 executing program 4:
syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='comm\x00') (async)
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='comm\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
03:50:49 executing program 1:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
ioctl$BLKPBSZGET(r0, 0x127b, &(0x7f0000000000))
ioctl$BLKRAGET(r0, 0x1263, &(0x7f0000000040))
03:50:49 executing program 5:
r0 = syz_open_procfs(0x0, &(0x7f0000000180)='attr/exec\x00')
epoll_wait(0xffffffffffffffff, &(0x7f0000000000)=[{}], 0x1, 0xfdc8) (async)
memfd_secret(0x80000) (async)
read$qrtrtun(r0, &(0x7f0000000040)=""/85, 0x55)
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r1, 0x0, 0xcf, 0x0, 0x0)
epoll_pwait(r1, &(0x7f00000001c0)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}], 0xa, 0x6, &(0x7f0000000240)={[0x2]}, 0x8) (async)
read$qrtrtun(r0, &(0x7f00000000c0)=""/156, 0x9c)
03:50:49 executing program 2:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst={0x0, 0x0, 0x0, 0x0, 0xe}], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:49 executing program 1:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000) (async)
ioctl$BLKPBSZGET(r0, 0x127b, &(0x7f0000000000)) (async)
ioctl$BLKRAGET(r0, 0x1263, &(0x7f0000000040))
03:50:49 executing program 4:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='comm\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
03:50:49 executing program 3:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst={0x0, 0x3}], 0x0, 0xb}, 0x90)
03:50:49 executing program 2:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:49 executing program 1:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000) (async)
ioctl$BLKPBSZGET(r0, 0x127b, &(0x7f0000000000))
ioctl$BLKRAGET(r0, 0x1263, &(0x7f0000000040))
03:50:49 executing program 3:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst={0x0, 0x3}], 0x0, 0xb}, 0x90)
03:50:49 executing program 5:
r0 = syz_open_procfs(0x0, &(0x7f0000000180)='attr/exec\x00')
epoll_wait(0xffffffffffffffff, &(0x7f0000000000)=[{}], 0x1, 0xfdc8) (async)
memfd_secret(0x80000) (async)
read$qrtrtun(r0, &(0x7f0000000040)=""/85, 0x55)
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r1, 0x0, 0xcf, 0x0, 0x0) (async)
epoll_pwait(r1, &(0x7f00000001c0)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}], 0xa, 0x6, &(0x7f0000000240)={[0x2]}, 0x8) (async)
read$qrtrtun(r0, &(0x7f00000000c0)=""/156, 0x9c)
03:50:49 executing program 1:
r0 = memfd_secret(0x0)
sendmsg$IPSET_CMD_DESTROY(r0, &(0x7f00000010c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8121}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x3, 0x6, 0x5, 0x0, 0x0, {0x7, 0x0, 0x1}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000010}, 0x20008000)
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r1, &(0x7f00000000c0)=""/4096, 0x1000)
03:50:49 executing program 4:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r1, 0x0, 0xcf, 0x0, 0x0)
mmap$qrtrtun(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1, 0x52050, r1, 0x8000000000000001)
03:50:49 executing program 2:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst={0x0, 0x0, 0x0, 0x0, 0x0, 0x2}], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:49 executing program 5:
r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/protocols\x00')
read$qrtrtun(r0, &(0x7f0000000040)=""/85, 0x55)
ioctl$IOC_WATCH_QUEUE_SET_SIZE(0xffffffffffffffff, 0x5760, 0x10)
read$qrtrtun(r0, &(0x7f00000000c0)=""/156, 0x9c)
03:50:49 executing program 1:
r0 = memfd_secret(0x0)
sendmsg$IPSET_CMD_DESTROY(r0, &(0x7f00000010c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8121}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x3, 0x6, 0x5, 0x0, 0x0, {0x7, 0x0, 0x1}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000010}, 0x20008000)
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r1, &(0x7f00000000c0)=""/4096, 0x1000)
memfd_secret(0x0) (async)
sendmsg$IPSET_CMD_DESTROY(r0, &(0x7f00000010c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8121}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x3, 0x6, 0x5, 0x0, 0x0, {0x7, 0x0, 0x1}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000010}, 0x20008000) (async)
syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00') (async)
read$qrtrtun(r1, &(0x7f00000000c0)=""/4096, 0x1000) (async)
03:50:49 executing program 4:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000) (async)
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r1, 0x0, 0xcf, 0x0, 0x0) (async)
mmap$qrtrtun(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1, 0x52050, r1, 0x8000000000000001)
03:50:49 executing program 3:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst={0x0, 0x3}], &(0x7f0000001340)='GPL\x00'}, 0x90)
03:50:49 executing program 0:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc0c89425, &(0x7f00000010c0)={"8a9e222d3733b4436568af7e3c9fd15d", 0x0, 0x0, {0x8, 0x474}, {0x4, 0x5}, 0x5, [0x0, 0x392, 0x100000001, 0x9, 0x7fffffffffffffff, 0x3, 0xa4, 0xe16, 0x6, 0xfff, 0x6, 0x8, 0x3, 0x8, 0x2, 0x5]})
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
03:50:49 executing program 2:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst={0x0, 0x0, 0x0, 0x0, 0x0, 0x3}], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:49 executing program 4:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000) (async)
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r1, 0x0, 0xcf, 0x0, 0x0) (async)
mmap$qrtrtun(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1, 0x52050, r1, 0x8000000000000001)
03:50:49 executing program 5:
r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/protocols\x00')
read$qrtrtun(r0, &(0x7f0000000040)=""/85, 0x55) (async)
ioctl$IOC_WATCH_QUEUE_SET_SIZE(0xffffffffffffffff, 0x5760, 0x10) (async)
read$qrtrtun(r0, &(0x7f00000000c0)=""/156, 0x9c)
03:50:49 executing program 0:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc0c89425, &(0x7f00000010c0)={"8a9e222d3733b4436568af7e3c9fd15d", 0x0, 0x0, {0x8, 0x474}, {0x4, 0x5}, 0x5, [0x0, 0x392, 0x100000001, 0x9, 0x7fffffffffffffff, 0x3, 0xa4, 0xe16, 0x6, 0xfff, 0x6, 0x8, 0x3, 0x8, 0x2, 0x5]})
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
03:50:49 executing program 2:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst={0x0, 0x0, 0x0, 0x0, 0x0, 0x4}], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:49 executing program 3:
r0 = syz_open_procfs(0x0, &(0x7f0000000180)='attr/exec\x00')
epoll_wait(0xffffffffffffffff, &(0x7f0000000000)=[{}], 0x1, 0xfdc8)
memfd_secret(0x80000)
read$qrtrtun(r0, &(0x7f0000000040)=""/85, 0x55)
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r1, 0x0, 0xcf, 0x0, 0x0)
epoll_pwait(r1, &(0x7f00000001c0)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}], 0xa, 0x6, &(0x7f0000000240)={[0x2]}, 0x8)
read$qrtrtun(r0, &(0x7f00000000c0)=""/156, 0x9c)
03:50:49 executing program 1:
r0 = memfd_secret(0x0)
sendmsg$IPSET_CMD_DESTROY(r0, &(0x7f00000010c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8121}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x3, 0x6, 0x5, 0x0, 0x0, {0x7, 0x0, 0x1}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000010}, 0x20008000) (async)
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r1, &(0x7f00000000c0)=""/4096, 0x1000)
03:50:49 executing program 5:
r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/protocols\x00')
read$qrtrtun(r0, &(0x7f0000000040)=""/85, 0x55) (async)
ioctl$IOC_WATCH_QUEUE_SET_SIZE(0xffffffffffffffff, 0x5760, 0x10)
read$qrtrtun(r0, &(0x7f00000000c0)=""/156, 0x9c)
03:50:49 executing program 4:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r0, 0x0, 0xcf, 0x0, 0x0)
write$P9_RAUTH(r0, &(0x7f0000000000)={0x14, 0x67, 0x1, {0x8, 0x2, 0x1}}, 0x14)
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r1, &(0x7f00000000c0)=""/4089, 0xff9)
03:50:49 executing program 3:
r0 = syz_open_procfs(0x0, &(0x7f0000000180)='attr/exec\x00')
epoll_wait(0xffffffffffffffff, &(0x7f0000000000)=[{}], 0x1, 0xfdc8)
memfd_secret(0x80000)
read$qrtrtun(r0, &(0x7f0000000040)=""/85, 0x55)
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r1, 0x0, 0xcf, 0x0, 0x0)
epoll_pwait(r1, &(0x7f00000001c0)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}], 0xa, 0x6, &(0x7f0000000240)={[0x2]}, 0x8)
read$qrtrtun(r0, &(0x7f00000000c0)=""/156, 0x9c)
03:50:49 executing program 0:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc0c89425, &(0x7f00000010c0)={"8a9e222d3733b4436568af7e3c9fd15d", 0x0, 0x0, {0x8, 0x474}, {0x4, 0x5}, 0x5, [0x0, 0x392, 0x100000001, 0x9, 0x7fffffffffffffff, 0x3, 0xa4, 0xe16, 0x6, 0xfff, 0x6, 0x8, 0x3, 0x8, 0x2, 0x5]}) (async)
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
03:50:49 executing program 2:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst={0x0, 0x0, 0x0, 0x0, 0x0, 0x5}], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:49 executing program 4:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r0, 0x0, 0xcf, 0x0, 0x0)
write$P9_RAUTH(r0, &(0x7f0000000000)={0x14, 0x67, 0x1, {0x8, 0x2, 0x1}}, 0x14)
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r1, &(0x7f00000000c0)=""/4089, 0xff9)
03:50:49 executing program 3:
r0 = syz_open_procfs(0x0, &(0x7f0000000180)='attr/exec\x00')
epoll_wait(0xffffffffffffffff, &(0x7f0000000000)=[{}], 0x1, 0xfdc8)
memfd_secret(0x80000)
read$qrtrtun(r0, &(0x7f0000000040)=""/85, 0x55)
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r1, 0x0, 0xcf, 0x0, 0x0)
epoll_pwait(r1, &(0x7f00000001c0)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}], 0xa, 0x6, &(0x7f0000000240)={[0x2]}, 0x8)
read$qrtrtun(r0, &(0x7f00000000c0)=""/156, 0x9c)
03:50:49 executing program 2:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst={0x0, 0x0, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:49 executing program 4:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r0, 0x0, 0xcf, 0x0, 0x0)
write$P9_RAUTH(r0, &(0x7f0000000000)={0x14, 0x67, 0x1, {0x8, 0x2, 0x1}}, 0x14)
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r1, &(0x7f00000000c0)=""/4089, 0xff9)
syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00') (async)
setsockopt$MRT_ASSERT(r0, 0x0, 0xcf, 0x0, 0x0) (async)
write$P9_RAUTH(r0, &(0x7f0000000000)={0x14, 0x67, 0x1, {0x8, 0x2, 0x1}}, 0x14) (async)
syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00') (async)
read$qrtrtun(r1, &(0x7f00000000c0)=""/4089, 0xff9) (async)
03:50:49 executing program 0:
syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
r0 = memfd_secret(0x0)
read$qrtrtun(r0, &(0x7f00000000c0)=""/4094, 0xffffffffffffff83)
03:50:49 executing program 5:
r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/protocols\x00')
read$qrtrtun(r0, &(0x7f0000000040)=""/85, 0x55)
ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000440)=0x4)
read$qrtrtun(r0, &(0x7f00000000c0)=""/156, 0x9c)
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
statx(r0, &(0x7f00000002c0)='./file0\x00', 0x4000, 0x100, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0})
r3 = getegid()
write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000540)=ANY=[@ANYBLOB="5e0000007d01000000420002000004000004018bea025f80c54d2da4de1c91df05c5bfeac8214c0fd7c796bb4dbfc1cf00000000000000006800ffffff7f01000000050000006970366772653067514611f95a6764e59dc0a3f40821a83f7a8157765e099b90074874d8818e9f4e8732c502874ca9e5b2cfc2fee722015399733ce50665165e05b132a1e75ed620898906ae73fda4d05e9e44aabc98b5eb2cee9e1e2d64a39f94aeeb91cde873f3b2ec", @ANYRES32, @ANYRES32=r3, @ANYRES32=0xee00], 0x5e)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f0000000480)=ANY=[@ANYBLOB="0100000001000000a7d18f9a418588a6040518000000", @ANYRES32=r1, @ANYRES32=r2, @ANYRES32=r3, @ANYBLOB='./file0\x00'])
r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r4, 0x0, 0xcf, 0x0, 0x0)
ioctl$BLKRAGET(r4, 0x1263, &(0x7f0000000400))
getsockopt$MRT(r4, 0x0, 0xce, &(0x7f00000004c0), &(0x7f0000000500)=0x4)
setsockopt$MRT_ASSERT(r1, 0x0, 0xcf, 0x0, 0x0)
bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={@cgroup=r1, 0x11, 0x1, 0x9, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5, 0x0, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000001c0)=[0x0, 0x0], &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0]}, 0x40)
03:50:49 executing program 3:
r0 = syz_open_procfs(0x0, &(0x7f0000000180)='attr/exec\x00')
epoll_wait(0xffffffffffffffff, &(0x7f0000000000)=[{}], 0x1, 0xfdc8)
memfd_secret(0x80000)
read$qrtrtun(r0, &(0x7f0000000040)=""/85, 0x55)
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r1, 0x0, 0xcf, 0x0, 0x0)
epoll_pwait(r1, &(0x7f00000001c0)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}], 0xa, 0x6, &(0x7f0000000240)={[0x2]}, 0x8)
03:50:49 executing program 2:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst={0x0, 0x0, 0x0, 0x0, 0x0, 0x7}], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:49 executing program 0:
syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
r0 = memfd_secret(0x0)
read$qrtrtun(r0, &(0x7f00000000c0)=""/4094, 0xffffffffffffff83)
03:50:49 executing program 4:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x200000, 0x0)
r2 = socket$l2tp6(0xa, 0x2, 0x73)
kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, 0xffffffffffffffff, 0x7, r0, &(0x7f0000000040)={r1, r2, 0x8})
read$qrtrtun(r0, &(0x7f00000000c0)=""/4069, 0xfe5)
03:50:49 executing program 2:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst={0x0, 0x0, 0x0, 0x0, 0x0, 0x8}], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:49 executing program 4:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x200000, 0x0)
r2 = socket$l2tp6(0xa, 0x2, 0x73)
kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, 0xffffffffffffffff, 0x7, r0, &(0x7f0000000040)={r1, r2, 0x8})
read$qrtrtun(r0, &(0x7f00000000c0)=""/4069, 0xfe5)
syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00') (async)
openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x200000, 0x0) (async)
socket$l2tp6(0xa, 0x2, 0x73) (async)
kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, 0xffffffffffffffff, 0x7, r0, &(0x7f0000000040)={r1, r2, 0x8}) (async)
read$qrtrtun(r0, &(0x7f00000000c0)=""/4069, 0xfe5) (async)
03:50:49 executing program 3:
r0 = syz_open_procfs(0x0, &(0x7f0000000180)='attr/exec\x00')
epoll_wait(0xffffffffffffffff, &(0x7f0000000000)=[{}], 0x1, 0xfdc8)
memfd_secret(0x80000)
read$qrtrtun(r0, &(0x7f0000000040)=""/85, 0x55)
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r1, 0x0, 0xcf, 0x0, 0x0)
03:50:49 executing program 5:
r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/protocols\x00')
read$qrtrtun(r0, &(0x7f0000000040)=""/85, 0x55)
ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000440)=0x4)
read$qrtrtun(r0, &(0x7f00000000c0)=""/156, 0x9c)
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
statx(r0, &(0x7f00000002c0)='./file0\x00', 0x4000, 0x100, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0})
r3 = getegid()
write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000540)=ANY=[@ANYBLOB="5e0000007d01000000420002000004000004018bea025f80c54d2da4de1c91df05c5bfeac8214c0fd7c796bb4dbfc1cf00000000000000006800ffffff7f01000000050000006970366772653067514611f95a6764e59dc0a3f40821a83f7a8157765e099b90074874d8818e9f4e8732c502874ca9e5b2cfc2fee722015399733ce50665165e05b132a1e75ed620898906ae73fda4d05e9e44aabc98b5eb2cee9e1e2d64a39f94aeeb91cde873f3b2ec", @ANYRES32, @ANYRES32=r3, @ANYRES32=0xee00], 0x5e)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f0000000480)=ANY=[@ANYBLOB="0100000001000000a7d18f9a418588a6040518000000", @ANYRES32=r1, @ANYRES32=r2, @ANYRES32=r3, @ANYBLOB='./file0\x00'])
r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r4, 0x0, 0xcf, 0x0, 0x0)
ioctl$BLKRAGET(r4, 0x1263, &(0x7f0000000400))
getsockopt$MRT(r4, 0x0, 0xce, &(0x7f00000004c0), &(0x7f0000000500)=0x4)
setsockopt$MRT_ASSERT(r1, 0x0, 0xcf, 0x0, 0x0)
bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={@cgroup=r1, 0x11, 0x1, 0x9, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5, 0x0, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000001c0)=[0x0, 0x0], &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0]}, 0x40)
syz_open_procfs(0x0, &(0x7f0000000200)='net/protocols\x00') (async)
read$qrtrtun(r0, &(0x7f0000000040)=""/85, 0x55) (async)
ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000440)=0x4) (async)
read$qrtrtun(r0, &(0x7f00000000c0)=""/156, 0x9c) (async)
syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00') (async)
statx(r0, &(0x7f00000002c0)='./file0\x00', 0x4000, 0x100, &(0x7f0000000300)) (async)
getegid() (async)
write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000540)=ANY=[@ANYBLOB="5e0000007d01000000420002000004000004018bea025f80c54d2da4de1c91df05c5bfeac8214c0fd7c796bb4dbfc1cf00000000000000006800ffffff7f01000000050000006970366772653067514611f95a6764e59dc0a3f40821a83f7a8157765e099b90074874d8818e9f4e8732c502874ca9e5b2cfc2fee722015399733ce50665165e05b132a1e75ed620898906ae73fda4d05e9e44aabc98b5eb2cee9e1e2d64a39f94aeeb91cde873f3b2ec", @ANYRES32, @ANYRES32=r3, @ANYRES32=0xee00], 0x5e) (async)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f0000000480)=ANY=[@ANYBLOB="0100000001000000a7d18f9a418588a6040518000000", @ANYRES32=r1, @ANYRES32=r2, @ANYRES32=r3, @ANYBLOB='./file0\x00']) (async)
syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00') (async)
setsockopt$MRT_ASSERT(r4, 0x0, 0xcf, 0x0, 0x0) (async)
ioctl$BLKRAGET(r4, 0x1263, &(0x7f0000000400)) (async)
getsockopt$MRT(r4, 0x0, 0xce, &(0x7f00000004c0), &(0x7f0000000500)=0x4) (async)
setsockopt$MRT_ASSERT(r1, 0x0, 0xcf, 0x0, 0x0) (async)
bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={@cgroup=r1, 0x11, 0x1, 0x9, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5, 0x0, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000001c0)=[0x0, 0x0], &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0]}, 0x40) (async)
03:50:49 executing program 2:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst={0x0, 0x0, 0x0, 0x0, 0x0, 0x9}], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:49 executing program 0:
syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
r0 = memfd_secret(0x0)
read$qrtrtun(r0, &(0x7f00000000c0)=""/4094, 0xffffffffffffff83)
03:50:49 executing program 3:
r0 = syz_open_procfs(0x0, &(0x7f0000000180)='attr/exec\x00')
epoll_wait(0xffffffffffffffff, &(0x7f0000000000)=[{}], 0x1, 0xfdc8)
memfd_secret(0x80000)
read$qrtrtun(r0, &(0x7f0000000040)=""/85, 0x55)
syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
03:50:49 executing program 4:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x200000, 0x0)
r2 = socket$l2tp6(0xa, 0x2, 0x73)
kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, 0xffffffffffffffff, 0x7, r0, &(0x7f0000000040)={r1, r2, 0x8})
read$qrtrtun(r0, &(0x7f00000000c0)=""/4069, 0xfe5)
syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00') (async)
openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x200000, 0x0) (async)
socket$l2tp6(0xa, 0x2, 0x73) (async)
kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, 0xffffffffffffffff, 0x7, r0, &(0x7f0000000040)={r1, r2, 0x8}) (async)
read$qrtrtun(r0, &(0x7f00000000c0)=""/4069, 0xfe5) (async)
03:50:49 executing program 2:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst={0x0, 0x0, 0x0, 0x0, 0x0, 0xa}], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:49 executing program 5:
r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/protocols\x00')
read$qrtrtun(r0, &(0x7f0000000040)=""/85, 0x55) (async)
ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000440)=0x4) (async)
read$qrtrtun(r0, &(0x7f00000000c0)=""/156, 0x9c) (async, rerun: 64)
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00') (async, rerun: 64)
statx(r0, &(0x7f00000002c0)='./file0\x00', 0x4000, 0x100, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) (async, rerun: 64)
r3 = getegid() (rerun: 64)
write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000540)=ANY=[@ANYBLOB="5e0000007d01000000420002000004000004018bea025f80c54d2da4de1c91df05c5bfeac8214c0fd7c796bb4dbfc1cf00000000000000006800ffffff7f01000000050000006970366772653067514611f95a6764e59dc0a3f40821a83f7a8157765e099b90074874d8818e9f4e8732c502874ca9e5b2cfc2fee722015399733ce50665165e05b132a1e75ed620898906ae73fda4d05e9e44aabc98b5eb2cee9e1e2d64a39f94aeeb91cde873f3b2ec", @ANYRES32, @ANYRES32=r3, @ANYRES32=0xee00], 0x5e) (async, rerun: 32)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f0000000480)=ANY=[@ANYBLOB="0100000001000000a7d18f9a418588a6040518000000", @ANYRES32=r1, @ANYRES32=r2, @ANYRES32=r3, @ANYBLOB='./file0\x00']) (rerun: 32)
r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r4, 0x0, 0xcf, 0x0, 0x0) (async, rerun: 64)
ioctl$BLKRAGET(r4, 0x1263, &(0x7f0000000400)) (async, rerun: 64)
getsockopt$MRT(r4, 0x0, 0xce, &(0x7f00000004c0), &(0x7f0000000500)=0x4) (async)
setsockopt$MRT_ASSERT(r1, 0x0, 0xcf, 0x0, 0x0) (async, rerun: 32)
bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={@cgroup=r1, 0x11, 0x1, 0x9, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5, 0x0, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000001c0)=[0x0, 0x0], &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0]}, 0x40) (rerun: 32)
03:50:49 executing program 0:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f0000000000)=""/4088, 0xff8)
03:50:49 executing program 3:
r0 = syz_open_procfs(0x0, &(0x7f0000000180)='attr/exec\x00')
epoll_wait(0xffffffffffffffff, &(0x7f0000000000)=[{}], 0x1, 0xfdc8)
memfd_secret(0x80000)
read$qrtrtun(r0, &(0x7f0000000040)=""/85, 0x55)
03:50:49 executing program 1:
bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000040)=0xffffffffffffffff, 0x4)
bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000000)={0x200}, 0x8)
read$qrtrtun(0xffffffffffffffff, &(0x7f00000000c0)=""/4096, 0x1000)
r0 = socket$igmp(0x2, 0x3, 0x2)
ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'ip6gre0\x00', 0x0})
bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', r1}, 0x48)
bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000080)={0xffffffffffffffff, r1, 0x25, 0xf, @void}, 0x10)
03:50:49 executing program 4:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r1, 0x0, 0xcf, 0x0, 0x0)
syz_io_uring_setup(0x2e8b, &(0x7f0000001100)={0x0, 0x6c87, 0x8, 0x3, 0x278, 0x0, r1}, &(0x7f0000000080), &(0x7f00000010c0))
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
03:50:49 executing program 0:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f0000000000)=""/4088, 0xff8)
03:50:49 executing program 3:
r0 = syz_open_procfs(0x0, &(0x7f0000000180)='attr/exec\x00')
epoll_wait(0xffffffffffffffff, &(0x7f0000000000)=[{}], 0x1, 0xfdc8)
read$qrtrtun(r0, &(0x7f0000000040)=""/85, 0x55)
03:50:49 executing program 5:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
write$P9_RSTATu(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="dd0000007d01000000ba00010100000000010200000007000000000000006a23c77200100000090000008000000000000000170099364edc5cc4867a3af89fc5d5b9c58e4305d6f514af5c0e006e65742f70726f746c73000e006e65742f70726f746f636f6c73005400238078c7c5e9b87d942cf0e076dbda7bf08247e1eb38f7687dcaa70e6e96e88dcff54d0feff8116919d1944043805761468c1988e6502c68122b00b71d915e5c718df6fa1960476d848f876192cda4439d6695010e006e65742f70726f746f636f6c7300", @ANYRES32=0xee00, @ANYRES32=0x0, @ANYRES32=0xee01], 0xdd)
restart_syscall()
r1 = syz_open_procfs(0x0, &(0x7f0000000200)='net/protocols\x00')
read$qrtrtun(r1, &(0x7f0000000040)=""/85, 0x55)
read$qrtrtun(r1, &(0x7f00000000c0)=""/156, 0x9c)
03:50:49 executing program 2:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst={0x0, 0x0, 0x0, 0x0, 0x0, 0xb}], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:49 executing program 4:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r1, 0x0, 0xcf, 0x0, 0x0) (async)
syz_io_uring_setup(0x2e8b, &(0x7f0000001100)={0x0, 0x6c87, 0x8, 0x3, 0x278, 0x0, r1}, &(0x7f0000000080), &(0x7f00000010c0)) (async)
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
03:50:49 executing program 3:
r0 = syz_open_procfs(0x0, &(0x7f0000000180)='attr/exec\x00')
read$qrtrtun(r0, &(0x7f0000000040)=""/85, 0x55)
03:50:49 executing program 1:
bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000040)=0xffffffffffffffff, 0x4)
bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000000)={0x200}, 0x8)
read$qrtrtun(0xffffffffffffffff, &(0x7f00000000c0)=""/4096, 0x1000)
r0 = socket$igmp(0x2, 0x3, 0x2)
ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'ip6gre0\x00', 0x0})
bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', r1}, 0x48)
bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000080)={0xffffffffffffffff, r1, 0x25, 0xf, @void}, 0x10)
bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000040)=0xffffffffffffffff, 0x4) (async)
bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000000)={0x200}, 0x8) (async)
read$qrtrtun(0xffffffffffffffff, &(0x7f00000000c0)=""/4096, 0x1000) (async)
socket$igmp(0x2, 0x3, 0x2) (async)
ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'ip6gre0\x00'}) (async)
bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', r1}, 0x48) (async)
bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000080)={0xffffffffffffffff, r1, 0x25, 0xf, @void}, 0x10) (async)
03:50:49 executing program 0:
syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00') (async)
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f0000000000)=""/4088, 0xff8)
03:50:49 executing program 2:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst={0x0, 0x0, 0x0, 0x0, 0x0, 0xc}], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:49 executing program 5:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
write$P9_RSTATu(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="dd0000007d01000000ba00010100000000010200000007000000000000006a23c77200100000090000008000000000000000170099364edc5cc4867a3af89fc5d5b9c58e4305d6f514af5c0e006e65742f70726f746c73000e006e65742f70726f746f636f6c73005400238078c7c5e9b87d942cf0e076dbda7bf08247e1eb38f7687dcaa70e6e96e88dcff54d0feff8116919d1944043805761468c1988e6502c68122b00b71d915e5c718df6fa1960476d848f876192cda4439d6695010e006e65742f70726f746f636f6c7300", @ANYRES32=0xee00, @ANYRES32=0x0, @ANYRES32=0xee01], 0xdd) (async)
restart_syscall()
r1 = syz_open_procfs(0x0, &(0x7f0000000200)='net/protocols\x00')
read$qrtrtun(r1, &(0x7f0000000040)=""/85, 0x55) (async)
read$qrtrtun(r1, &(0x7f00000000c0)=""/156, 0x9c)
03:50:49 executing program 3:
read$qrtrtun(0xffffffffffffffff, &(0x7f0000000040)=""/85, 0x55)
03:50:49 executing program 4:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r1, 0x0, 0xcf, 0x0, 0x0)
syz_io_uring_setup(0x2e8b, &(0x7f0000001100)={0x0, 0x6c87, 0x8, 0x3, 0x278, 0x0, r1}, &(0x7f0000000080), &(0x7f00000010c0))
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00') (async)
syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00') (async)
setsockopt$MRT_ASSERT(r1, 0x0, 0xcf, 0x0, 0x0) (async)
syz_io_uring_setup(0x2e8b, &(0x7f0000001100)={0x0, 0x6c87, 0x8, 0x3, 0x278, 0x0, r1}, &(0x7f0000000080), &(0x7f00000010c0)) (async)
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000) (async)
03:50:49 executing program 1:
bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000040)=0xffffffffffffffff, 0x4) (async)
bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000000)={0x200}, 0x8) (async)
read$qrtrtun(0xffffffffffffffff, &(0x7f00000000c0)=""/4096, 0x1000) (async, rerun: 64)
r0 = socket$igmp(0x2, 0x3, 0x2) (rerun: 64)
ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'ip6gre0\x00', 0x0})
bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', r1}, 0x48)
bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000080)={0xffffffffffffffff, r1, 0x25, 0xf, @void}, 0x10)
03:50:49 executing program 3:
read$qrtrtun(0xffffffffffffffff, &(0x7f0000000040)=""/85, 0x55)
03:50:49 executing program 0:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
mmap$qrtrtun(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1000000, 0x4000010, r0, 0xfffffffffffffbff)
03:50:49 executing program 5:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
write$P9_RSTATu(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="dd0000007d01000000ba00010100000000010200000007000000000000006a23c77200100000090000008000000000000000170099364edc5cc4867a3af89fc5d5b9c58e4305d6f514af5c0e006e65742f70726f746c73000e006e65742f70726f746f636f6c73005400238078c7c5e9b87d942cf0e076dbda7bf08247e1eb38f7687dcaa70e6e96e88dcff54d0feff8116919d1944043805761468c1988e6502c68122b00b71d915e5c718df6fa1960476d848f876192cda4439d6695010e006e65742f70726f746f636f6c7300", @ANYRES32=0xee00, @ANYRES32=0x0, @ANYRES32=0xee01], 0xdd) (async)
restart_syscall()
r1 = syz_open_procfs(0x0, &(0x7f0000000200)='net/protocols\x00')
read$qrtrtun(r1, &(0x7f0000000040)=""/85, 0x55)
read$qrtrtun(r1, &(0x7f00000000c0)=""/156, 0x9c)
03:50:49 executing program 2:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst={0x0, 0x0, 0x0, 0x0, 0x0, 0xd}], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:49 executing program 4:
read$qrtrtun(0xffffffffffffffff, &(0x7f00000010c0)=""/4096, 0x1000)
03:50:49 executing program 1:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
mknodat(r0, &(0x7f0000000000)='./file0\x00', 0xc000, 0x0)
read$qrtrtun(r0, &(0x7f00000000c0)=""/4095, 0xfff)
socket$inet_sctp(0x2, 0x5, 0x84)
03:50:49 executing program 3:
read$qrtrtun(0xffffffffffffffff, &(0x7f0000000040)=""/85, 0x55)
03:50:49 executing program 5:
ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000300)={'ip6tnl0\x00', &(0x7f0000000280)={'syztnl0\x00', 0x0, 0x4, 0x80, 0x8, 0xfffffffe, 0x7, @empty, @private1, 0x40, 0x700, 0x22c, 0x3}})
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r1, 0x0, 0xcf, 0x0, 0x0)
r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r2, 0x0, 0xcf, 0x0, 0x0)
pipe2$watch_queue(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80)
r4 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000400), 0x600100, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xc, 0x1, &(0x7f0000000180)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff9}], &(0x7f00000001c0)='GPL\x00', 0x7, 0x7, &(0x7f0000000240)=""/7, 0x41100, 0x20, '\x00', r0, 0x1f, r1, 0x8, &(0x7f0000000340)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x5, 0x0, 0x3, 0x2}, 0x10, 0xffffffffffffffff, r2, 0x1, &(0x7f0000000440)=[0xffffffffffffffff, r3, r4], &(0x7f0000000480)=[{0x0, 0x4, 0xe, 0x5}], 0x10, 0x6}, 0x90)
r5 = syz_open_procfs(0x0, &(0x7f0000000200)='net/protocols\x00')
read$qrtrtun(r5, &(0x7f0000000040)=""/85, 0x55)
ioctl$BLKROGET(r5, 0x125e, &(0x7f0000000000))
read$qrtrtun(r5, &(0x7f00000000c0)=""/156, 0x9c)
03:50:49 executing program 2:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst={0x0, 0x0, 0x0, 0x0, 0x0, 0xe}], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:49 executing program 0:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
mmap$qrtrtun(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1000000, 0x4000010, r0, 0xfffffffffffffbff)
syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00') (async)
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000) (async)
mmap$qrtrtun(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1000000, 0x4000010, r0, 0xfffffffffffffbff) (async)
03:50:49 executing program 4:
read$qrtrtun(0xffffffffffffffff, &(0x7f00000010c0)=""/4096, 0x1000)
03:50:49 executing program 4:
read$qrtrtun(0xffffffffffffffff, &(0x7f00000010c0)=""/4096, 0x1000)
read$qrtrtun(0xffffffffffffffff, &(0x7f00000010c0)=""/4096, 0x1000) (async)
03:50:49 executing program 3:
r0 = syz_open_procfs(0x0, 0x0)
read$qrtrtun(r0, &(0x7f0000000040)=""/85, 0x55)
03:50:49 executing program 1:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
mknodat(r0, &(0x7f0000000000)='./file0\x00', 0xc000, 0x0) (async)
read$qrtrtun(r0, &(0x7f00000000c0)=""/4095, 0xfff) (async)
socket$inet_sctp(0x2, 0x5, 0x84)
03:50:49 executing program 2:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst={0x0, 0x0, 0x0, 0x0, 0x0, 0x10}], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:49 executing program 0:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
mmap$qrtrtun(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1000000, 0x4000010, r0, 0xfffffffffffffbff)
syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00') (async)
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000) (async)
mmap$qrtrtun(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1000000, 0x4000010, r0, 0xfffffffffffffbff) (async)
03:50:49 executing program 5:
ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000300)={'ip6tnl0\x00', &(0x7f0000000280)={'syztnl0\x00', 0x0, 0x4, 0x80, 0x8, 0xfffffffe, 0x7, @empty, @private1, 0x40, 0x700, 0x22c, 0x3}}) (async)
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r1, 0x0, 0xcf, 0x0, 0x0) (async, rerun: 64)
r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00') (rerun: 64)
setsockopt$MRT_ASSERT(r2, 0x0, 0xcf, 0x0, 0x0) (async)
pipe2$watch_queue(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) (async)
r4 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000400), 0x600100, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xc, 0x1, &(0x7f0000000180)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff9}], &(0x7f00000001c0)='GPL\x00', 0x7, 0x7, &(0x7f0000000240)=""/7, 0x41100, 0x20, '\x00', r0, 0x1f, r1, 0x8, &(0x7f0000000340)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x5, 0x0, 0x3, 0x2}, 0x10, 0xffffffffffffffff, r2, 0x1, &(0x7f0000000440)=[0xffffffffffffffff, r3, r4], &(0x7f0000000480)=[{0x0, 0x4, 0xe, 0x5}], 0x10, 0x6}, 0x90)
r5 = syz_open_procfs(0x0, &(0x7f0000000200)='net/protocols\x00')
read$qrtrtun(r5, &(0x7f0000000040)=""/85, 0x55) (async)
ioctl$BLKROGET(r5, 0x125e, &(0x7f0000000000)) (async)
read$qrtrtun(r5, &(0x7f00000000c0)=""/156, 0x9c)
03:50:49 executing program 2:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst={0x0, 0x0, 0x0, 0x0, 0x0, 0x11}], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:49 executing program 3:
r0 = syz_open_procfs(0x0, 0x0)
read$qrtrtun(r0, &(0x7f0000000040)=""/85, 0x55)
03:50:49 executing program 1:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
mknodat(r0, &(0x7f0000000000)='./file0\x00', 0xc000, 0x0) (async)
read$qrtrtun(r0, &(0x7f00000000c0)=""/4095, 0xfff)
socket$inet_sctp(0x2, 0x5, 0x84)
03:50:49 executing program 4:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
r1 = socket$igmp(0x2, 0x3, 0x2)
ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'ip6gre0\x00', 0x0})
r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', r2}, 0x48)
r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r4, 0x0, 0xcf, 0x0, 0x0)
bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000001200)={r3, 0xffffffffffffffff}, 0x4)
r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000013c0)='cpuset\x00')
setsockopt$MRT_ASSERT(r6, 0x0, 0xcf, 0x0, 0x0)
r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r7, 0x0, 0xcf, 0x0, 0x0)
bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001300)={0x6, 0x10, &(0x7f0000001180)=@raw=[@jmp={0x5, 0x0, 0x7, 0x1, 0x7, 0x2, 0x4}, @map_val={0x18, 0x5, 0x2, 0x0, r4, 0x0, 0x0, 0x0, 0x3}, @map_idx_val={0x18, 0xa, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @func={0x85, 0x0, 0x1, 0x0, 0x1}, @generic={0x9, 0x2, 0x0, 0x1000, 0x8}, @printk={@pointer, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x101}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}], &(0x7f0000000080)='GPL\x00', 0xffff059b, 0x0, 0x0, 0x41100, 0x8, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000010c0)={0x8, 0xd, 0x1, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001240)=[r5, r3, r6, 0xffffffffffffffff, r7], &(0x7f00000012c0), 0x10, 0x3}, 0x90)
bpf$BPF_PROG_QUERY(0x10, &(0x7f0000001100)={@cgroup, 0x10, 0x0, 0x84, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5, 0x0, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000001140)=[0x0, 0x0], &(0x7f00000010c0)}, 0x40)
03:50:49 executing program 2:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst={0x0, 0x0, 0x0, 0x0, 0x0, 0x12}], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:49 executing program 3:
r0 = syz_open_procfs(0x0, 0x0)
read$qrtrtun(r0, &(0x7f0000000040)=""/85, 0x55)
03:50:49 executing program 0:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
ioctl$SIOCPNADDRESOURCE(r0, 0x89e0, &(0x7f0000000000)=0x8)
03:50:49 executing program 3:
syz_open_procfs(0x0, &(0x7f0000000180)='attr/exec\x00')
read$qrtrtun(0xffffffffffffffff, &(0x7f0000000040)=""/85, 0x55)
03:50:49 executing program 4:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
r1 = socket$igmp(0x2, 0x3, 0x2)
ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'ip6gre0\x00'}) (async)
ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'ip6gre0\x00', 0x0})
bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', r2}, 0x48) (async)
r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', r2}, 0x48)
r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r4, 0x0, 0xcf, 0x0, 0x0)
bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000001200)={r3, 0xffffffffffffffff}, 0x4)
r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000013c0)='cpuset\x00')
setsockopt$MRT_ASSERT(r6, 0x0, 0xcf, 0x0, 0x0)
r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r7, 0x0, 0xcf, 0x0, 0x0) (async)
setsockopt$MRT_ASSERT(r7, 0x0, 0xcf, 0x0, 0x0)
bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001300)={0x6, 0x10, &(0x7f0000001180)=@raw=[@jmp={0x5, 0x0, 0x7, 0x1, 0x7, 0x2, 0x4}, @map_val={0x18, 0x5, 0x2, 0x0, r4, 0x0, 0x0, 0x0, 0x3}, @map_idx_val={0x18, 0xa, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @func={0x85, 0x0, 0x1, 0x0, 0x1}, @generic={0x9, 0x2, 0x0, 0x1000, 0x8}, @printk={@pointer, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x101}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}], &(0x7f0000000080)='GPL\x00', 0xffff059b, 0x0, 0x0, 0x41100, 0x8, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000010c0)={0x8, 0xd, 0x1, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001240)=[r5, r3, r6, 0xffffffffffffffff, r7], &(0x7f00000012c0), 0x10, 0x3}, 0x90)
bpf$BPF_PROG_QUERY(0x10, &(0x7f0000001100)={@cgroup, 0x10, 0x0, 0x84, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5, 0x0, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000001140)=[0x0, 0x0], &(0x7f00000010c0)}, 0x40) (async)
bpf$BPF_PROG_QUERY(0x10, &(0x7f0000001100)={@cgroup, 0x10, 0x0, 0x84, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5, 0x0, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000001140)=[0x0, 0x0], &(0x7f00000010c0)}, 0x40)
03:50:49 executing program 5:
ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000300)={'ip6tnl0\x00', &(0x7f0000000280)={'syztnl0\x00', 0x0, 0x4, 0x80, 0x8, 0xfffffffe, 0x7, @empty, @private1, 0x40, 0x700, 0x22c, 0x3}}) (async, rerun: 32)
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00') (rerun: 32)
setsockopt$MRT_ASSERT(r1, 0x0, 0xcf, 0x0, 0x0)
r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r2, 0x0, 0xcf, 0x0, 0x0) (async)
pipe2$watch_queue(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) (async)
r4 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000400), 0x600100, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xc, 0x1, &(0x7f0000000180)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff9}], &(0x7f00000001c0)='GPL\x00', 0x7, 0x7, &(0x7f0000000240)=""/7, 0x41100, 0x20, '\x00', r0, 0x1f, r1, 0x8, &(0x7f0000000340)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x5, 0x0, 0x3, 0x2}, 0x10, 0xffffffffffffffff, r2, 0x1, &(0x7f0000000440)=[0xffffffffffffffff, r3, r4], &(0x7f0000000480)=[{0x0, 0x4, 0xe, 0x5}], 0x10, 0x6}, 0x90)
r5 = syz_open_procfs(0x0, &(0x7f0000000200)='net/protocols\x00')
read$qrtrtun(r5, &(0x7f0000000040)=""/85, 0x55) (async)
ioctl$BLKROGET(r5, 0x125e, &(0x7f0000000000)) (async)
read$qrtrtun(r5, &(0x7f00000000c0)=""/156, 0x9c)
03:50:49 executing program 0:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
ioctl$SIOCPNADDRESOURCE(r0, 0x89e0, &(0x7f0000000000)=0x8)
03:50:49 executing program 2:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst={0x0, 0x0, 0x0, 0x0, 0x0, 0x18}], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:50 executing program 2:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst={0x0, 0x0, 0x0, 0x0, 0x0, 0x25}], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:50 executing program 3:
syz_open_procfs(0x0, &(0x7f0000000180)='attr/exec\x00')
read$qrtrtun(0xffffffffffffffff, &(0x7f0000000040)=""/85, 0x55)
03:50:50 executing program 0:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000) (async)
ioctl$SIOCPNADDRESOURCE(r0, 0x89e0, &(0x7f0000000000)=0x8)
03:50:50 executing program 4:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
r1 = socket$igmp(0x2, 0x3, 0x2)
ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'ip6gre0\x00'}) (async)
ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'ip6gre0\x00', 0x0})
bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', r2}, 0x48) (async)
r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', r2}, 0x48)
r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r4, 0x0, 0xcf, 0x0, 0x0)
bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000001200)={r3, 0xffffffffffffffff}, 0x4)
r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000013c0)='cpuset\x00')
setsockopt$MRT_ASSERT(r6, 0x0, 0xcf, 0x0, 0x0)
r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r7, 0x0, 0xcf, 0x0, 0x0)
bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001300)={0x6, 0x10, &(0x7f0000001180)=@raw=[@jmp={0x5, 0x0, 0x7, 0x1, 0x7, 0x2, 0x4}, @map_val={0x18, 0x5, 0x2, 0x0, r4, 0x0, 0x0, 0x0, 0x3}, @map_idx_val={0x18, 0xa, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @func={0x85, 0x0, 0x1, 0x0, 0x1}, @generic={0x9, 0x2, 0x0, 0x1000, 0x8}, @printk={@pointer, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x101}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}], &(0x7f0000000080)='GPL\x00', 0xffff059b, 0x0, 0x0, 0x41100, 0x8, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000010c0)={0x8, 0xd, 0x1, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001240)=[r5, r3, r6, 0xffffffffffffffff, r7], &(0x7f00000012c0), 0x10, 0x3}, 0x90) (async)
bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001300)={0x6, 0x10, &(0x7f0000001180)=@raw=[@jmp={0x5, 0x0, 0x7, 0x1, 0x7, 0x2, 0x4}, @map_val={0x18, 0x5, 0x2, 0x0, r4, 0x0, 0x0, 0x0, 0x3}, @map_idx_val={0x18, 0xa, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @func={0x85, 0x0, 0x1, 0x0, 0x1}, @generic={0x9, 0x2, 0x0, 0x1000, 0x8}, @printk={@pointer, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x101}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}], &(0x7f0000000080)='GPL\x00', 0xffff059b, 0x0, 0x0, 0x41100, 0x8, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000010c0)={0x8, 0xd, 0x1, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001240)=[r5, r3, r6, 0xffffffffffffffff, r7], &(0x7f00000012c0), 0x10, 0x3}, 0x90)
bpf$BPF_PROG_QUERY(0x10, &(0x7f0000001100)={@cgroup, 0x10, 0x0, 0x84, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5, 0x0, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000001140)=[0x0, 0x0], &(0x7f00000010c0)}, 0x40) (async)
bpf$BPF_PROG_QUERY(0x10, &(0x7f0000001100)={@cgroup, 0x10, 0x0, 0x84, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5, 0x0, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000001140)=[0x0, 0x0], &(0x7f00000010c0)}, 0x40)
03:50:50 executing program 2:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst={0x0, 0x0, 0x0, 0x0, 0x0, 0x2a}], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:50 executing program 1:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r2, 0x0, 0xcf, 0x0, 0x0)
bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000013c0)={0x8, 0x0}, 0x8)
r4 = bpf$PROG_LOAD(0x5, &(0x7f0000001640)={0xe, 0x11, &(0x7f0000001400)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, [@printk={@pointer, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x7}}, @alu={0x7, 0x1, 0x5, 0x7, 0x5, 0xffffffffffffffff}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}, @map_idx_val={0x18, 0x8, 0x6, 0x0, 0x10, 0x0, 0x0, 0x0, 0x1}, @map_idx={0x18, 0x7, 0x5, 0x0, 0x2}]}, &(0x7f00000014c0)='syzkaller\x00', 0x8a8, 0x18, &(0x7f0000001500)=""/24, 0x41100, 0x20, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000001540)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000001580)={0x2, 0x3, 0x8, 0x6}, 0x10, 0x0, r1, 0x1, &(0x7f00000015c0)=[r0], &(0x7f0000001600)=[{0x5, 0x3, 0x4, 0x3}], 0x10, 0x5}, 0x90)
r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r5, 0x0, 0xcf, 0x0, 0x0)
r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r6, 0x0, 0xcf, 0x0, 0x0)
r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r7, 0x0, 0xcf, 0x0, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000001780)={0x13, 0xd, &(0x7f0000001180)=@framed={{0x18, 0x0, 0x0, 0x0, 0xb941, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x2, 0x1, 0x3, 0x3, 0x9, 0xfffffffffffffff0, 0x1}, @printk={@pointer, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x3}}, @ldst={0x2, 0x2, 0x0, 0xa, 0xa, 0x10, 0x8}]}, &(0x7f0000001200)='syzkaller\x00', 0x9, 0xbd, &(0x7f00000012c0)=""/189, 0x40f00, 0x0, '\x00', 0x0, 0x28, r2, 0x8, &(0x7f0000001240)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000001380)={0x3, 0x3, 0xff, 0x9}, 0x10, r3, r4, 0x4, &(0x7f0000001700)=[r1, r5, r6, r1, r7, r0], &(0x7f0000001740)=[{0x5, 0x2, 0x3, 0x5}, {0x0, 0x2, 0xd, 0x5}, {0x2, 0x3, 0x9, 0xa}, {0x4, 0x1, 0xb, 0x6}], 0x10, 0xffffffff}, 0x90)
setsockopt$MRT_ASSERT(r1, 0x0, 0xcf, 0x0, 0x0)
sendmsg$IPCTNL_MSG_CT_NEW(r1, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000040)={&(0x7f00000010c0)={0xb8, 0x0, 0x1, 0x5, 0x0, 0x0, {0x2}, [@CTA_STATUS={0x8, 0x3, 0x1, 0x0, 0x2}, @CTA_LABELS={0xc, 0x16, 0x1, 0x0, [0x3f, 0x6]}, @CTA_MARK={0x8, 0x8, 0x1, 0x0, 0x7}, @CTA_TUPLE_ORIG={0x60, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x8, 0x2, @rand_addr=0x64010100}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @rand_addr=0x64010102}, {0x8, 0x2, @private=0xa010101}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}]}, @CTA_LABELS_MASK={0x20, 0x17, [0x6, 0x6db, 0x1, 0x2aa, 0x1, 0x8, 0x5]}, @CTA_TIMEOUT={0x8, 0x7, 0x1, 0x0, 0x1000}]}, 0xb8}, 0x1, 0x0, 0x0, 0x20008094}, 0x810)
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
03:50:50 executing program 5:
r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/protocols\x00')
read$qrtrtun(r0, &(0x7f0000000040)=""/85, 0x55)
write$qrtrtun(r0, &(0x7f0000000240)="33973e7a86524cc6ca3c7e7251be77f11ee1dc5a4bb1c1a4e0a819eee3d5db263dbb4ad86c91fcf8e9374f9942780f284586e728a64b112a8ea3db4ef7c0fa24f1d43251d66d324a10574028abd591ea412a166131fea3d846cd5a085a88f5ae13ebfcb44f7a7d5b9b3d575c0e8ad588bef0b7d09e10b4566b202c7e9fafe9ed6fb41ec114525c2e137a026775f988e2563bbea7e9452243803f418ad5faded672205311e3137cc93f535ebc3c599e11a178d9dd54fe8cba1a88cbe670b60781dac5b2d31f827a443b", 0xc9)
read$qrtrtun(r0, &(0x7f00000000c0)=""/156, 0x9c)
03:50:50 executing program 3:
syz_open_procfs(0x0, &(0x7f0000000180)='attr/exec\x00')
read$qrtrtun(0xffffffffffffffff, &(0x7f0000000040)=""/85, 0x55)
03:50:50 executing program 2:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst={0x0, 0x0, 0x0, 0x0, 0x0, 0x48}], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:50 executing program 4:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r1, 0x0, 0xcf, 0x0, 0x0)
ioctl$SIOCGETSGCNT_IN6(r1, 0x89e1, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private2})
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
03:50:50 executing program 0:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f0000000000)=""/4101, 0x1005)
03:50:50 executing program 3:
r0 = syz_open_procfs(0x0, &(0x7f0000000180)='attr/exec\x00')
read$qrtrtun(r0, 0x0, 0x0)
03:50:50 executing program 2:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst={0x0, 0x0, 0x0, 0x0, 0x0, 0x4c}], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:50 executing program 1:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00') (async)
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r2, 0x0, 0xcf, 0x0, 0x0) (async)
bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000013c0)={0x8, 0x0}, 0x8) (async)
r4 = bpf$PROG_LOAD(0x5, &(0x7f0000001640)={0xe, 0x11, &(0x7f0000001400)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, [@printk={@pointer, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x7}}, @alu={0x7, 0x1, 0x5, 0x7, 0x5, 0xffffffffffffffff}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}, @map_idx_val={0x18, 0x8, 0x6, 0x0, 0x10, 0x0, 0x0, 0x0, 0x1}, @map_idx={0x18, 0x7, 0x5, 0x0, 0x2}]}, &(0x7f00000014c0)='syzkaller\x00', 0x8a8, 0x18, &(0x7f0000001500)=""/24, 0x41100, 0x20, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000001540)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000001580)={0x2, 0x3, 0x8, 0x6}, 0x10, 0x0, r1, 0x1, &(0x7f00000015c0)=[r0], &(0x7f0000001600)=[{0x5, 0x3, 0x4, 0x3}], 0x10, 0x5}, 0x90) (async)
r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r5, 0x0, 0xcf, 0x0, 0x0) (async)
r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r6, 0x0, 0xcf, 0x0, 0x0) (async)
r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r7, 0x0, 0xcf, 0x0, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000001780)={0x13, 0xd, &(0x7f0000001180)=@framed={{0x18, 0x0, 0x0, 0x0, 0xb941, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x2, 0x1, 0x3, 0x3, 0x9, 0xfffffffffffffff0, 0x1}, @printk={@pointer, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x3}}, @ldst={0x2, 0x2, 0x0, 0xa, 0xa, 0x10, 0x8}]}, &(0x7f0000001200)='syzkaller\x00', 0x9, 0xbd, &(0x7f00000012c0)=""/189, 0x40f00, 0x0, '\x00', 0x0, 0x28, r2, 0x8, &(0x7f0000001240)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000001380)={0x3, 0x3, 0xff, 0x9}, 0x10, r3, r4, 0x4, &(0x7f0000001700)=[r1, r5, r6, r1, r7, r0], &(0x7f0000001740)=[{0x5, 0x2, 0x3, 0x5}, {0x0, 0x2, 0xd, 0x5}, {0x2, 0x3, 0x9, 0xa}, {0x4, 0x1, 0xb, 0x6}], 0x10, 0xffffffff}, 0x90)
setsockopt$MRT_ASSERT(r1, 0x0, 0xcf, 0x0, 0x0) (async)
sendmsg$IPCTNL_MSG_CT_NEW(r1, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000040)={&(0x7f00000010c0)={0xb8, 0x0, 0x1, 0x5, 0x0, 0x0, {0x2}, [@CTA_STATUS={0x8, 0x3, 0x1, 0x0, 0x2}, @CTA_LABELS={0xc, 0x16, 0x1, 0x0, [0x3f, 0x6]}, @CTA_MARK={0x8, 0x8, 0x1, 0x0, 0x7}, @CTA_TUPLE_ORIG={0x60, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x8, 0x2, @rand_addr=0x64010100}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @rand_addr=0x64010102}, {0x8, 0x2, @private=0xa010101}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}]}, @CTA_LABELS_MASK={0x20, 0x17, [0x6, 0x6db, 0x1, 0x2aa, 0x1, 0x8, 0x5]}, @CTA_TIMEOUT={0x8, 0x7, 0x1, 0x0, 0x1000}]}, 0xb8}, 0x1, 0x0, 0x0, 0x20008094}, 0x810) (async)
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
03:50:50 executing program 4:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r1, 0x0, 0xcf, 0x0, 0x0) (async)
ioctl$SIOCGETSGCNT_IN6(r1, 0x89e1, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private2})
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
03:50:50 executing program 0:
syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00') (async)
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f0000000000)=""/4101, 0x1005)
03:50:50 executing program 5:
r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/protocols\x00')
read$qrtrtun(r0, &(0x7f0000000040)=""/85, 0x55)
write$qrtrtun(r0, &(0x7f0000000240)="33973e7a86524cc6ca3c7e7251be77f11ee1dc5a4bb1c1a4e0a819eee3d5db263dbb4ad86c91fcf8e9374f9942780f284586e728a64b112a8ea3db4ef7c0fa24f1d43251d66d324a10574028abd591ea412a166131fea3d846cd5a085a88f5ae13ebfcb44f7a7d5b9b3d575c0e8ad588bef0b7d09e10b4566b202c7e9fafe9ed6fb41ec114525c2e137a026775f988e2563bbea7e9452243803f418ad5faded672205311e3137cc93f535ebc3c599e11a178d9dd54fe8cba1a88cbe670b60781dac5b2d31f827a443b", 0xc9) (async)
read$qrtrtun(r0, &(0x7f00000000c0)=""/156, 0x9c)
03:50:50 executing program 3:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='statm\x00')
pipe2$watch_queue(&(0x7f0000000040), 0x80)
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/rfcomm\x00')
03:50:50 executing program 0:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f0000000000)=""/4101, 0x1005)
03:50:50 executing program 3:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='statm\x00')
pipe2$watch_queue(&(0x7f0000000040), 0x80)
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/rfcomm\x00')
03:50:50 executing program 5:
r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/protocols\x00')
read$qrtrtun(r0, &(0x7f0000000040)=""/85, 0x55)
write$qrtrtun(r0, &(0x7f0000000240)="33973e7a86524cc6ca3c7e7251be77f11ee1dc5a4bb1c1a4e0a819eee3d5db263dbb4ad86c91fcf8e9374f9942780f284586e728a64b112a8ea3db4ef7c0fa24f1d43251d66d324a10574028abd591ea412a166131fea3d846cd5a085a88f5ae13ebfcb44f7a7d5b9b3d575c0e8ad588bef0b7d09e10b4566b202c7e9fafe9ed6fb41ec114525c2e137a026775f988e2563bbea7e9452243803f418ad5faded672205311e3137cc93f535ebc3c599e11a178d9dd54fe8cba1a88cbe670b60781dac5b2d31f827a443b", 0xc9)
read$qrtrtun(r0, &(0x7f00000000c0)=""/156, 0x9c)
03:50:50 executing program 0:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4084, 0xff4)
setsockopt$MRT_PIM(r0, 0x0, 0xcf, &(0x7f0000000000), 0x4)
03:50:50 executing program 2:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst={0x0, 0x0, 0x0, 0x0, 0x0, 0x68}], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:50 executing program 4:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00') (async)
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r1, 0x0, 0xcf, 0x0, 0x0)
ioctl$SIOCGETSGCNT_IN6(r1, 0x89e1, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private2}) (async)
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
03:50:50 executing program 1:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00') (async)
r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r2, 0x0, 0xcf, 0x0, 0x0)
bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000013c0)={0x8, 0x0}, 0x8) (async)
r4 = bpf$PROG_LOAD(0x5, &(0x7f0000001640)={0xe, 0x11, &(0x7f0000001400)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, [@printk={@pointer, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x7}}, @alu={0x7, 0x1, 0x5, 0x7, 0x5, 0xffffffffffffffff}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}, @map_idx_val={0x18, 0x8, 0x6, 0x0, 0x10, 0x0, 0x0, 0x0, 0x1}, @map_idx={0x18, 0x7, 0x5, 0x0, 0x2}]}, &(0x7f00000014c0)='syzkaller\x00', 0x8a8, 0x18, &(0x7f0000001500)=""/24, 0x41100, 0x20, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000001540)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000001580)={0x2, 0x3, 0x8, 0x6}, 0x10, 0x0, r1, 0x1, &(0x7f00000015c0)=[r0], &(0x7f0000001600)=[{0x5, 0x3, 0x4, 0x3}], 0x10, 0x5}, 0x90) (async)
r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r5, 0x0, 0xcf, 0x0, 0x0)
r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r6, 0x0, 0xcf, 0x0, 0x0) (async)
r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r7, 0x0, 0xcf, 0x0, 0x0) (async)
bpf$PROG_LOAD(0x5, &(0x7f0000001780)={0x13, 0xd, &(0x7f0000001180)=@framed={{0x18, 0x0, 0x0, 0x0, 0xb941, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x2, 0x1, 0x3, 0x3, 0x9, 0xfffffffffffffff0, 0x1}, @printk={@pointer, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x3}}, @ldst={0x2, 0x2, 0x0, 0xa, 0xa, 0x10, 0x8}]}, &(0x7f0000001200)='syzkaller\x00', 0x9, 0xbd, &(0x7f00000012c0)=""/189, 0x40f00, 0x0, '\x00', 0x0, 0x28, r2, 0x8, &(0x7f0000001240)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000001380)={0x3, 0x3, 0xff, 0x9}, 0x10, r3, r4, 0x4, &(0x7f0000001700)=[r1, r5, r6, r1, r7, r0], &(0x7f0000001740)=[{0x5, 0x2, 0x3, 0x5}, {0x0, 0x2, 0xd, 0x5}, {0x2, 0x3, 0x9, 0xa}, {0x4, 0x1, 0xb, 0x6}], 0x10, 0xffffffff}, 0x90)
setsockopt$MRT_ASSERT(r1, 0x0, 0xcf, 0x0, 0x0)
sendmsg$IPCTNL_MSG_CT_NEW(r1, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000040)={&(0x7f00000010c0)={0xb8, 0x0, 0x1, 0x5, 0x0, 0x0, {0x2}, [@CTA_STATUS={0x8, 0x3, 0x1, 0x0, 0x2}, @CTA_LABELS={0xc, 0x16, 0x1, 0x0, [0x3f, 0x6]}, @CTA_MARK={0x8, 0x8, 0x1, 0x0, 0x7}, @CTA_TUPLE_ORIG={0x60, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x8, 0x2, @rand_addr=0x64010100}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @rand_addr=0x64010102}, {0x8, 0x2, @private=0xa010101}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}]}, @CTA_LABELS_MASK={0x20, 0x17, [0x6, 0x6db, 0x1, 0x2aa, 0x1, 0x8, 0x5]}, @CTA_TIMEOUT={0x8, 0x7, 0x1, 0x0, 0x1000}]}, 0xb8}, 0x1, 0x0, 0x0, 0x20008094}, 0x810) (async)
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
03:50:50 executing program 3:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='statm\x00')
pipe2$watch_queue(&(0x7f0000000040), 0x80)
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/rfcomm\x00')
03:50:50 executing program 5:
epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff)
r0 = syz_open_procfs(0x0, &(0x7f0000000200)='attr\x00')
openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000240)=0xfffffffffffff14b)
epoll_pwait(r0, &(0x7f0000000180)=[{}, {}, {}, {}, {}], 0x5, 0x200, &(0x7f00000001c0)={[0x800]}, 0x8)
read$qrtrtun(r0, &(0x7f0000000040)=""/85, 0x55)
read$qrtrtun(r0, &(0x7f00000000c0)=""/156, 0x9c)
03:50:50 executing program 2:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst={0x0, 0x0, 0x0, 0x0, 0x0, 0x6c}], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:50 executing program 0:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4084, 0xff4) (async)
setsockopt$MRT_PIM(r0, 0x0, 0xcf, &(0x7f0000000000), 0x4)
03:50:50 executing program 4:
r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/netfilter\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
03:50:50 executing program 5:
epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff)
r0 = syz_open_procfs(0x0, &(0x7f0000000200)='attr\x00')
openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) (async)
ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000240)=0xfffffffffffff14b) (async)
epoll_pwait(r0, &(0x7f0000000180)=[{}, {}, {}, {}, {}], 0x5, 0x200, &(0x7f00000001c0)={[0x800]}, 0x8) (async)
read$qrtrtun(r0, &(0x7f0000000040)=""/85, 0x55)
read$qrtrtun(r0, &(0x7f00000000c0)=""/156, 0x9c)
03:50:50 executing program 2:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst={0x0, 0x0, 0x0, 0x0, 0x0, 0x74}], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:50 executing program 0:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4084, 0xff4)
setsockopt$MRT_PIM(r0, 0x0, 0xcf, &(0x7f0000000000), 0x4)
syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00') (async)
read$qrtrtun(r0, &(0x7f00000000c0)=""/4084, 0xff4) (async)
setsockopt$MRT_PIM(r0, 0x0, 0xcf, &(0x7f0000000000), 0x4) (async)
03:50:50 executing program 4:
r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/netfilter\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
03:50:50 executing program 1:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000012c0)=""/4095, 0xfff)
03:50:50 executing program 3:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='statm\x00')
pipe2$watch_queue(&(0x7f0000000040), 0x80)
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
03:50:50 executing program 5:
epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) (async)
r0 = syz_open_procfs(0x0, &(0x7f0000000200)='attr\x00')
openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) (async)
ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000240)=0xfffffffffffff14b) (async)
epoll_pwait(r0, &(0x7f0000000180)=[{}, {}, {}, {}, {}], 0x5, 0x200, &(0x7f00000001c0)={[0x800]}, 0x8)
read$qrtrtun(r0, &(0x7f0000000040)=""/85, 0x55) (async)
read$qrtrtun(r0, &(0x7f00000000c0)=""/156, 0x9c)
03:50:50 executing program 2:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst={0x0, 0x0, 0x0, 0x0, 0x0, 0x7a}], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:50 executing program 0:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
socket$inet_udp(0x2, 0x2, 0x0)
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
socket$inet_udplite(0x2, 0x2, 0x88)
syz_io_uring_setup(0x2946, &(0x7f0000000000)={0x0, 0x732a, 0x200, 0x3, 0xc, 0x0, r0}, &(0x7f0000000080)=0x0, &(0x7f00000010c0))
syz_io_uring_submit(r1, 0x0, &(0x7f0000001180)=@IORING_OP_CONNECT={0x10, 0x43, 0x0, r0, 0x80, &(0x7f0000001100)=@rc={0x1f, @none, 0xf7}, 0x0, 0x0, 0x1})
03:50:50 executing program 4:
r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/netfilter\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
03:50:50 executing program 5:
r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/protocols\x00')
read$qrtrtun(r0, &(0x7f0000000040)=""/85, 0x55)
read$qrtrtun(r0, &(0x7f0000000240)=""/177, 0xb1)
mmap$qrtrtun(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x2000000, 0x80010, r0, 0x9)
03:50:50 executing program 3:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='statm\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
03:50:50 executing program 1:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000012c0)=""/4095, 0xfff)
03:50:50 executing program 0:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
socket$inet_udp(0x2, 0x2, 0x0) (async)
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000) (async)
socket$inet_udplite(0x2, 0x2, 0x88) (async)
syz_io_uring_setup(0x2946, &(0x7f0000000000)={0x0, 0x732a, 0x200, 0x3, 0xc, 0x0, r0}, &(0x7f0000000080)=0x0, &(0x7f00000010c0))
syz_io_uring_submit(r1, 0x0, &(0x7f0000001180)=@IORING_OP_CONNECT={0x10, 0x43, 0x0, r0, 0x80, &(0x7f0000001100)=@rc={0x1f, @none, 0xf7}, 0x0, 0x0, 0x1})
03:50:50 executing program 2:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst={0x0, 0x0, 0x0, 0x0, 0x0, 0x9d}], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:50 executing program 5:
r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/protocols\x00')
read$qrtrtun(r0, &(0x7f0000000040)=""/85, 0x55)
read$qrtrtun(r0, &(0x7f0000000240)=""/177, 0xb1) (async, rerun: 64)
mmap$qrtrtun(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x2000000, 0x80010, r0, 0x9) (rerun: 64)
03:50:50 executing program 4:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(r0, &(0x7f00000010c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x7, 0x1, 0x3, 0x0, 0x0, {0xa, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x404c090}, 0x1)
03:50:50 executing program 3:
read$qrtrtun(0xffffffffffffffff, &(0x7f00000000c0)=""/4096, 0x1000)
03:50:50 executing program 2:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst={0x0, 0x0, 0x0, 0x0, 0x0, 0xe9}], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:50 executing program 0:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
socket$inet_udp(0x2, 0x2, 0x0) (async, rerun: 32)
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000) (async, rerun: 32)
socket$inet_udplite(0x2, 0x2, 0x88)
syz_io_uring_setup(0x2946, &(0x7f0000000000)={0x0, 0x732a, 0x200, 0x3, 0xc, 0x0, r0}, &(0x7f0000000080)=0x0, &(0x7f00000010c0))
syz_io_uring_submit(r1, 0x0, &(0x7f0000001180)=@IORING_OP_CONNECT={0x10, 0x43, 0x0, r0, 0x80, &(0x7f0000001100)=@rc={0x1f, @none, 0xf7}, 0x0, 0x0, 0x1})
03:50:50 executing program 5:
r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/protocols\x00')
read$qrtrtun(r0, &(0x7f0000000040)=""/85, 0x55) (async)
read$qrtrtun(r0, &(0x7f0000000240)=""/177, 0xb1)
mmap$qrtrtun(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x2000000, 0x80010, r0, 0x9)
03:50:50 executing program 1:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000012c0)=""/4095, 0xfff)
03:50:50 executing program 4:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(r0, &(0x7f00000010c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x7, 0x1, 0x3, 0x0, 0x0, {0xa, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x404c090}, 0x1) (async)
sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(r0, &(0x7f00000010c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x7, 0x1, 0x3, 0x0, 0x0, {0xa, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x404c090}, 0x1)
03:50:50 executing program 5:
r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/protocols\x00')
read$qrtrtun(r0, &(0x7f0000000040)=""/85, 0x55)
clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0})
epoll_pwait2(r0, &(0x7f0000000000)=[{}, {}, {}, {}, {}], 0x5, &(0x7f00000001c0)={r1, r2+60000000}, &(0x7f0000000240)={[0x42b324f7]}, 0x8)
read$qrtrtun(r0, &(0x7f00000000c0)=""/156, 0x9c)
03:50:50 executing program 2:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst={0x0, 0x0, 0x0, 0x0, 0x0, 0x22c}], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:50 executing program 1:
r0 = getpid()
ioctl$TFD_IOC_SET_TICKS(0xffffffffffffffff, 0x40085400, &(0x7f0000000000)=0x6)
r1 = syz_open_procfs(r0, &(0x7f0000000040)='net/rt6_stats\x00')
read$qrtrtun(r1, &(0x7f00000000c0)=""/4096, 0x1000)
03:50:50 executing program 4:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(r0, &(0x7f00000010c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x7, 0x1, 0x3, 0x0, 0x0, {0xa, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x404c090}, 0x1)
syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00') (async)
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000) (async)
sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(r0, &(0x7f00000010c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x7, 0x1, 0x3, 0x0, 0x0, {0xa, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x404c090}, 0x1) (async)
03:50:50 executing program 3:
read$qrtrtun(0xffffffffffffffff, &(0x7f00000000c0)=""/4096, 0x1000)
03:50:50 executing program 0:
r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/packet\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
03:50:50 executing program 5:
r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/protocols\x00')
read$qrtrtun(r0, &(0x7f0000000040)=""/85, 0x55)
clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0})
epoll_pwait2(r0, &(0x7f0000000000)=[{}, {}, {}, {}, {}], 0x5, &(0x7f00000001c0)={r1, r2+60000000}, &(0x7f0000000240)={[0x42b324f7]}, 0x8) (async)
read$qrtrtun(r0, &(0x7f00000000c0)=""/156, 0x9c)
03:50:50 executing program 1:
r0 = getpid()
ioctl$TFD_IOC_SET_TICKS(0xffffffffffffffff, 0x40085400, &(0x7f0000000000)=0x6) (async)
r1 = syz_open_procfs(r0, &(0x7f0000000040)='net/rt6_stats\x00')
read$qrtrtun(r1, &(0x7f00000000c0)=""/4096, 0x1000)
03:50:50 executing program 3:
read$qrtrtun(0xffffffffffffffff, &(0x7f00000000c0)=""/4096, 0x1000)
03:50:50 executing program 2:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst={0x0, 0x0, 0x0, 0x0, 0x0, 0x22d}], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:50 executing program 2:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst={0x0, 0x0, 0x0, 0x0, 0x0, 0x230}], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:50 executing program 0:
syz_open_procfs(0x0, &(0x7f0000000000)='net/packet\x00') (async)
r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/packet\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
03:50:50 executing program 4:
syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00')
r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000001080), 0x113080)
read$qrtrtun(r0, &(0x7f0000000040)=""/4127, 0x101f)
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r1, 0x0, 0xcf, 0x0, 0x0)
ioctl$TFD_IOC_SET_TICKS(r1, 0x40085400, &(0x7f00000010c0)=0x9)
r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r2, 0x0, 0xcf, 0x0, 0x0)
read$qrtrtun(r2, &(0x7f0000001100)=""/234, 0xea)
03:50:50 executing program 1:
r0 = getpid()
ioctl$TFD_IOC_SET_TICKS(0xffffffffffffffff, 0x40085400, &(0x7f0000000000)=0x6) (async)
ioctl$TFD_IOC_SET_TICKS(0xffffffffffffffff, 0x40085400, &(0x7f0000000000)=0x6)
r1 = syz_open_procfs(r0, &(0x7f0000000040)='net/rt6_stats\x00')
read$qrtrtun(r1, &(0x7f00000000c0)=""/4096, 0x1000)
03:50:50 executing program 3:
r0 = syz_open_procfs(0xffffffffffffffff, 0x0)
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
03:50:50 executing program 5:
r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/protocols\x00')
read$qrtrtun(r0, &(0x7f0000000040)=""/85, 0x55)
clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0})
epoll_pwait2(r0, &(0x7f0000000000)=[{}, {}, {}, {}, {}], 0x5, &(0x7f00000001c0)={r1, r2+60000000}, &(0x7f0000000240)={[0x42b324f7]}, 0x8)
read$qrtrtun(r0, &(0x7f00000000c0)=""/156, 0x9c) (async)
read$qrtrtun(r0, &(0x7f00000000c0)=""/156, 0x9c)
03:50:50 executing program 4:
syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00')
r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000001080), 0x113080)
read$qrtrtun(r0, &(0x7f0000000040)=""/4127, 0x101f) (async)
read$qrtrtun(r0, &(0x7f0000000040)=""/4127, 0x101f)
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r1, 0x0, 0xcf, 0x0, 0x0) (async)
setsockopt$MRT_ASSERT(r1, 0x0, 0xcf, 0x0, 0x0)
ioctl$TFD_IOC_SET_TICKS(r1, 0x40085400, &(0x7f00000010c0)=0x9)
r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r2, 0x0, 0xcf, 0x0, 0x0)
read$qrtrtun(r2, &(0x7f0000001100)=""/234, 0xea) (async)
read$qrtrtun(r2, &(0x7f0000001100)=""/234, 0xea)
03:50:50 executing program 1:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
pipe2$watch_queue(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80)
ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r1, 0x89f3, &(0x7f00000010c0)={'ip6_vti0\x00', &(0x7f0000000040)={'syztnl1\x00', 0x0, 0x2f, 0x4, 0x4, 0x49121f27, 0x9, @dev={0xfe, 0x80, '\x00', 0x2b}, @ipv4={'\x00', '\xff\xff', @private=0xa010100}, 0x7, 0x7, 0x20, 0x8}})
03:50:50 executing program 0:
r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/packet\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
03:50:50 executing program 3:
r0 = syz_open_procfs(0xffffffffffffffff, 0x0)
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
03:50:50 executing program 5:
r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/protocols\x00')
r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x2001, 0x0)
r2 = getpid()
r3 = getpid()
kcmp$KCMP_EPOLL_TFD(r3, r2, 0x7, 0xffffffffffffffff, &(0x7f0000001840))
syz_open_procfs(r2, &(0x7f00000001c0)='limits\x00')
write$tun(r1, &(0x7f0000000180)={@void, @void, @eth={@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}, @broadcast, @void, {@can={0xc, {{0x3, 0x1, 0x0, 0x1}, 0x8, 0x0, 0x0, 0x0, "281f57ad7bb3dec5"}}}}}, 0x1e)
openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x8040, 0x0)
read$qrtrtun(r0, &(0x7f0000000040)=""/85, 0x55)
r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r4, 0x0, 0xcf, 0x0, 0x0)
read$qrtrtun(r4, &(0x7f0000000280)=""/132, 0x84)
read$qrtrtun(r0, &(0x7f00000000c0)=""/156, 0x9c)
03:50:50 executing program 1:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
pipe2$watch_queue(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80)
ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r1, 0x89f3, &(0x7f00000010c0)={'ip6_vti0\x00', &(0x7f0000000040)={'syztnl1\x00', 0x0, 0x2f, 0x4, 0x4, 0x49121f27, 0x9, @dev={0xfe, 0x80, '\x00', 0x2b}, @ipv4={'\x00', '\xff\xff', @private=0xa010100}, 0x7, 0x7, 0x20, 0x8}})
syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00') (async)
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000) (async)
pipe2$watch_queue(&(0x7f0000000000), 0x80) (async)
ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r1, 0x89f3, &(0x7f00000010c0)={'ip6_vti0\x00', &(0x7f0000000040)={'syztnl1\x00', 0x0, 0x2f, 0x4, 0x4, 0x49121f27, 0x9, @dev={0xfe, 0x80, '\x00', 0x2b}, @ipv4={'\x00', '\xff\xff', @private=0xa010100}, 0x7, 0x7, 0x20, 0x8}}) (async)
03:50:50 executing program 2:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst={0x0, 0x0, 0x0, 0x0, 0x0, 0x2f2}], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:50 executing program 4:
syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00') (async)
r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000001080), 0x113080)
read$qrtrtun(r0, &(0x7f0000000040)=""/4127, 0x101f) (async)
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r1, 0x0, 0xcf, 0x0, 0x0) (async)
ioctl$TFD_IOC_SET_TICKS(r1, 0x40085400, &(0x7f00000010c0)=0x9)
r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r2, 0x0, 0xcf, 0x0, 0x0) (async)
read$qrtrtun(r2, &(0x7f0000001100)=""/234, 0xea)
03:50:50 executing program 0:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000000)={@desc={0x1, 0x0, @desc4}, 0x10, 0x0, '\x00', @d})
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r1, 0x0, 0xcf, 0x0, 0x0)
ioctl$sock_inet6_udp_SIOCOUTQ(r1, 0x5411, &(0x7f0000001180))
sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000001140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000001100)={&(0x7f00000010c0)={0x30, 0x0, 0x200, 0x70bd2a, 0x25dfdbfe, {{}, {}, {0x14, 0x19, {0xc0, 0x800, 0x80}}}, ["", "", "", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x40000}, 0xc000)
03:50:50 executing program 5:
r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/protocols\x00') (async, rerun: 32)
r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x2001, 0x0) (async, rerun: 32)
r2 = getpid() (async)
r3 = getpid()
kcmp$KCMP_EPOLL_TFD(r3, r2, 0x7, 0xffffffffffffffff, &(0x7f0000001840))
syz_open_procfs(r2, &(0x7f00000001c0)='limits\x00') (async, rerun: 32)
write$tun(r1, &(0x7f0000000180)={@void, @void, @eth={@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}, @broadcast, @void, {@can={0xc, {{0x3, 0x1, 0x0, 0x1}, 0x8, 0x0, 0x0, 0x0, "281f57ad7bb3dec5"}}}}}, 0x1e) (async, rerun: 32)
openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x8040, 0x0) (async)
read$qrtrtun(r0, &(0x7f0000000040)=""/85, 0x55) (async)
r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r4, 0x0, 0xcf, 0x0, 0x0) (async, rerun: 32)
read$qrtrtun(r4, &(0x7f0000000280)=""/132, 0x84) (async, rerun: 32)
read$qrtrtun(r0, &(0x7f00000000c0)=""/156, 0x9c)
03:50:50 executing program 3:
r0 = syz_open_procfs(0xffffffffffffffff, 0x0)
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
03:50:50 executing program 4:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
syz_io_uring_setup(0x6914, &(0x7f0000000000)={0x0, 0xa8f7, 0x1, 0x0, 0x2ee, 0x0, r0}, &(0x7f0000000080)=0x0, &(0x7f00000010c0))
syz_io_uring_setup(0x11be, &(0x7f0000001100)={0x0, 0x75f3, 0x8, 0x0, 0x2d6, 0x0, r0}, &(0x7f0000001180), &(0x7f00000011c0)=0x0)
syz_io_uring_submit(r1, r2, &(0x7f0000001200)=@IORING_OP_POLL_ADD={0x6, 0x10, 0x0, @fd_index=0x9, 0x0, 0x0, 0x0, {0x9009}})
03:50:50 executing program 1:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000) (async)
pipe2$watch_queue(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80)
ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r1, 0x89f3, &(0x7f00000010c0)={'ip6_vti0\x00', &(0x7f0000000040)={'syztnl1\x00', 0x0, 0x2f, 0x4, 0x4, 0x49121f27, 0x9, @dev={0xfe, 0x80, '\x00', 0x2b}, @ipv4={'\x00', '\xff\xff', @private=0xa010100}, 0x7, 0x7, 0x20, 0x8}})
03:50:50 executing program 0:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000000)={@desc={0x1, 0x0, @desc4}, 0x10, 0x0, '\x00', @d})
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r1, 0x0, 0xcf, 0x0, 0x0)
ioctl$sock_inet6_udp_SIOCOUTQ(r1, 0x5411, &(0x7f0000001180)) (async)
sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000001140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000001100)={&(0x7f00000010c0)={0x30, 0x0, 0x200, 0x70bd2a, 0x25dfdbfe, {{}, {}, {0x14, 0x19, {0xc0, 0x800, 0x80}}}, ["", "", "", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x40000}, 0xc000)
03:50:50 executing program 2:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst={0x0, 0x0, 0x0, 0x0, 0x0, 0x300}], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:50 executing program 5:
syz_open_procfs(0x0, &(0x7f0000000200)='net/protocols\x00') (async)
r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/protocols\x00')
r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x2001, 0x0)
getpid() (async)
r2 = getpid()
r3 = getpid()
kcmp$KCMP_EPOLL_TFD(r3, r2, 0x7, 0xffffffffffffffff, &(0x7f0000001840)) (async)
kcmp$KCMP_EPOLL_TFD(r3, r2, 0x7, 0xffffffffffffffff, &(0x7f0000001840))
syz_open_procfs(r2, &(0x7f00000001c0)='limits\x00')
write$tun(r1, &(0x7f0000000180)={@void, @void, @eth={@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}, @broadcast, @void, {@can={0xc, {{0x3, 0x1, 0x0, 0x1}, 0x8, 0x0, 0x0, 0x0, "281f57ad7bb3dec5"}}}}}, 0x1e) (async)
write$tun(r1, &(0x7f0000000180)={@void, @void, @eth={@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}, @broadcast, @void, {@can={0xc, {{0x3, 0x1, 0x0, 0x1}, 0x8, 0x0, 0x0, 0x0, "281f57ad7bb3dec5"}}}}}, 0x1e)
openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x8040, 0x0)
read$qrtrtun(r0, &(0x7f0000000040)=""/85, 0x55)
r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r4, 0x0, 0xcf, 0x0, 0x0)
read$qrtrtun(r4, &(0x7f0000000280)=""/132, 0x84)
read$qrtrtun(r0, &(0x7f00000000c0)=""/156, 0x9c)
03:50:50 executing program 3:
syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='statm\x00')
read$qrtrtun(0xffffffffffffffff, &(0x7f00000000c0)=""/4096, 0x1000)
03:50:50 executing program 0:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000000)={@desc={0x1, 0x0, @desc4}, 0x10, 0x0, '\x00', @d})
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000) (async)
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r1, 0x0, 0xcf, 0x0, 0x0) (async)
ioctl$sock_inet6_udp_SIOCOUTQ(r1, 0x5411, &(0x7f0000001180)) (async)
sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000001140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000001100)={&(0x7f00000010c0)={0x30, 0x0, 0x200, 0x70bd2a, 0x25dfdbfe, {{}, {}, {0x14, 0x19, {0xc0, 0x800, 0x80}}}, ["", "", "", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x40000}, 0xc000)
03:50:50 executing program 3:
syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='statm\x00')
read$qrtrtun(0xffffffffffffffff, &(0x7f00000000c0)=""/4096, 0x1000)
03:50:50 executing program 4:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
syz_io_uring_setup(0x6914, &(0x7f0000000000)={0x0, 0xa8f7, 0x1, 0x0, 0x2ee, 0x0, r0}, &(0x7f0000000080)=0x0, &(0x7f00000010c0)) (async)
syz_io_uring_setup(0x11be, &(0x7f0000001100)={0x0, 0x75f3, 0x8, 0x0, 0x2d6, 0x0, r0}, &(0x7f0000001180), &(0x7f00000011c0)=0x0)
syz_io_uring_submit(r1, r2, &(0x7f0000001200)=@IORING_OP_POLL_ADD={0x6, 0x10, 0x0, @fd_index=0x9, 0x0, 0x0, 0x0, {0x9009}})
03:50:50 executing program 0:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x109000, 0x0)
write$qrtrtun(r1, &(0x7f0000000040)="4737436c34e9cab252fd775249c89b901046dac62c959d2c6a0ad2ddff899952ed214dfb21cdc753e558ce2dcb3b", 0x2e)
03:50:50 executing program 2:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst={0x0, 0x0, 0x0, 0x0, 0x0, 0x30a}], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:50 executing program 5:
r0 = getpid()
r1 = syz_open_procfs(r0, &(0x7f0000000200)='numa_maps\x00')
read$qrtrtun(r1, &(0x7f0000000040)=""/85, 0x55)
bpf$ITER_CREATE(0x21, &(0x7f0000000000)={r1}, 0x8)
r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r2, 0x0, 0xcf, 0x0, 0x0)
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r2, 0xc0c89425, &(0x7f0000000240)={"2e0f463b498098e5f7c91b532076626e", 0x0, 0x0, {0x1000, 0x20}, {0x8000000000000001, 0x1}, 0x1, [0x1ff, 0x5, 0xff, 0xbeeb, 0x40, 0x8, 0x7, 0x7, 0x1, 0xfff, 0x1, 0x7fff, 0x40, 0x10000, 0x2, 0x80]})
openat$nci(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0)
read$qrtrtun(r1, &(0x7f00000000c0)=""/156, 0x9c)
03:50:50 executing program 1:
ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, &(0x7f0000000000)=0x7696)
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1006)
03:50:50 executing program 4:
syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00') (async)
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
syz_io_uring_setup(0x6914, &(0x7f0000000000)={0x0, 0xa8f7, 0x1, 0x0, 0x2ee, 0x0, r0}, &(0x7f0000000080)=0x0, &(0x7f00000010c0))
syz_io_uring_setup(0x11be, &(0x7f0000001100)={0x0, 0x75f3, 0x8, 0x0, 0x2d6, 0x0, r0}, &(0x7f0000001180), &(0x7f00000011c0)=0x0)
syz_io_uring_submit(r1, r2, &(0x7f0000001200)=@IORING_OP_POLL_ADD={0x6, 0x10, 0x0, @fd_index=0x9, 0x0, 0x0, 0x0, {0x9009}})
03:50:50 executing program 2:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst={0x0, 0x0, 0x0, 0x0, 0x0, 0x3e6}], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:50 executing program 0:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x109000, 0x0)
write$qrtrtun(r1, &(0x7f0000000040)="4737436c34e9cab252fd775249c89b901046dac62c959d2c6a0ad2ddff899952ed214dfb21cdc753e558ce2dcb3b", 0x2e)
syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00') (async)
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000) (async)
openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x109000, 0x0) (async)
write$qrtrtun(r1, &(0x7f0000000040)="4737436c34e9cab252fd775249c89b901046dac62c959d2c6a0ad2ddff899952ed214dfb21cdc753e558ce2dcb3b", 0x2e) (async)
03:50:50 executing program 3:
syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='statm\x00')
read$qrtrtun(0xffffffffffffffff, &(0x7f00000000c0)=""/4096, 0x1000)
03:50:50 executing program 1:
ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, &(0x7f0000000000)=0x7696) (async, rerun: 32)
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00') (rerun: 32)
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1006)
03:50:50 executing program 5:
r0 = getpid()
r1 = syz_open_procfs(r0, &(0x7f0000000200)='numa_maps\x00')
read$qrtrtun(r1, &(0x7f0000000040)=""/85, 0x55)
bpf$ITER_CREATE(0x21, &(0x7f0000000000)={r1}, 0x8) (async)
r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r2, 0x0, 0xcf, 0x0, 0x0) (async)
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r2, 0xc0c89425, &(0x7f0000000240)={"2e0f463b498098e5f7c91b532076626e", 0x0, 0x0, {0x1000, 0x20}, {0x8000000000000001, 0x1}, 0x1, [0x1ff, 0x5, 0xff, 0xbeeb, 0x40, 0x8, 0x7, 0x7, 0x1, 0xfff, 0x1, 0x7fff, 0x40, 0x10000, 0x2, 0x80]})
openat$nci(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) (async)
read$qrtrtun(r1, &(0x7f00000000c0)=""/156, 0x9c)
03:50:50 executing program 2:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst={0x0, 0x0, 0x0, 0x0, 0x0, 0x3e8}], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:50 executing program 0:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x109000, 0x0)
write$qrtrtun(r1, &(0x7f0000000040)="4737436c34e9cab252fd775249c89b901046dac62c959d2c6a0ad2ddff899952ed214dfb21cdc753e558ce2dcb3b", 0x2e)
syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00') (async)
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000) (async)
openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x109000, 0x0) (async)
write$qrtrtun(r1, &(0x7f0000000040)="4737436c34e9cab252fd775249c89b901046dac62c959d2c6a0ad2ddff899952ed214dfb21cdc753e558ce2dcb3b", 0x2e) (async)
03:50:50 executing program 4:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r1, 0x0, 0xcf, 0x0, 0x0)
statx(r0, &(0x7f0000000000)='./file0\x00', 0x2000, 0x754, &(0x7f00000010c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0})
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f0000000040)={{0x1, 0x1, 0x18, r1, {0xee01, r2}}, './file0\x00'})
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
03:50:50 executing program 3:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='statm\x00')
read$qrtrtun(r0, 0x0, 0x0)
03:50:50 executing program 5:
r0 = getpid()
r1 = syz_open_procfs(r0, &(0x7f0000000200)='numa_maps\x00')
read$qrtrtun(r1, &(0x7f0000000040)=""/85, 0x55)
bpf$ITER_CREATE(0x21, &(0x7f0000000000)={r1}, 0x8)
r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r2, 0x0, 0xcf, 0x0, 0x0)
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r2, 0xc0c89425, &(0x7f0000000240)={"2e0f463b498098e5f7c91b532076626e", 0x0, 0x0, {0x1000, 0x20}, {0x8000000000000001, 0x1}, 0x1, [0x1ff, 0x5, 0xff, 0xbeeb, 0x40, 0x8, 0x7, 0x7, 0x1, 0xfff, 0x1, 0x7fff, 0x40, 0x10000, 0x2, 0x80]})
openat$nci(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0)
read$qrtrtun(r1, &(0x7f00000000c0)=""/156, 0x9c)
getpid() (async)
syz_open_procfs(r0, &(0x7f0000000200)='numa_maps\x00') (async)
read$qrtrtun(r1, &(0x7f0000000040)=""/85, 0x55) (async)
bpf$ITER_CREATE(0x21, &(0x7f0000000000)={r1}, 0x8) (async)
syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00') (async)
setsockopt$MRT_ASSERT(r2, 0x0, 0xcf, 0x0, 0x0) (async)
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r2, 0xc0c89425, &(0x7f0000000240)={"2e0f463b498098e5f7c91b532076626e", 0x0, 0x0, {0x1000, 0x20}, {0x8000000000000001, 0x1}, 0x1, [0x1ff, 0x5, 0xff, 0xbeeb, 0x40, 0x8, 0x7, 0x7, 0x1, 0xfff, 0x1, 0x7fff, 0x40, 0x10000, 0x2, 0x80]}) (async)
openat$nci(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) (async)
read$qrtrtun(r1, &(0x7f00000000c0)=""/156, 0x9c) (async)
03:50:50 executing program 1:
ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, &(0x7f0000000000)=0x7696) (async)
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1006)
03:50:50 executing program 2:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst={0x0, 0x0, 0x0, 0x0, 0x0, 0x500}], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:50 executing program 4:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r1, 0x0, 0xcf, 0x0, 0x0) (async)
statx(r0, &(0x7f0000000000)='./file0\x00', 0x2000, 0x754, &(0x7f00000010c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0})
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f0000000040)={{0x1, 0x1, 0x18, r1, {0xee01, r2}}, './file0\x00'})
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
03:50:50 executing program 3:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='statm\x00')
read$qrtrtun(r0, 0x0, 0x0)
03:50:50 executing program 0:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r1, 0x0, 0xcf, 0x0, 0x0)
read$qrtrtun(r0, &(0x7f00000012c0)=""/4096, 0x1013)
03:50:50 executing program 1:
mknodat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0xc000, 0x9)
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
03:50:50 executing program 2:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst={0x0, 0x0, 0x0, 0x0, 0x0, 0x600}], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:50 executing program 5:
r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/protocols\x00')
read$qrtrtun(r0, &(0x7f0000000040)=""/85, 0x55)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0xee00, 0xee00}}, './file0\x00'})
openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000240), 0x747480)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0, {0x0, 0xffffffffffffffff}}, './file0\x00'})
write$P9_RLINK(r0, &(0x7f0000000280)={0x7, 0x47, 0x1}, 0x7)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r1, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0xee00, r2}}, './file0\x00'})
read$qrtrtun(r0, &(0x7f00000000c0)=""/156, 0x9c)
03:50:50 executing program 1:
mknodat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0xc000, 0x9) (async)
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
03:50:50 executing program 0:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r1, 0x0, 0xcf, 0x0, 0x0)
read$qrtrtun(r0, &(0x7f00000012c0)=""/4096, 0x1013)
syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00') (async)
syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00') (async)
setsockopt$MRT_ASSERT(r1, 0x0, 0xcf, 0x0, 0x0) (async)
read$qrtrtun(r0, &(0x7f00000012c0)=""/4096, 0x1013) (async)
03:50:50 executing program 4:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00') (async)
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r1, 0x0, 0xcf, 0x0, 0x0)
statx(r0, &(0x7f0000000000)='./file0\x00', 0x2000, 0x754, &(0x7f00000010c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0})
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f0000000040)={{0x1, 0x1, 0x18, r1, {0xee01, r2}}, './file0\x00'}) (async)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f0000000040)={{0x1, 0x1, 0x18, r1, {0xee01, r2}}, './file0\x00'})
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
03:50:50 executing program 1:
mknodat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0xc000, 0x9)
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
03:50:50 executing program 2:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst={0x0, 0x0, 0x0, 0x0, 0x0, 0x700}], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:50 executing program 5:
r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/protocols\x00')
read$qrtrtun(r0, &(0x7f0000000040)=""/85, 0x55)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0xee00, 0xee00}}, './file0\x00'}) (async)
openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000240), 0x747480) (async)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0, {0x0, 0xffffffffffffffff}}, './file0\x00'}) (async, rerun: 64)
write$P9_RLINK(r0, &(0x7f0000000280)={0x7, 0x47, 0x1}, 0x7) (rerun: 64)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r1, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0xee00, r2}}, './file0\x00'}) (async)
read$qrtrtun(r0, &(0x7f00000000c0)=""/156, 0x9c)
03:50:50 executing program 3:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='statm\x00')
read$qrtrtun(r0, 0x0, 0x0)
03:50:50 executing program 1:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/tcp\x00')
setsockopt$MRT_ASSERT(r1, 0x0, 0xcf, 0x0, 0x0)
ioctl$sock_inet6_udp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000000))
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
03:50:50 executing program 5:
r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/protocols\x00')
read$qrtrtun(r0, &(0x7f0000000040)=""/85, 0x55)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0xee00, 0xee00}}, './file0\x00'}) (async)
openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000240), 0x747480)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0, {0x0, 0xffffffffffffffff}}, './file0\x00'})
write$P9_RLINK(r0, &(0x7f0000000280)={0x7, 0x47, 0x1}, 0x7) (async)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r1, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0xee00, r2}}, './file0\x00'})
read$qrtrtun(r0, &(0x7f00000000c0)=""/156, 0x9c)
03:50:50 executing program 2:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst={0x0, 0x0, 0x0, 0x0, 0x0, 0x900}], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:50 executing program 4:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
r1 = socket$inet6_sctp(0xa, 0x5, 0x84)
epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1)
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0xff95)
03:50:50 executing program 0:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00') (async, rerun: 64)
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00') (rerun: 64)
setsockopt$MRT_ASSERT(r1, 0x0, 0xcf, 0x0, 0x0) (async)
read$qrtrtun(r0, &(0x7f00000012c0)=""/4096, 0x1013)
03:50:50 executing program 3:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='io\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
03:50:51 executing program 1:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00') (async)
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/tcp\x00')
setsockopt$MRT_ASSERT(r1, 0x0, 0xcf, 0x0, 0x0) (async)
ioctl$sock_inet6_udp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000000))
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
03:50:51 executing program 3:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='io\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
03:50:51 executing program 5:
r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8)
epoll_pwait(r0, &(0x7f0000000180)=[{}, {}, {}, {}, {}, {}], 0x6, 0x0, &(0x7f0000000240)={[0x1]}, 0x8)
r1 = syz_open_procfs(0x0, &(0x7f0000000200)='net/protocols\x00')
read$qrtrtun(r1, &(0x7f0000000040)=""/85, 0x55)
read$qrtrtun(r1, &(0x7f00000000c0)=""/156, 0x9c)
03:50:51 executing program 2:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst={0x0, 0x0, 0x0, 0x0, 0x0, 0xa00}], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:51 executing program 1:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/tcp\x00')
setsockopt$MRT_ASSERT(r1, 0x0, 0xcf, 0x0, 0x0) (async)
ioctl$sock_inet6_udp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000000)) (async)
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
03:50:51 executing program 4:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
r1 = socket$inet6_sctp(0xa, 0x5, 0x84)
epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1)
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0xff95)
syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00') (async)
socket$inet6_sctp(0xa, 0x5, 0x84) (async)
epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) (async)
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0xff95) (async)
03:50:51 executing program 5:
r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8)
epoll_pwait(r0, &(0x7f0000000180)=[{}, {}, {}, {}, {}, {}], 0x6, 0x0, &(0x7f0000000240)={[0x1]}, 0x8)
r1 = syz_open_procfs(0x0, &(0x7f0000000200)='net/protocols\x00')
read$qrtrtun(r1, &(0x7f0000000040)=""/85, 0x55)
read$qrtrtun(r1, &(0x7f00000000c0)=""/156, 0x9c)
bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) (async)
epoll_pwait(r0, &(0x7f0000000180)=[{}, {}, {}, {}, {}, {}], 0x6, 0x0, &(0x7f0000000240)={[0x1]}, 0x8) (async)
syz_open_procfs(0x0, &(0x7f0000000200)='net/protocols\x00') (async)
read$qrtrtun(r1, &(0x7f0000000040)=""/85, 0x55) (async)
read$qrtrtun(r1, &(0x7f00000000c0)=""/156, 0x9c) (async)
03:50:51 executing program 3:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='io\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
03:50:51 executing program 4:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
r1 = socket$inet6_sctp(0xa, 0x5, 0x84)
epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) (async)
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0xff95)
03:50:51 executing program 2:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst={0x0, 0x0, 0x0, 0x0, 0x0, 0xa03}], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:51 executing program 0:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000))
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
03:50:51 executing program 3:
read$qrtrtun(0xffffffffffffffff, &(0x7f00000000c0)=""/4096, 0x1000)
03:50:51 executing program 5:
r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8)
epoll_pwait(r0, &(0x7f0000000180)=[{}, {}, {}, {}, {}, {}], 0x6, 0x0, &(0x7f0000000240)={[0x1]}, 0x8)
r1 = syz_open_procfs(0x0, &(0x7f0000000200)='net/protocols\x00')
read$qrtrtun(r1, &(0x7f0000000040)=""/85, 0x55)
read$qrtrtun(r1, &(0x7f00000000c0)=""/156, 0x9c)
bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) (async)
epoll_pwait(r0, &(0x7f0000000180)=[{}, {}, {}, {}, {}, {}], 0x6, 0x0, &(0x7f0000000240)={[0x1]}, 0x8) (async)
syz_open_procfs(0x0, &(0x7f0000000200)='net/protocols\x00') (async)
read$qrtrtun(r1, &(0x7f0000000040)=""/85, 0x55) (async)
read$qrtrtun(r1, &(0x7f00000000c0)=""/156, 0x9c) (async)
03:50:51 executing program 1:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
write$P9_RWSTAT(r0, &(0x7f0000000000)={0x7, 0x7f, 0x1}, 0x7)
03:50:51 executing program 3:
read$qrtrtun(0xffffffffffffffff, &(0x7f00000000c0)=""/4096, 0x1000)
03:50:51 executing program 4:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
sendmsg$NFNL_MSG_COMPAT_GET(r0, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x30, 0x0, 0xb, 0x900, 0x0, 0x0, {0x3, 0x0, 0x6}, [@NFTA_COMPAT_REV={0x8, 0x2, 0x1, 0x0, 0x1}, @NFTA_COMPAT_NAME={0xa, 0x1, 'smaps\x00'}, @NFTA_COMPAT_TYPE={0x8, 0x3, 0x1, 0x0, 0x1}]}, 0x30}, 0x1, 0x0, 0x0, 0x80}, 0x800)
r1 = memfd_secret(0x80000)
setsockopt$MRT_ASSERT(r1, 0x0, 0xcf, &(0x7f0000000000)=0x1, 0x12)
r2 = memfd_secret(0x0)
read$qrtrtun(r2, &(0x7f00000012c0)=""/4060, 0xfffffc80)
ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, &(0x7f0000000040))
r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r3, 0x0, 0xcf, 0x0, 0x0)
r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r4, 0x0, 0xcf, 0x0, 0x0)
r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r5, 0x0, 0xcf, 0x0, 0x0)
ioctl$BLKIOOPT(r5, 0x1279, &(0x7f0000000440))
r6 = syz_open_procfs(0x0, &(0x7f0000000080)='net/psched\x00')
ioctl$BLKREPORTZONE(r2, 0xc0101282, &(0x7f0000000240)={0x3, 0x7, 0x0, [{0x8c, 0xbe2, 0x8001, 0xf0, 0x3f, 0x5, 0x1, '\x00', 0x4}, {0x0, 0x8, 0x9, 0xb2, 0x6, 0x4, 0x3f, '\x00', 0xffffffffffff0001}, {0xfffffffffffffffe, 0x80, 0x100, 0xff, 0x1f, 0x20, 0x2, '\x00', 0x7f}, {0x9, 0x100000001, 0x0, 0xe2, 0x0, 0x20, 0x3f, '\x00', 0x1}, {0x0, 0x5, 0x240, 0x80, 0x1, 0x9, 0x1, '\x00', 0x78}, {0x3, 0x6, 0x2, 0x4, 0x7, 0x5, 0x2, '\x00', 0x40}, {0x0, 0x0, 0x6, 0xf9, 0x81, 0x3f, 0x2, '\x00', 0x10001}]})
ioctl$PPPOEIOCSFWD(r6, 0x4008b100, &(0x7f00000000c0)={0x18, 0x0, {0x0, @broadcast, 'virt_wifi0\x00'}})
03:50:51 executing program 2:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst={0x0, 0x0, 0x0, 0x0, 0x0, 0xb00}], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:51 executing program 0:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000))
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00') (async)
socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) (async)
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000) (async)
03:50:51 executing program 5:
r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/protocols\x00')
read$qrtrtun(r0, &(0x7f0000000040)=""/85, 0x55)
ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000000)={'ip6_vti0\x00', &(0x7f0000000180)={'ip6tnl0\x00', 0x0, 0x29, 0x8, 0xff, 0x8, 0xa, @private2, @private2, 0x700, 0x8000, 0x6, 0x8}})
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='//file0\x00'])
sendmsg$IPSET_CMD_DESTROY(r0, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xc25040c0}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)={0x1c, 0x3, 0x6, 0x201, 0x0, 0x0, {0xa, 0x0, 0x5}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x24008000)
bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000340)={@ifindex=r1, 0x2, 0x0, 0x8, &(0x7f0000000240)=[0x0], 0x1, 0x0, &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0]}, 0x40)
read$qrtrtun(r0, &(0x7f00000000c0)=""/156, 0x9c)
03:50:51 executing program 3:
read$qrtrtun(0xffffffffffffffff, &(0x7f00000000c0)=""/4096, 0x1000)
03:50:51 executing program 4:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
sendmsg$NFNL_MSG_COMPAT_GET(r0, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x30, 0x0, 0xb, 0x900, 0x0, 0x0, {0x3, 0x0, 0x6}, [@NFTA_COMPAT_REV={0x8, 0x2, 0x1, 0x0, 0x1}, @NFTA_COMPAT_NAME={0xa, 0x1, 'smaps\x00'}, @NFTA_COMPAT_TYPE={0x8, 0x3, 0x1, 0x0, 0x1}]}, 0x30}, 0x1, 0x0, 0x0, 0x80}, 0x800)
r1 = memfd_secret(0x80000)
setsockopt$MRT_ASSERT(r1, 0x0, 0xcf, &(0x7f0000000000)=0x1, 0x12) (async)
r2 = memfd_secret(0x0)
read$qrtrtun(r2, &(0x7f00000012c0)=""/4060, 0xfffffc80) (async)
ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, &(0x7f0000000040)) (async)
r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r3, 0x0, 0xcf, 0x0, 0x0) (async)
r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r4, 0x0, 0xcf, 0x0, 0x0)
r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r5, 0x0, 0xcf, 0x0, 0x0) (async)
ioctl$BLKIOOPT(r5, 0x1279, &(0x7f0000000440)) (async)
r6 = syz_open_procfs(0x0, &(0x7f0000000080)='net/psched\x00')
ioctl$BLKREPORTZONE(r2, 0xc0101282, &(0x7f0000000240)={0x3, 0x7, 0x0, [{0x8c, 0xbe2, 0x8001, 0xf0, 0x3f, 0x5, 0x1, '\x00', 0x4}, {0x0, 0x8, 0x9, 0xb2, 0x6, 0x4, 0x3f, '\x00', 0xffffffffffff0001}, {0xfffffffffffffffe, 0x80, 0x100, 0xff, 0x1f, 0x20, 0x2, '\x00', 0x7f}, {0x9, 0x100000001, 0x0, 0xe2, 0x0, 0x20, 0x3f, '\x00', 0x1}, {0x0, 0x5, 0x240, 0x80, 0x1, 0x9, 0x1, '\x00', 0x78}, {0x3, 0x6, 0x2, 0x4, 0x7, 0x5, 0x2, '\x00', 0x40}, {0x0, 0x0, 0x6, 0xf9, 0x81, 0x3f, 0x2, '\x00', 0x10001}]}) (async)
ioctl$PPPOEIOCSFWD(r6, 0x4008b100, &(0x7f00000000c0)={0x18, 0x0, {0x0, @broadcast, 'virt_wifi0\x00'}})
03:50:51 executing program 1:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000) (async)
write$P9_RWSTAT(r0, &(0x7f0000000000)={0x7, 0x7f, 0x1}, 0x7)
03:50:51 executing program 2:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst={0x0, 0x0, 0x0, 0x0, 0x0, 0xc00}], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:51 executing program 3:
r0 = syz_open_procfs(0xffffffffffffffff, 0x0)
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
03:50:51 executing program 4:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
sendmsg$NFNL_MSG_COMPAT_GET(r0, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x30, 0x0, 0xb, 0x900, 0x0, 0x0, {0x3, 0x0, 0x6}, [@NFTA_COMPAT_REV={0x8, 0x2, 0x1, 0x0, 0x1}, @NFTA_COMPAT_NAME={0xa, 0x1, 'smaps\x00'}, @NFTA_COMPAT_TYPE={0x8, 0x3, 0x1, 0x0, 0x1}]}, 0x30}, 0x1, 0x0, 0x0, 0x80}, 0x800) (async)
r1 = memfd_secret(0x80000)
setsockopt$MRT_ASSERT(r1, 0x0, 0xcf, &(0x7f0000000000)=0x1, 0x12) (async)
r2 = memfd_secret(0x0)
read$qrtrtun(r2, &(0x7f00000012c0)=""/4060, 0xfffffc80)
ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, &(0x7f0000000040)) (async)
r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r3, 0x0, 0xcf, 0x0, 0x0) (async)
r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r4, 0x0, 0xcf, 0x0, 0x0)
r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r5, 0x0, 0xcf, 0x0, 0x0) (async)
ioctl$BLKIOOPT(r5, 0x1279, &(0x7f0000000440))
r6 = syz_open_procfs(0x0, &(0x7f0000000080)='net/psched\x00')
ioctl$BLKREPORTZONE(r2, 0xc0101282, &(0x7f0000000240)={0x3, 0x7, 0x0, [{0x8c, 0xbe2, 0x8001, 0xf0, 0x3f, 0x5, 0x1, '\x00', 0x4}, {0x0, 0x8, 0x9, 0xb2, 0x6, 0x4, 0x3f, '\x00', 0xffffffffffff0001}, {0xfffffffffffffffe, 0x80, 0x100, 0xff, 0x1f, 0x20, 0x2, '\x00', 0x7f}, {0x9, 0x100000001, 0x0, 0xe2, 0x0, 0x20, 0x3f, '\x00', 0x1}, {0x0, 0x5, 0x240, 0x80, 0x1, 0x9, 0x1, '\x00', 0x78}, {0x3, 0x6, 0x2, 0x4, 0x7, 0x5, 0x2, '\x00', 0x40}, {0x0, 0x0, 0x6, 0xf9, 0x81, 0x3f, 0x2, '\x00', 0x10001}]}) (async)
ioctl$PPPOEIOCSFWD(r6, 0x4008b100, &(0x7f00000000c0)={0x18, 0x0, {0x0, @broadcast, 'virt_wifi0\x00'}})
03:50:51 executing program 5:
r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/protocols\x00')
read$qrtrtun(r0, &(0x7f0000000040)=""/85, 0x55)
ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000000)={'ip6_vti0\x00', &(0x7f0000000180)={'ip6tnl0\x00', 0x0, 0x29, 0x8, 0xff, 0x8, 0xa, @private2, @private2, 0x700, 0x8000, 0x6, 0x8}}) (async)
ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000000)={'ip6_vti0\x00', &(0x7f0000000180)={'ip6tnl0\x00', 0x0, 0x29, 0x8, 0xff, 0x8, 0xa, @private2, @private2, 0x700, 0x8000, 0x6, 0x8}})
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='//file0\x00']) (async)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='//file0\x00'])
sendmsg$IPSET_CMD_DESTROY(r0, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xc25040c0}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)={0x1c, 0x3, 0x6, 0x201, 0x0, 0x0, {0xa, 0x0, 0x5}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x24008000)
bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000340)={@ifindex=r1, 0x2, 0x0, 0x8, &(0x7f0000000240)=[0x0], 0x1, 0x0, &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0]}, 0x40)
read$qrtrtun(r0, &(0x7f00000000c0)=""/156, 0x9c)
03:50:51 executing program 0:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) (async)
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
03:50:51 executing program 1:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
write$P9_RWSTAT(r0, &(0x7f0000000000)={0x7, 0x7f, 0x1}, 0x7)
03:50:51 executing program 0:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
r1 = socket$inet6_sctp(0xa, 0x5, 0x84)
ioctl$BTRFS_IOC_START_SYNC(r1, 0x80089418, &(0x7f0000000000))
r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r2, 0x0, 0xcf, 0x0, 0x0)
write$P9_RRENAME(r2, &(0x7f0000000040)={0x7, 0x15, 0x1}, 0x7)
socket$l2tp(0x2, 0x2, 0x73)
r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r3, 0x0, 0xcf, 0x0, 0x0)
write$P9_RWRITE(r3, &(0x7f0000000080)={0xb, 0x77, 0x1, 0x7fffffff}, 0xb)
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82)
socket$inet6_udp(0xa, 0x2, 0x0)
03:50:51 executing program 2:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst={0x0, 0x0, 0x0, 0x0, 0x0, 0xd00}], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:51 executing program 5:
r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/protocols\x00')
read$qrtrtun(r0, &(0x7f0000000040)=""/85, 0x55)
ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000000)={'ip6_vti0\x00', &(0x7f0000000180)={'ip6tnl0\x00', 0x0, 0x29, 0x8, 0xff, 0x8, 0xa, @private2, @private2, 0x700, 0x8000, 0x6, 0x8}})
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='//file0\x00']) (async)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='//file0\x00'])
sendmsg$IPSET_CMD_DESTROY(r0, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xc25040c0}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)={0x1c, 0x3, 0x6, 0x201, 0x0, 0x0, {0xa, 0x0, 0x5}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x24008000)
bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000340)={@ifindex=r1, 0x2, 0x0, 0x8, &(0x7f0000000240)=[0x0], 0x1, 0x0, &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0]}, 0x40)
read$qrtrtun(r0, &(0x7f00000000c0)=""/156, 0x9c) (async)
read$qrtrtun(r0, &(0x7f00000000c0)=""/156, 0x9c)
03:50:51 executing program 3:
r0 = syz_open_procfs(0xffffffffffffffff, 0x0)
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
03:50:51 executing program 4:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r1, 0x0, 0xcf, 0x0, 0x0)
epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1)
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
03:50:51 executing program 2:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst={0x0, 0x0, 0x0, 0x0, 0x0, 0xe00}], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:51 executing program 3:
r0 = syz_open_procfs(0xffffffffffffffff, 0x0)
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
03:50:51 executing program 1:
socket$nl_netfilter(0x10, 0x3, 0xc)
r0 = getpid()
r1 = syz_open_procfs(r0, &(0x7f0000000040)='net/netstat\x00')
read$qrtrtun(r1, &(0x7f00000012c0)=""/4089, 0xff9)
03:50:51 executing program 0:
syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00') (async)
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
socket$inet6_sctp(0xa, 0x5, 0x84) (async)
r1 = socket$inet6_sctp(0xa, 0x5, 0x84)
ioctl$BTRFS_IOC_START_SYNC(r1, 0x80089418, &(0x7f0000000000))
r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r2, 0x0, 0xcf, 0x0, 0x0)
write$P9_RRENAME(r2, &(0x7f0000000040)={0x7, 0x15, 0x1}, 0x7)
socket$l2tp(0x2, 0x2, 0x73)
r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r3, 0x0, 0xcf, 0x0, 0x0) (async)
setsockopt$MRT_ASSERT(r3, 0x0, 0xcf, 0x0, 0x0)
write$P9_RWRITE(r3, &(0x7f0000000080)={0xb, 0x77, 0x1, 0x7fffffff}, 0xb) (async)
write$P9_RWRITE(r3, &(0x7f0000000080)={0xb, 0x77, 0x1, 0x7fffffff}, 0xb)
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82)
socket$inet6_udp(0xa, 0x2, 0x0)
03:50:51 executing program 2:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst={0x0, 0x0, 0x0, 0x0, 0x0, 0x1100}], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:51 executing program 0:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
r1 = socket$inet6_sctp(0xa, 0x5, 0x84)
ioctl$BTRFS_IOC_START_SYNC(r1, 0x80089418, &(0x7f0000000000))
r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r2, 0x0, 0xcf, 0x0, 0x0)
write$P9_RRENAME(r2, &(0x7f0000000040)={0x7, 0x15, 0x1}, 0x7)
socket$l2tp(0x2, 0x2, 0x73)
r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r3, 0x0, 0xcf, 0x0, 0x0)
write$P9_RWRITE(r3, &(0x7f0000000080)={0xb, 0x77, 0x1, 0x7fffffff}, 0xb)
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82)
socket$inet6_udp(0xa, 0x2, 0x0)
syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00') (async)
socket$inet6_sctp(0xa, 0x5, 0x84) (async)
ioctl$BTRFS_IOC_START_SYNC(r1, 0x80089418, &(0x7f0000000000)) (async)
syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00') (async)
setsockopt$MRT_ASSERT(r2, 0x0, 0xcf, 0x0, 0x0) (async)
write$P9_RRENAME(r2, &(0x7f0000000040)={0x7, 0x15, 0x1}, 0x7) (async)
socket$l2tp(0x2, 0x2, 0x73) (async)
syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00') (async)
setsockopt$MRT_ASSERT(r3, 0x0, 0xcf, 0x0, 0x0) (async)
write$P9_RWRITE(r3, &(0x7f0000000080)={0xb, 0x77, 0x1, 0x7fffffff}, 0xb) (async)
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000) (async)
ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) (async)
socket$inet6_udp(0xa, 0x2, 0x0) (async)
03:50:51 executing program 3:
syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='io\x00')
read$qrtrtun(0xffffffffffffffff, &(0x7f00000000c0)=""/4096, 0x1000)
03:50:51 executing program 2:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst={0x0, 0x0, 0x0, 0x0, 0x0, 0x1200}], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:51 executing program 4:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r1, 0x0, 0xcf, 0x0, 0x0)
epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1)
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00') (async)
syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00') (async)
setsockopt$MRT_ASSERT(r1, 0x0, 0xcf, 0x0, 0x0) (async)
epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) (async)
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000) (async)
03:50:51 executing program 0:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
write$P9_RGETLOCK(r0, &(0x7f0000000000)={0x24, 0x37, 0x2, {0x0, 0x10000, 0x4, 0x0, 0x6, 'smaps\x00'}}, 0x24)
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
03:50:51 executing program 1:
socket$nl_netfilter(0x10, 0x3, 0xc)
r0 = getpid()
r1 = syz_open_procfs(r0, &(0x7f0000000040)='net/netstat\x00')
read$qrtrtun(r1, &(0x7f00000012c0)=""/4089, 0xff9)
03:50:51 executing program 2:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst={0x0, 0x0, 0x0, 0x0, 0x0, 0x1800}], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:51 executing program 5:
r0 = getpid()
r1 = syz_open_procfs(r0, &(0x7f0000000000)='timers\x00')
r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r2, 0x0, 0xcf, 0x0, 0x0)
r3 = socket$igmp(0x2, 0x3, 0x2)
ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000040)={'ip6gre0\x00', 0x0})
r5 = getpid()
r6 = getpid()
kcmp$KCMP_EPOLL_TFD(r6, r5, 0x7, 0xffffffffffffffff, &(0x7f0000001840))
r7 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000ac0), 0x8200, 0x0)
kcmp$KCMP_EPOLL_TFD(r6, 0x0, 0x7, r3, &(0x7f0000000b00)={r2, r7})
bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', r4}, 0x48)
r8 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r8, 0x0, 0xcf, 0x0, 0x0)
r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r9, 0x0, 0xcf, 0x0, 0x0)
r10 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r10, 0x0, 0xcf, 0x0, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0xc97bd613796ea493, 0x14, &(0x7f0000000280)=@raw=[@btf_id={0x18, 0x9, 0x3, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0xb4}, @exit, @map_val={0x18, 0x1, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x5}, @ldst={0x2, 0x0, 0x4, 0x0, 0x1, 0x4, 0x10}, @ldst={0x1, 0x0, 0x1, 0x7, 0x0, 0x4, 0xffffffffffffffff}, @func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x1}, @printk={@pointer, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x4}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}], &(0x7f0000000340)='syzkaller\x00', 0x1, 0xa7, &(0x7f0000000380)=""/167, 0x41100, 0x24, '\x00', r4, 0x8, r8, 0x8, &(0x7f0000000440)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000480)={0x1, 0xe, 0xffffffff, 0x1f}, 0x10, 0x0, r9, 0xa, &(0x7f00000004c0)=[r10, r1], &(0x7f0000000500)=[{0x1, 0x5, 0xe, 0x8}, {0x5, 0x3, 0xc, 0xa}, {0x3, 0x2, 0x3, 0xb}, {0x2, 0x5, 0xd, 0xf22cc034468da2ab}, {0x1, 0x5, 0x9, 0x8}, {0x4, 0x4, 0xa, 0x3}, {0x0, 0x1, 0x2, 0x4}, {0x2, 0x2, 0x8, 0x3}, {0x0, 0x2, 0x3, 0x9}, {0x1, 0x5, 0x8, 0xc}], 0x10, 0x2896}, 0x90)
read$qrtrtun(r1, &(0x7f0000000040)=""/85, 0x55)
r11 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000880)={0x6, 0x12, &(0x7f0000000680)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1a1d2200}, [@jmp={0x5, 0x0, 0x9, 0x7, 0x5, 0x100, 0xfffffffffffffffc}, @printk={@integer, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x3}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0x9}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @map_idx={0x18, 0x1, 0x5, 0x0, 0xd}]}, &(0x7f0000000740)='GPL\x00', 0x9, 0x0, 0x0, 0x41000, 0x48, '\x00', r4, 0x25, r1, 0x8, &(0x7f0000000780)={0x3, 0x1}, 0x8, 0x10, &(0x7f00000007c0)={0x4, 0xc, 0x100}, 0x10, 0x0, 0x0, 0x1, &(0x7f0000000800)=[r2], &(0x7f0000000840)=[{0x5, 0x4, 0x4, 0xb}], 0x10, 0x8}, 0x90)
bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000a40)={@map, 0x2e, 0x1, 0x8, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6, 0x0, &(0x7f0000000980)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000a00)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40)
bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000a80)={r11, r9, 0x1c, 0x0, @val=@tcx={@link_id=0xffffffffffffffff, r12}}, 0x40)
r13 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(r13, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x14, 0x3, 0x2, 0x201, 0x0, 0x0, {0x0, 0x0, 0x4}, ["", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x800}, 0x20008800)
read$qrtrtun(r1, &(0x7f00000000c0)=""/156, 0x9c)
03:50:51 executing program 0:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
write$P9_RGETLOCK(r0, &(0x7f0000000000)={0x24, 0x37, 0x2, {0x0, 0x10000, 0x4, 0x0, 0x6, 'smaps\x00'}}, 0x24)
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
03:50:51 executing program 5:
r0 = getpid()
r1 = syz_open_procfs(r0, &(0x7f0000000000)='timers\x00') (async)
r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r2, 0x0, 0xcf, 0x0, 0x0) (async)
r3 = socket$igmp(0x2, 0x3, 0x2)
ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000040)={'ip6gre0\x00', 0x0})
r5 = getpid() (async)
r6 = getpid()
kcmp$KCMP_EPOLL_TFD(r6, r5, 0x7, 0xffffffffffffffff, &(0x7f0000001840)) (async)
r7 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000ac0), 0x8200, 0x0)
kcmp$KCMP_EPOLL_TFD(r6, 0x0, 0x7, r3, &(0x7f0000000b00)={r2, r7}) (async)
bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', r4}, 0x48)
r8 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r8, 0x0, 0xcf, 0x0, 0x0)
r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r9, 0x0, 0xcf, 0x0, 0x0) (async)
r10 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r10, 0x0, 0xcf, 0x0, 0x0) (async)
bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0xc97bd613796ea493, 0x14, &(0x7f0000000280)=@raw=[@btf_id={0x18, 0x9, 0x3, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0xb4}, @exit, @map_val={0x18, 0x1, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x5}, @ldst={0x2, 0x0, 0x4, 0x0, 0x1, 0x4, 0x10}, @ldst={0x1, 0x0, 0x1, 0x7, 0x0, 0x4, 0xffffffffffffffff}, @func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x1}, @printk={@pointer, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x4}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}], &(0x7f0000000340)='syzkaller\x00', 0x1, 0xa7, &(0x7f0000000380)=""/167, 0x41100, 0x24, '\x00', r4, 0x8, r8, 0x8, &(0x7f0000000440)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000480)={0x1, 0xe, 0xffffffff, 0x1f}, 0x10, 0x0, r9, 0xa, &(0x7f00000004c0)=[r10, r1], &(0x7f0000000500)=[{0x1, 0x5, 0xe, 0x8}, {0x5, 0x3, 0xc, 0xa}, {0x3, 0x2, 0x3, 0xb}, {0x2, 0x5, 0xd, 0xf22cc034468da2ab}, {0x1, 0x5, 0x9, 0x8}, {0x4, 0x4, 0xa, 0x3}, {0x0, 0x1, 0x2, 0x4}, {0x2, 0x2, 0x8, 0x3}, {0x0, 0x2, 0x3, 0x9}, {0x1, 0x5, 0x8, 0xc}], 0x10, 0x2896}, 0x90)
read$qrtrtun(r1, &(0x7f0000000040)=""/85, 0x55)
r11 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000880)={0x6, 0x12, &(0x7f0000000680)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1a1d2200}, [@jmp={0x5, 0x0, 0x9, 0x7, 0x5, 0x100, 0xfffffffffffffffc}, @printk={@integer, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x3}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0x9}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @map_idx={0x18, 0x1, 0x5, 0x0, 0xd}]}, &(0x7f0000000740)='GPL\x00', 0x9, 0x0, 0x0, 0x41000, 0x48, '\x00', r4, 0x25, r1, 0x8, &(0x7f0000000780)={0x3, 0x1}, 0x8, 0x10, &(0x7f00000007c0)={0x4, 0xc, 0x100}, 0x10, 0x0, 0x0, 0x1, &(0x7f0000000800)=[r2], &(0x7f0000000840)=[{0x5, 0x4, 0x4, 0xb}], 0x10, 0x8}, 0x90)
bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000a40)={@map, 0x2e, 0x1, 0x8, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6, 0x0, &(0x7f0000000980)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000a00)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40)
bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000a80)={r11, r9, 0x1c, 0x0, @val=@tcx={@link_id=0xffffffffffffffff, r12}}, 0x40) (async)
r13 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(r13, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x14, 0x3, 0x2, 0x201, 0x0, 0x0, {0x0, 0x0, 0x4}, ["", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x800}, 0x20008800) (async)
read$qrtrtun(r1, &(0x7f00000000c0)=""/156, 0x9c)
03:50:51 executing program 4:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00') (async, rerun: 32)
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00') (rerun: 32)
setsockopt$MRT_ASSERT(r1, 0x0, 0xcf, 0x0, 0x0) (async, rerun: 64)
epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) (async, rerun: 64)
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
03:50:51 executing program 3:
syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='io\x00')
read$qrtrtun(0xffffffffffffffff, &(0x7f00000000c0)=""/4096, 0x1000)
03:50:51 executing program 1:
socket$nl_netfilter(0x10, 0x3, 0xc)
r0 = getpid()
r1 = syz_open_procfs(r0, &(0x7f0000000040)='net/netstat\x00')
read$qrtrtun(r1, &(0x7f00000012c0)=""/4089, 0xff9) (async)
read$qrtrtun(r1, &(0x7f00000012c0)=""/4089, 0xff9)
03:50:51 executing program 0:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
write$P9_RGETLOCK(r0, &(0x7f0000000000)={0x24, 0x37, 0x2, {0x0, 0x10000, 0x4, 0x0, 0x6, 'smaps\x00'}}, 0x24)
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00') (async)
write$P9_RGETLOCK(r0, &(0x7f0000000000)={0x24, 0x37, 0x2, {0x0, 0x10000, 0x4, 0x0, 0x6, 'smaps\x00'}}, 0x24) (async)
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000) (async)
03:50:51 executing program 2:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst={0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:51 executing program 3:
syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='io\x00')
read$qrtrtun(0xffffffffffffffff, &(0x7f00000000c0)=""/4096, 0x1000)
03:50:51 executing program 1:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000080)={{r0}, &(0x7f0000000000), &(0x7f0000000040)='%d \x00'}, 0x20)
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
03:50:51 executing program 2:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst={0x0, 0x0, 0x0, 0x0, 0x0, 0x2500}], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:51 executing program 5:
r0 = getpid()
syz_open_procfs(r0, &(0x7f0000000000)='timers\x00') (async)
r1 = syz_open_procfs(r0, &(0x7f0000000000)='timers\x00')
r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r2, 0x0, 0xcf, 0x0, 0x0)
socket$igmp(0x2, 0x3, 0x2) (async)
r3 = socket$igmp(0x2, 0x3, 0x2)
ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000040)={'ip6gre0\x00', 0x0})
getpid() (async)
r5 = getpid()
getpid() (async)
r6 = getpid()
kcmp$KCMP_EPOLL_TFD(r6, r5, 0x7, 0xffffffffffffffff, &(0x7f0000001840)) (async)
kcmp$KCMP_EPOLL_TFD(r6, r5, 0x7, 0xffffffffffffffff, &(0x7f0000001840))
r7 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000ac0), 0x8200, 0x0)
kcmp$KCMP_EPOLL_TFD(r6, 0x0, 0x7, r3, &(0x7f0000000b00)={r2, r7})
bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', r4}, 0x48) (async)
bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', r4}, 0x48)
r8 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r8, 0x0, 0xcf, 0x0, 0x0)
r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r9, 0x0, 0xcf, 0x0, 0x0)
r10 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r10, 0x0, 0xcf, 0x0, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0xc97bd613796ea493, 0x14, &(0x7f0000000280)=@raw=[@btf_id={0x18, 0x9, 0x3, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0xb4}, @exit, @map_val={0x18, 0x1, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x5}, @ldst={0x2, 0x0, 0x4, 0x0, 0x1, 0x4, 0x10}, @ldst={0x1, 0x0, 0x1, 0x7, 0x0, 0x4, 0xffffffffffffffff}, @func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x1}, @printk={@pointer, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x4}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}], &(0x7f0000000340)='syzkaller\x00', 0x1, 0xa7, &(0x7f0000000380)=""/167, 0x41100, 0x24, '\x00', r4, 0x8, r8, 0x8, &(0x7f0000000440)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000480)={0x1, 0xe, 0xffffffff, 0x1f}, 0x10, 0x0, r9, 0xa, &(0x7f00000004c0)=[r10, r1], &(0x7f0000000500)=[{0x1, 0x5, 0xe, 0x8}, {0x5, 0x3, 0xc, 0xa}, {0x3, 0x2, 0x3, 0xb}, {0x2, 0x5, 0xd, 0xf22cc034468da2ab}, {0x1, 0x5, 0x9, 0x8}, {0x4, 0x4, 0xa, 0x3}, {0x0, 0x1, 0x2, 0x4}, {0x2, 0x2, 0x8, 0x3}, {0x0, 0x2, 0x3, 0x9}, {0x1, 0x5, 0x8, 0xc}], 0x10, 0x2896}, 0x90)
read$qrtrtun(r1, &(0x7f0000000040)=""/85, 0x55) (async)
read$qrtrtun(r1, &(0x7f0000000040)=""/85, 0x55)
r11 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000880)={0x6, 0x12, &(0x7f0000000680)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1a1d2200}, [@jmp={0x5, 0x0, 0x9, 0x7, 0x5, 0x100, 0xfffffffffffffffc}, @printk={@integer, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x3}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0x9}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @map_idx={0x18, 0x1, 0x5, 0x0, 0xd}]}, &(0x7f0000000740)='GPL\x00', 0x9, 0x0, 0x0, 0x41000, 0x48, '\x00', r4, 0x25, r1, 0x8, &(0x7f0000000780)={0x3, 0x1}, 0x8, 0x10, &(0x7f00000007c0)={0x4, 0xc, 0x100}, 0x10, 0x0, 0x0, 0x1, &(0x7f0000000800)=[r2], &(0x7f0000000840)=[{0x5, 0x4, 0x4, 0xb}], 0x10, 0x8}, 0x90)
bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000a40)={@map, 0x2e, 0x1, 0x8, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6, 0x0, &(0x7f0000000980)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000a00)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40)
bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000a80)={r11, r9, 0x1c, 0x0, @val=@tcx={@link_id=0xffffffffffffffff, r12}}, 0x40)
socket$nl_netfilter(0x10, 0x3, 0xc) (async)
r13 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(r13, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x14, 0x3, 0x2, 0x201, 0x0, 0x0, {0x0, 0x0, 0x4}, ["", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x800}, 0x20008800)
read$qrtrtun(r1, &(0x7f00000000c0)=""/156, 0x9c)
03:50:51 executing program 0:
sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000040)={&(0x7f0000001340)={{0x14}, [@NFT_MSG_NEWTABLE={0x1ec, 0x0, 0xa, 0x5, 0x0, 0x0, {0x5, 0x0, 0x5}, [@NFTA_TABLE_FLAGS={0x8}, @NFTA_TABLE_FLAGS={0x8}, @NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x4}, @NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x4}, @NFTA_TABLE_USERDATA={0xfc, 0x6, "06a7c02867eb3894d16af512228511f4b5a4b3215f03b33dcce5f42884a9f7807538bbc17ac2c09c30d5e1b22775d96d1da965170ef842d696d51d319a7ea2f36bfd4429fed7d4134b315165e58e1b34c0fb2feb76ac2206164c3a60a7260ad42a0652edaef9a2b6318dd2e9ddf7afa8a9f3f7ab78c0aad37c300da15b81a17351e131ec9ac285453fbd3c2839a2b439cd21d82ac9a7935803e9a46be0c2f2481613669b8ba0805e13d195486bade21a53cd25424d3adc655d767fc12b08725e9ac9e56884ee9496fe297f9d8c0798c2e6c9e57a5f408d4e8979bcce096f917e998d7e7fc1d05b56b273f0ec835cd3c29dd3b6652224232d"}, @NFTA_TABLE_NAME={0x9, 0x1, 'syz1\x00'}, @NFTA_TABLE_FLAGS={0x8}, @NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x4}, @NFTA_TABLE_USERDATA={0x85, 0x6, "ae0e687b7390518f58e6ea7114049e3bd84c59a1775f4826f0f66ebcab1c72b0addde9a7d816a2dbfa08bdf059f36daf918c19dd8d49a301274bb7f7d57beeb2020761e36ce7c33f1f4073fb28177add9e85c4c9f1e46bf6dc2a5ee8df7b432d1b6d524823c920175bce935ba7674ecb4d02025a3d42a881331ca7117db96e6b33"}, @NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_DELTABLE={0x114, 0x2, 0xa, 0x101, 0x0, 0x0, {0xa, 0x0, 0x5}, [@NFTA_TABLE_USERDATA={0xf3, 0x6, "bdbee941b090a1dd25f16b1236ba034cecb943b8c014f443314eec78614b71e4a60c05d0812fbc254fc0ea27abf046c5b3199aa12100547d967189e4c11bd1f8a6fd269a567a4cf6606be5fd80e194ebcfe70f3ed62f5b6deacb411b9bc8132ba874a8a183425b5bd6acd335bcede4af02f470632fd46b82f254716cb49757aaa07404f1c31986f84ec99f0db0c9233278b0bfe95249fd1d9e6cc049975519ec45a090f0565d6e4640d89cb49e91c4f7eb71493b075c3dd49693bead5600e65f9efbf730d61df88b8006aa1964ee3e29de1782e973ffe6135158574a6a143c9dd013da752f39f464a2f149d99e1009"}, @NFTA_TABLE_NAME={0x9, 0x1, 'syz1\x00'}]}, @NFT_MSG_DELSET={0x10c, 0xb, 0xa, 0x301, 0x0, 0x0, {0x3, 0x0, 0x5}, [@NFTA_SET_DATA_LEN={0x8, 0x7, 0x1, 0x0, 0x2c}, @NFTA_SET_USERDATA={0xa6, 0xd, 0x1, 0x0, "265b7c3661d87c5e5feb197949a564ab7a54fe6b4c773c36e4b7ee331b290ba840c029d392e4823b4907988294d607f77486cf8ccc1403697da98804308ccf21b672da3ab258c7681c4af228d8a1c3da98309534045314b575f13f6d73af91f23c4e2d7dd6e3b2fe745620d5415786c0119ae0d89a059e2bd73d7e99ff3af0f9ff909a522b106003666e4cd6bbde4f94660a6f0b16daaa7905581e74d531fb3d0ac2"}, @NFTA_SET_HANDLE={0xc, 0x10, 0x1, 0x0, 0x4}, @NFTA_SET_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_HANDLE={0xc, 0x10, 0x1, 0x0, 0x2}, @NFTA_SET_OBJ_TYPE={0x8, 0xf, 0x1, 0x0, 0xa}, @NFTA_SET_ID={0x8, 0xa, 0x1, 0x0, 0x3}, @NFTA_SET_TIMEOUT={0xc, 0xb, 0x1, 0x0, 0x8}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0xe}]}], {0x14}}, 0x434}, 0x1, 0x0, 0x0, 0x8000}, 0x20008040)
read$qrtrtun(0xffffffffffffffff, &(0x7f00000000c0)=""/4096, 0x1000)
03:50:51 executing program 3:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='io\x00')
read$qrtrtun(r0, 0x0, 0x0)
03:50:51 executing program 5:
r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/protocols\x00')
read$qrtrtun(r0, &(0x7f0000000040)=""/85, 0x55)
read$qrtrtun(r0, &(0x7f00000000c0)=""/156, 0xa2)
03:50:51 executing program 5:
r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/protocols\x00')
read$qrtrtun(r0, &(0x7f0000000040)=""/85, 0x55) (async)
read$qrtrtun(r0, &(0x7f0000000040)=""/85, 0x55)
read$qrtrtun(r0, &(0x7f00000000c0)=""/156, 0xa2)
03:50:51 executing program 2:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst={0x0, 0x0, 0x0, 0x0, 0x0, 0x2a00}], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:51 executing program 1:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000080)={{r0}, &(0x7f0000000000), &(0x7f0000000040)='%d \x00'}, 0x20)
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
03:50:51 executing program 3:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='io\x00')
read$qrtrtun(r0, 0x0, 0x0)
03:50:51 executing program 2:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst={0x0, 0x0, 0x0, 0x0, 0x0, 0x2c02}], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:51 executing program 0:
sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000040)={&(0x7f0000001340)={{0x14}, [@NFT_MSG_NEWTABLE={0x1ec, 0x0, 0xa, 0x5, 0x0, 0x0, {0x5, 0x0, 0x5}, [@NFTA_TABLE_FLAGS={0x8}, @NFTA_TABLE_FLAGS={0x8}, @NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x4}, @NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x4}, @NFTA_TABLE_USERDATA={0xfc, 0x6, "06a7c02867eb3894d16af512228511f4b5a4b3215f03b33dcce5f42884a9f7807538bbc17ac2c09c30d5e1b22775d96d1da965170ef842d696d51d319a7ea2f36bfd4429fed7d4134b315165e58e1b34c0fb2feb76ac2206164c3a60a7260ad42a0652edaef9a2b6318dd2e9ddf7afa8a9f3f7ab78c0aad37c300da15b81a17351e131ec9ac285453fbd3c2839a2b439cd21d82ac9a7935803e9a46be0c2f2481613669b8ba0805e13d195486bade21a53cd25424d3adc655d767fc12b08725e9ac9e56884ee9496fe297f9d8c0798c2e6c9e57a5f408d4e8979bcce096f917e998d7e7fc1d05b56b273f0ec835cd3c29dd3b6652224232d"}, @NFTA_TABLE_NAME={0x9, 0x1, 'syz1\x00'}, @NFTA_TABLE_FLAGS={0x8}, @NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x4}, @NFTA_TABLE_USERDATA={0x85, 0x6, "ae0e687b7390518f58e6ea7114049e3bd84c59a1775f4826f0f66ebcab1c72b0addde9a7d816a2dbfa08bdf059f36daf918c19dd8d49a301274bb7f7d57beeb2020761e36ce7c33f1f4073fb28177add9e85c4c9f1e46bf6dc2a5ee8df7b432d1b6d524823c920175bce935ba7674ecb4d02025a3d42a881331ca7117db96e6b33"}, @NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_DELTABLE={0x114, 0x2, 0xa, 0x101, 0x0, 0x0, {0xa, 0x0, 0x5}, [@NFTA_TABLE_USERDATA={0xf3, 0x6, "bdbee941b090a1dd25f16b1236ba034cecb943b8c014f443314eec78614b71e4a60c05d0812fbc254fc0ea27abf046c5b3199aa12100547d967189e4c11bd1f8a6fd269a567a4cf6606be5fd80e194ebcfe70f3ed62f5b6deacb411b9bc8132ba874a8a183425b5bd6acd335bcede4af02f470632fd46b82f254716cb49757aaa07404f1c31986f84ec99f0db0c9233278b0bfe95249fd1d9e6cc049975519ec45a090f0565d6e4640d89cb49e91c4f7eb71493b075c3dd49693bead5600e65f9efbf730d61df88b8006aa1964ee3e29de1782e973ffe6135158574a6a143c9dd013da752f39f464a2f149d99e1009"}, @NFTA_TABLE_NAME={0x9, 0x1, 'syz1\x00'}]}, @NFT_MSG_DELSET={0x10c, 0xb, 0xa, 0x301, 0x0, 0x0, {0x3, 0x0, 0x5}, [@NFTA_SET_DATA_LEN={0x8, 0x7, 0x1, 0x0, 0x2c}, @NFTA_SET_USERDATA={0xa6, 0xd, 0x1, 0x0, "265b7c3661d87c5e5feb197949a564ab7a54fe6b4c773c36e4b7ee331b290ba840c029d392e4823b4907988294d607f77486cf8ccc1403697da98804308ccf21b672da3ab258c7681c4af228d8a1c3da98309534045314b575f13f6d73af91f23c4e2d7dd6e3b2fe745620d5415786c0119ae0d89a059e2bd73d7e99ff3af0f9ff909a522b106003666e4cd6bbde4f94660a6f0b16daaa7905581e74d531fb3d0ac2"}, @NFTA_SET_HANDLE={0xc, 0x10, 0x1, 0x0, 0x4}, @NFTA_SET_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_HANDLE={0xc, 0x10, 0x1, 0x0, 0x2}, @NFTA_SET_OBJ_TYPE={0x8, 0xf, 0x1, 0x0, 0xa}, @NFTA_SET_ID={0x8, 0xa, 0x1, 0x0, 0x3}, @NFTA_SET_TIMEOUT={0xc, 0xb, 0x1, 0x0, 0x8}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0xe}]}], {0x14}}, 0x434}, 0x1, 0x0, 0x0, 0x8000}, 0x20008040) (async)
read$qrtrtun(0xffffffffffffffff, &(0x7f00000000c0)=""/4096, 0x1000)
03:50:51 executing program 5:
r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/protocols\x00')
read$qrtrtun(r0, &(0x7f0000000040)=""/85, 0x55) (async)
read$qrtrtun(r0, &(0x7f00000000c0)=""/156, 0xa2)
03:50:51 executing program 1:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000080)={{r0}, &(0x7f0000000000), &(0x7f0000000040)='%d \x00'}, 0x20) (async)
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
03:50:51 executing program 4:
sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000001100)={&(0x7f0000000040), 0xc, &(0x7f00000010c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="3c0000000406010200000000000000000000000405000100070000000000000900020073797a31000000000900020073797a3000000000"], 0x3c}, 0x1, 0x0, 0x0, 0x40}, 0x80)
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000001240)={&(0x7f0000001140)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000001200)={&(0x7f0000001180)={0x48, 0x0, 0x20, 0x70bd2a, 0x25dfdbff, {}, [@NBD_ATTR_BACKEND_IDENTIFIER={0x8, 0xa, '[-:+'}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x101}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x1}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_CLIENT_FLAGS={0xc}]}, 0x48}}, 0x4000000)
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='net/psched\x00')
ioctl$sock_inet6_udp_SIOCOUTQ(r1, 0x5411, &(0x7f00000012c0))
sendmsg$IPCTNL_MSG_EXP_GET(r0, &(0x7f00000014c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000001480)={&(0x7f0000001340)={0x118, 0x1, 0x2, 0x101, 0x0, 0x0, {0x5, 0x0, 0x4}, [@CTA_EXPECT_ZONE={0x6, 0x7, 0x1, 0x0, 0x1}, @CTA_EXPECT_FN={0x13, 0xb, 'callforwarding\x00'}, @CTA_EXPECT_TIMEOUT={0x8, 0x4, 0x1, 0x0, 0x1f}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x2}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x1}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x1}, @CTA_EXPECT_HELP_NAME={0xf, 0x6, 'netbios-ns\x00'}, @CTA_EXPECT_MASK={0xb8, 0x3, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @private2={0xfc, 0x2, '\x00', 0x1}}, {0x14, 0x4, @mcast1}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @loopback}, {0x8, 0x2, @multicast2}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @private1={0xfc, 0x1, '\x00', 0x1}}, {0x14, 0x4, @rand_addr=' \x01\x00'}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @dev={0xfe, 0x80, '\x00', 0x44}}, {0x14, 0x4, @empty}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}]}, 0x118}, 0x1, 0x0, 0x0, 0x4}, 0x4009004)
03:50:51 executing program 2:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst={0x0, 0x0, 0x0, 0x0, 0x0, 0x2d02}], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:51 executing program 0:
sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000040)={&(0x7f0000001340)={{0x14}, [@NFT_MSG_NEWTABLE={0x1ec, 0x0, 0xa, 0x5, 0x0, 0x0, {0x5, 0x0, 0x5}, [@NFTA_TABLE_FLAGS={0x8}, @NFTA_TABLE_FLAGS={0x8}, @NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x4}, @NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x4}, @NFTA_TABLE_USERDATA={0xfc, 0x6, "06a7c02867eb3894d16af512228511f4b5a4b3215f03b33dcce5f42884a9f7807538bbc17ac2c09c30d5e1b22775d96d1da965170ef842d696d51d319a7ea2f36bfd4429fed7d4134b315165e58e1b34c0fb2feb76ac2206164c3a60a7260ad42a0652edaef9a2b6318dd2e9ddf7afa8a9f3f7ab78c0aad37c300da15b81a17351e131ec9ac285453fbd3c2839a2b439cd21d82ac9a7935803e9a46be0c2f2481613669b8ba0805e13d195486bade21a53cd25424d3adc655d767fc12b08725e9ac9e56884ee9496fe297f9d8c0798c2e6c9e57a5f408d4e8979bcce096f917e998d7e7fc1d05b56b273f0ec835cd3c29dd3b6652224232d"}, @NFTA_TABLE_NAME={0x9, 0x1, 'syz1\x00'}, @NFTA_TABLE_FLAGS={0x8}, @NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x4}, @NFTA_TABLE_USERDATA={0x85, 0x6, "ae0e687b7390518f58e6ea7114049e3bd84c59a1775f4826f0f66ebcab1c72b0addde9a7d816a2dbfa08bdf059f36daf918c19dd8d49a301274bb7f7d57beeb2020761e36ce7c33f1f4073fb28177add9e85c4c9f1e46bf6dc2a5ee8df7b432d1b6d524823c920175bce935ba7674ecb4d02025a3d42a881331ca7117db96e6b33"}, @NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_DELTABLE={0x114, 0x2, 0xa, 0x101, 0x0, 0x0, {0xa, 0x0, 0x5}, [@NFTA_TABLE_USERDATA={0xf3, 0x6, "bdbee941b090a1dd25f16b1236ba034cecb943b8c014f443314eec78614b71e4a60c05d0812fbc254fc0ea27abf046c5b3199aa12100547d967189e4c11bd1f8a6fd269a567a4cf6606be5fd80e194ebcfe70f3ed62f5b6deacb411b9bc8132ba874a8a183425b5bd6acd335bcede4af02f470632fd46b82f254716cb49757aaa07404f1c31986f84ec99f0db0c9233278b0bfe95249fd1d9e6cc049975519ec45a090f0565d6e4640d89cb49e91c4f7eb71493b075c3dd49693bead5600e65f9efbf730d61df88b8006aa1964ee3e29de1782e973ffe6135158574a6a143c9dd013da752f39f464a2f149d99e1009"}, @NFTA_TABLE_NAME={0x9, 0x1, 'syz1\x00'}]}, @NFT_MSG_DELSET={0x10c, 0xb, 0xa, 0x301, 0x0, 0x0, {0x3, 0x0, 0x5}, [@NFTA_SET_DATA_LEN={0x8, 0x7, 0x1, 0x0, 0x2c}, @NFTA_SET_USERDATA={0xa6, 0xd, 0x1, 0x0, "265b7c3661d87c5e5feb197949a564ab7a54fe6b4c773c36e4b7ee331b290ba840c029d392e4823b4907988294d607f77486cf8ccc1403697da98804308ccf21b672da3ab258c7681c4af228d8a1c3da98309534045314b575f13f6d73af91f23c4e2d7dd6e3b2fe745620d5415786c0119ae0d89a059e2bd73d7e99ff3af0f9ff909a522b106003666e4cd6bbde4f94660a6f0b16daaa7905581e74d531fb3d0ac2"}, @NFTA_SET_HANDLE={0xc, 0x10, 0x1, 0x0, 0x4}, @NFTA_SET_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_HANDLE={0xc, 0x10, 0x1, 0x0, 0x2}, @NFTA_SET_OBJ_TYPE={0x8, 0xf, 0x1, 0x0, 0xa}, @NFTA_SET_ID={0x8, 0xa, 0x1, 0x0, 0x3}, @NFTA_SET_TIMEOUT={0xc, 0xb, 0x1, 0x0, 0x8}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0xe}]}], {0x14}}, 0x434}, 0x1, 0x0, 0x0, 0x8000}, 0x20008040)
read$qrtrtun(0xffffffffffffffff, &(0x7f00000000c0)=""/4096, 0x1000)
sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000040)={&(0x7f0000001340)={{0x14}, [@NFT_MSG_NEWTABLE={0x1ec, 0x0, 0xa, 0x5, 0x0, 0x0, {0x5, 0x0, 0x5}, [@NFTA_TABLE_FLAGS={0x8}, @NFTA_TABLE_FLAGS={0x8}, @NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x4}, @NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x4}, @NFTA_TABLE_USERDATA={0xfc, 0x6, "06a7c02867eb3894d16af512228511f4b5a4b3215f03b33dcce5f42884a9f7807538bbc17ac2c09c30d5e1b22775d96d1da965170ef842d696d51d319a7ea2f36bfd4429fed7d4134b315165e58e1b34c0fb2feb76ac2206164c3a60a7260ad42a0652edaef9a2b6318dd2e9ddf7afa8a9f3f7ab78c0aad37c300da15b81a17351e131ec9ac285453fbd3c2839a2b439cd21d82ac9a7935803e9a46be0c2f2481613669b8ba0805e13d195486bade21a53cd25424d3adc655d767fc12b08725e9ac9e56884ee9496fe297f9d8c0798c2e6c9e57a5f408d4e8979bcce096f917e998d7e7fc1d05b56b273f0ec835cd3c29dd3b6652224232d"}, @NFTA_TABLE_NAME={0x9, 0x1, 'syz1\x00'}, @NFTA_TABLE_FLAGS={0x8}, @NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x4}, @NFTA_TABLE_USERDATA={0x85, 0x6, "ae0e687b7390518f58e6ea7114049e3bd84c59a1775f4826f0f66ebcab1c72b0addde9a7d816a2dbfa08bdf059f36daf918c19dd8d49a301274bb7f7d57beeb2020761e36ce7c33f1f4073fb28177add9e85c4c9f1e46bf6dc2a5ee8df7b432d1b6d524823c920175bce935ba7674ecb4d02025a3d42a881331ca7117db96e6b33"}, @NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_DELTABLE={0x114, 0x2, 0xa, 0x101, 0x0, 0x0, {0xa, 0x0, 0x5}, [@NFTA_TABLE_USERDATA={0xf3, 0x6, "bdbee941b090a1dd25f16b1236ba034cecb943b8c014f443314eec78614b71e4a60c05d0812fbc254fc0ea27abf046c5b3199aa12100547d967189e4c11bd1f8a6fd269a567a4cf6606be5fd80e194ebcfe70f3ed62f5b6deacb411b9bc8132ba874a8a183425b5bd6acd335bcede4af02f470632fd46b82f254716cb49757aaa07404f1c31986f84ec99f0db0c9233278b0bfe95249fd1d9e6cc049975519ec45a090f0565d6e4640d89cb49e91c4f7eb71493b075c3dd49693bead5600e65f9efbf730d61df88b8006aa1964ee3e29de1782e973ffe6135158574a6a143c9dd013da752f39f464a2f149d99e1009"}, @NFTA_TABLE_NAME={0x9, 0x1, 'syz1\x00'}]}, @NFT_MSG_DELSET={0x10c, 0xb, 0xa, 0x301, 0x0, 0x0, {0x3, 0x0, 0x5}, [@NFTA_SET_DATA_LEN={0x8, 0x7, 0x1, 0x0, 0x2c}, @NFTA_SET_USERDATA={0xa6, 0xd, 0x1, 0x0, "265b7c3661d87c5e5feb197949a564ab7a54fe6b4c773c36e4b7ee331b290ba840c029d392e4823b4907988294d607f77486cf8ccc1403697da98804308ccf21b672da3ab258c7681c4af228d8a1c3da98309534045314b575f13f6d73af91f23c4e2d7dd6e3b2fe745620d5415786c0119ae0d89a059e2bd73d7e99ff3af0f9ff909a522b106003666e4cd6bbde4f94660a6f0b16daaa7905581e74d531fb3d0ac2"}, @NFTA_SET_HANDLE={0xc, 0x10, 0x1, 0x0, 0x4}, @NFTA_SET_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_HANDLE={0xc, 0x10, 0x1, 0x0, 0x2}, @NFTA_SET_OBJ_TYPE={0x8, 0xf, 0x1, 0x0, 0xa}, @NFTA_SET_ID={0x8, 0xa, 0x1, 0x0, 0x3}, @NFTA_SET_TIMEOUT={0xc, 0xb, 0x1, 0x0, 0x8}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0xe}]}], {0x14}}, 0x434}, 0x1, 0x0, 0x0, 0x8000}, 0x20008040) (async)
read$qrtrtun(0xffffffffffffffff, &(0x7f00000000c0)=""/4096, 0x1000) (async)
03:50:51 executing program 4:
sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000001100)={&(0x7f0000000040), 0xc, &(0x7f00000010c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="3c0000000406010200000000000000000000000405000100070000000000000900020073797a31000000000900020073797a3000000000"], 0x3c}, 0x1, 0x0, 0x0, 0x40}, 0x80) (async)
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000001240)={&(0x7f0000001140)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000001200)={&(0x7f0000001180)={0x48, 0x0, 0x20, 0x70bd2a, 0x25dfdbff, {}, [@NBD_ATTR_BACKEND_IDENTIFIER={0x8, 0xa, '[-:+'}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x101}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x1}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_CLIENT_FLAGS={0xc}]}, 0x48}}, 0x4000000)
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='net/psched\x00')
ioctl$sock_inet6_udp_SIOCOUTQ(r1, 0x5411, &(0x7f00000012c0))
sendmsg$IPCTNL_MSG_EXP_GET(r0, &(0x7f00000014c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000001480)={&(0x7f0000001340)={0x118, 0x1, 0x2, 0x101, 0x0, 0x0, {0x5, 0x0, 0x4}, [@CTA_EXPECT_ZONE={0x6, 0x7, 0x1, 0x0, 0x1}, @CTA_EXPECT_FN={0x13, 0xb, 'callforwarding\x00'}, @CTA_EXPECT_TIMEOUT={0x8, 0x4, 0x1, 0x0, 0x1f}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x2}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x1}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x1}, @CTA_EXPECT_HELP_NAME={0xf, 0x6, 'netbios-ns\x00'}, @CTA_EXPECT_MASK={0xb8, 0x3, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @private2={0xfc, 0x2, '\x00', 0x1}}, {0x14, 0x4, @mcast1}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @loopback}, {0x8, 0x2, @multicast2}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @private1={0xfc, 0x1, '\x00', 0x1}}, {0x14, 0x4, @rand_addr=' \x01\x00'}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @dev={0xfe, 0x80, '\x00', 0x44}}, {0x14, 0x4, @empty}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}]}, 0x118}, 0x1, 0x0, 0x0, 0x4}, 0x4009004)
03:50:51 executing program 3:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='io\x00')
read$qrtrtun(r0, 0x0, 0x0)
03:50:51 executing program 1:
clock_gettime(0x0, &(0x7f00000010c0)={0x0, 0x0})
pselect6(0x40, &(0x7f0000000000)={0x7, 0x6, 0xfffffffffffff31e, 0x7, 0x5, 0x1, 0x1, 0x10001}, &(0x7f0000000040)={0x8, 0x8000, 0x10001, 0x8001, 0x10000, 0xfffffffffffffffe, 0x8001, 0x9}, &(0x7f0000000080)={0x7, 0x7, 0x1, 0x7, 0x10001, 0x9, 0x80, 0xb52b}, &(0x7f0000001100)={r0, r1+10000000}, &(0x7f0000001180)={&(0x7f0000001140)={[0x18000000000000]}, 0x8})
r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r2, &(0x7f00000000c0)=""/4096, 0x1000)
03:50:51 executing program 0:
r0 = getpid()
r1 = syz_open_procfs(r0, &(0x7f0000000040)='net/nfsfs\x00')
read$qrtrtun(r1, &(0x7f00000000c0)=""/4096, 0x1000)
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r1, 0xc0c89425, &(0x7f00000010c0)={"3b2b44c516eeab901079e66d8536f3a6", 0x0, 0x0, {0x8, 0x7}, {0x7bd8, 0x8000}, 0xfbe3927, [0x8000, 0x8, 0x200, 0x1, 0x1000, 0x80000000, 0x400, 0x0, 0x4, 0x1ff, 0x1, 0x9, 0xb06, 0x80000000, 0x3, 0x9]})
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r1, 0xc0c89425, &(0x7f00000011c0)={"bc6f46595388993629fc6cb89f94872e", 0x0, r2, {0x3e2d, 0x5}, {0x172, 0x80000000}, 0x1, [0x8000000000000001, 0x6, 0x4, 0x5, 0x1, 0x9, 0x7f, 0x800, 0x401, 0x1a953e91, 0xfffffffffffffff9, 0x3, 0x2, 0x400, 0x8001]})
syz_open_procfs(r0, &(0x7f0000000080)='net/unix\x00')
syz_open_procfs(r0, &(0x7f0000000000)='oom_score\x00')
03:50:51 executing program 2:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst={0x0, 0x0, 0x0, 0x0, 0x0, 0x3002}], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:51 executing program 4:
sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000001100)={&(0x7f0000000040), 0xc, &(0x7f00000010c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="3c0000000406010200000000000000000000000405000100070000000000000900020073797a31000000000900020073797a3000000000"], 0x3c}, 0x1, 0x0, 0x0, 0x40}, 0x80) (async)
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000001240)={&(0x7f0000001140)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000001200)={&(0x7f0000001180)={0x48, 0x0, 0x20, 0x70bd2a, 0x25dfdbff, {}, [@NBD_ATTR_BACKEND_IDENTIFIER={0x8, 0xa, '[-:+'}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x101}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x1}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_CLIENT_FLAGS={0xc}]}, 0x48}}, 0x4000000) (async)
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='net/psched\x00')
ioctl$sock_inet6_udp_SIOCOUTQ(r1, 0x5411, &(0x7f00000012c0))
sendmsg$IPCTNL_MSG_EXP_GET(r0, &(0x7f00000014c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000001480)={&(0x7f0000001340)={0x118, 0x1, 0x2, 0x101, 0x0, 0x0, {0x5, 0x0, 0x4}, [@CTA_EXPECT_ZONE={0x6, 0x7, 0x1, 0x0, 0x1}, @CTA_EXPECT_FN={0x13, 0xb, 'callforwarding\x00'}, @CTA_EXPECT_TIMEOUT={0x8, 0x4, 0x1, 0x0, 0x1f}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x2}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x1}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x1}, @CTA_EXPECT_HELP_NAME={0xf, 0x6, 'netbios-ns\x00'}, @CTA_EXPECT_MASK={0xb8, 0x3, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @private2={0xfc, 0x2, '\x00', 0x1}}, {0x14, 0x4, @mcast1}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @loopback}, {0x8, 0x2, @multicast2}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @private1={0xfc, 0x1, '\x00', 0x1}}, {0x14, 0x4, @rand_addr=' \x01\x00'}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @dev={0xfe, 0x80, '\x00', 0x44}}, {0x14, 0x4, @empty}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}]}, 0x118}, 0x1, 0x0, 0x0, 0x4}, 0x4009004)
03:50:51 executing program 3:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst={0x6}], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:51 executing program 0:
r0 = getpid()
r1 = syz_open_procfs(r0, &(0x7f0000000040)='net/nfsfs\x00')
read$qrtrtun(r1, &(0x7f00000000c0)=""/4096, 0x1000) (async)
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r1, 0xc0c89425, &(0x7f00000010c0)={"3b2b44c516eeab901079e66d8536f3a6", 0x0, 0x0, {0x8, 0x7}, {0x7bd8, 0x8000}, 0xfbe3927, [0x8000, 0x8, 0x200, 0x1, 0x1000, 0x80000000, 0x400, 0x0, 0x4, 0x1ff, 0x1, 0x9, 0xb06, 0x80000000, 0x3, 0x9]})
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r1, 0xc0c89425, &(0x7f00000011c0)={"bc6f46595388993629fc6cb89f94872e", 0x0, r2, {0x3e2d, 0x5}, {0x172, 0x80000000}, 0x1, [0x8000000000000001, 0x6, 0x4, 0x5, 0x1, 0x9, 0x7f, 0x800, 0x401, 0x1a953e91, 0xfffffffffffffff9, 0x3, 0x2, 0x400, 0x8001]})
syz_open_procfs(r0, &(0x7f0000000080)='net/unix\x00') (async)
syz_open_procfs(r0, &(0x7f0000000000)='oom_score\x00')
03:50:51 executing program 2:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst={0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:51 executing program 3:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst={0x6}], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:51 executing program 1:
clock_gettime(0x0, &(0x7f00000010c0)={0x0, 0x0})
pselect6(0x40, &(0x7f0000000000)={0x7, 0x6, 0xfffffffffffff31e, 0x7, 0x5, 0x1, 0x1, 0x10001}, &(0x7f0000000040)={0x8, 0x8000, 0x10001, 0x8001, 0x10000, 0xfffffffffffffffe, 0x8001, 0x9}, &(0x7f0000000080)={0x7, 0x7, 0x1, 0x7, 0x10001, 0x9, 0x80, 0xb52b}, &(0x7f0000001100)={r0, r1+10000000}, &(0x7f0000001180)={&(0x7f0000001140)={[0x18000000000000]}, 0x8})
r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r2, &(0x7f00000000c0)=""/4096, 0x1000) (async)
read$qrtrtun(r2, &(0x7f00000000c0)=""/4096, 0x1000)
03:50:51 executing program 4:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
r1 = getpid()
r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r2, 0x0, 0xcf, 0x0, 0x0)
r3 = syz_io_uring_setup(0x646e, &(0x7f0000000000)={0x0, 0x252, 0x40, 0x3, 0x2fe}, &(0x7f0000000080), &(0x7f00000010c0))
kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, r1, 0x7, r0, &(0x7f0000001100)={r2, r3, 0x1000})
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
03:50:51 executing program 1:
clock_gettime(0x0, &(0x7f00000010c0)={0x0, 0x0})
pselect6(0x40, &(0x7f0000000000)={0x7, 0x6, 0xfffffffffffff31e, 0x7, 0x5, 0x1, 0x1, 0x10001}, &(0x7f0000000040)={0x8, 0x8000, 0x10001, 0x8001, 0x10000, 0xfffffffffffffffe, 0x8001, 0x9}, &(0x7f0000000080)={0x7, 0x7, 0x1, 0x7, 0x10001, 0x9, 0x80, 0xb52b}, &(0x7f0000001100)={r0, r1+10000000}, &(0x7f0000001180)={&(0x7f0000001140)={[0x18000000000000]}, 0x8})
r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r2, &(0x7f00000000c0)=""/4096, 0x1000)
clock_gettime(0x0, &(0x7f00000010c0)) (async)
pselect6(0x40, &(0x7f0000000000)={0x7, 0x6, 0xfffffffffffff31e, 0x7, 0x5, 0x1, 0x1, 0x10001}, &(0x7f0000000040)={0x8, 0x8000, 0x10001, 0x8001, 0x10000, 0xfffffffffffffffe, 0x8001, 0x9}, &(0x7f0000000080)={0x7, 0x7, 0x1, 0x7, 0x10001, 0x9, 0x80, 0xb52b}, &(0x7f0000001100)={r0, r1+10000000}, &(0x7f0000001180)={&(0x7f0000001140)={[0x18000000000000]}, 0x8}) (async)
syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00') (async)
read$qrtrtun(r2, &(0x7f00000000c0)=""/4096, 0x1000) (async)
03:50:51 executing program 0:
r0 = getpid()
r1 = syz_open_procfs(r0, &(0x7f0000000040)='net/nfsfs\x00')
read$qrtrtun(r1, &(0x7f00000000c0)=""/4096, 0x1000) (async)
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r1, 0xc0c89425, &(0x7f00000010c0)={"3b2b44c516eeab901079e66d8536f3a6", 0x0, 0x0, {0x8, 0x7}, {0x7bd8, 0x8000}, 0xfbe3927, [0x8000, 0x8, 0x200, 0x1, 0x1000, 0x80000000, 0x400, 0x0, 0x4, 0x1ff, 0x1, 0x9, 0xb06, 0x80000000, 0x3, 0x9]})
ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r1, 0xc0c89425, &(0x7f00000011c0)={"bc6f46595388993629fc6cb89f94872e", 0x0, r2, {0x3e2d, 0x5}, {0x172, 0x80000000}, 0x1, [0x8000000000000001, 0x6, 0x4, 0x5, 0x1, 0x9, 0x7f, 0x800, 0x401, 0x1a953e91, 0xfffffffffffffff9, 0x3, 0x2, 0x400, 0x8001]}) (async)
syz_open_procfs(r0, &(0x7f0000000080)='net/unix\x00') (async)
syz_open_procfs(r0, &(0x7f0000000000)='oom_score\x00')
03:50:51 executing program 2:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst={0x0, 0x0, 0x0, 0x0, 0x0, 0x4800}], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:51 executing program 5:
r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/protocols\x00')
read$qrtrtun(r0, &(0x7f0000000040)=""/85, 0x55)
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r1, 0x0, 0xcf, 0x0, 0x0)
r2 = socket$isdn_base(0x22, 0x3, 0x0)
r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_mr_cache\x00')
setsockopt$MRT_DEL_MFC_PROXY(r4, 0x0, 0xd3, &(0x7f0000000240)={@private=0xa010100, @dev={0xac, 0x14, 0x14, 0xc}, 0xffffffffffffffff, "0d9b6910d7e4d6a813c6b8e66c7a6b3dc0b480867457ff734eefef466da5356b", 0xb581, 0x1, 0x9d, 0x7}, 0x3c)
setsockopt$MRT_ASSERT(r3, 0x0, 0xcf, 0x0, 0x0)
bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000180)={@ifindex, r0, 0x1f, 0x24, 0x0, @prog_fd=r3}, 0x20)
epoll_ctl$EPOLL_CTL_DEL(r1, 0x2, r2)
read$qrtrtun(r0, &(0x7f00000000c0)=""/156, 0x9c)
r5 = socket$phonet_pipe(0x23, 0x5, 0x2)
bind$phonet(r5, &(0x7f0000000000)={0x23, 0x3, 0x5, 0xaf}, 0x10)
03:50:51 executing program 3:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst={0x6}], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:51 executing program 4:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
r1 = getpid()
r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r2, 0x0, 0xcf, 0x0, 0x0)
r3 = syz_io_uring_setup(0x646e, &(0x7f0000000000)={0x0, 0x252, 0x40, 0x3, 0x2fe}, &(0x7f0000000080), &(0x7f00000010c0))
kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, r1, 0x7, r0, &(0x7f0000001100)={r2, r3, 0x1000})
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00') (async)
getpid() (async)
syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00') (async)
setsockopt$MRT_ASSERT(r2, 0x0, 0xcf, 0x0, 0x0) (async)
syz_io_uring_setup(0x646e, &(0x7f0000000000)={0x0, 0x252, 0x40, 0x3, 0x2fe}, &(0x7f0000000080), &(0x7f00000010c0)) (async)
kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, r1, 0x7, r0, &(0x7f0000001100)={r2, r3, 0x1000}) (async)
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000) (async)
03:50:51 executing program 3:
bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0)
03:50:51 executing program 1:
r0 = getpid()
r1 = syz_open_procfs(r0, &(0x7f0000000040)='net/vlan/vlan0\x00')
read$qrtrtun(r1, &(0x7f00000000c0)=""/4096, 0x1000)
timerfd_settime(r1, 0x1, &(0x7f0000000000)={{0x0, 0x989680}}, &(0x7f0000000080))
03:50:51 executing program 0:
pipe2$watch_queue(&(0x7f0000000000), 0x80)
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
03:50:51 executing program 5:
r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/protocols\x00')
read$qrtrtun(r0, &(0x7f0000000040)=""/85, 0x55)
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r1, 0x0, 0xcf, 0x0, 0x0)
socket$isdn_base(0x22, 0x3, 0x0) (async)
r2 = socket$isdn_base(0x22, 0x3, 0x0)
r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_mr_cache\x00')
setsockopt$MRT_DEL_MFC_PROXY(r4, 0x0, 0xd3, &(0x7f0000000240)={@private=0xa010100, @dev={0xac, 0x14, 0x14, 0xc}, 0xffffffffffffffff, "0d9b6910d7e4d6a813c6b8e66c7a6b3dc0b480867457ff734eefef466da5356b", 0xb581, 0x1, 0x9d, 0x7}, 0x3c)
setsockopt$MRT_ASSERT(r3, 0x0, 0xcf, 0x0, 0x0)
bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000180)={@ifindex, r0, 0x1f, 0x24, 0x0, @prog_fd=r3}, 0x20) (async)
bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000180)={@ifindex, r0, 0x1f, 0x24, 0x0, @prog_fd=r3}, 0x20)
epoll_ctl$EPOLL_CTL_DEL(r1, 0x2, r2) (async)
epoll_ctl$EPOLL_CTL_DEL(r1, 0x2, r2)
read$qrtrtun(r0, &(0x7f00000000c0)=""/156, 0x9c) (async)
read$qrtrtun(r0, &(0x7f00000000c0)=""/156, 0x9c)
r5 = socket$phonet_pipe(0x23, 0x5, 0x2)
bind$phonet(r5, &(0x7f0000000000)={0x23, 0x3, 0x5, 0xaf}, 0x10)
03:50:51 executing program 2:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst={0x0, 0x0, 0x0, 0x0, 0x0, 0x4c00}], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:51 executing program 3:
bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0)
03:50:51 executing program 4:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
getpid() (async)
r1 = getpid()
r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r2, 0x0, 0xcf, 0x0, 0x0)
syz_io_uring_setup(0x646e, &(0x7f0000000000)={0x0, 0x252, 0x40, 0x3, 0x2fe}, &(0x7f0000000080), &(0x7f00000010c0)) (async)
r3 = syz_io_uring_setup(0x646e, &(0x7f0000000000)={0x0, 0x252, 0x40, 0x3, 0x2fe}, &(0x7f0000000080), &(0x7f00000010c0))
kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, r1, 0x7, r0, &(0x7f0000001100)={r2, r3, 0x1000})
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
03:50:51 executing program 0:
pipe2$watch_queue(&(0x7f0000000000), 0x80)
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
03:50:51 executing program 1:
r0 = getpid()
r1 = syz_open_procfs(r0, &(0x7f0000000040)='net/vlan/vlan0\x00')
read$qrtrtun(r1, &(0x7f00000000c0)=""/4096, 0x1000)
timerfd_settime(r1, 0x1, &(0x7f0000000000)={{0x0, 0x989680}}, &(0x7f0000000080))
getpid() (async)
syz_open_procfs(r0, &(0x7f0000000040)='net/vlan/vlan0\x00') (async)
read$qrtrtun(r1, &(0x7f00000000c0)=""/4096, 0x1000) (async)
timerfd_settime(r1, 0x1, &(0x7f0000000000)={{0x0, 0x989680}}, &(0x7f0000000080)) (async)
03:50:51 executing program 3:
bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0)
03:50:51 executing program 5:
r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/protocols\x00')
read$qrtrtun(r0, &(0x7f0000000040)=""/85, 0x55)
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r1, 0x0, 0xcf, 0x0, 0x0)
r2 = socket$isdn_base(0x22, 0x3, 0x0)
r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_mr_cache\x00')
setsockopt$MRT_DEL_MFC_PROXY(r4, 0x0, 0xd3, &(0x7f0000000240)={@private=0xa010100, @dev={0xac, 0x14, 0x14, 0xc}, 0xffffffffffffffff, "0d9b6910d7e4d6a813c6b8e66c7a6b3dc0b480867457ff734eefef466da5356b", 0xb581, 0x1, 0x9d, 0x7}, 0x3c)
setsockopt$MRT_ASSERT(r3, 0x0, 0xcf, 0x0, 0x0)
bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000180)={@ifindex, r0, 0x1f, 0x24, 0x0, @prog_fd=r3}, 0x20)
epoll_ctl$EPOLL_CTL_DEL(r1, 0x2, r2)
read$qrtrtun(r0, &(0x7f00000000c0)=""/156, 0x9c)
r5 = socket$phonet_pipe(0x23, 0x5, 0x2)
bind$phonet(r5, &(0x7f0000000000)={0x23, 0x3, 0x5, 0xaf}, 0x10)
syz_open_procfs(0x0, &(0x7f0000000200)='net/protocols\x00') (async)
read$qrtrtun(r0, &(0x7f0000000040)=""/85, 0x55) (async)
syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00') (async)
setsockopt$MRT_ASSERT(r1, 0x0, 0xcf, 0x0, 0x0) (async)
socket$isdn_base(0x22, 0x3, 0x0) (async)
syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00') (async)
syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_mr_cache\x00') (async)
setsockopt$MRT_DEL_MFC_PROXY(r4, 0x0, 0xd3, &(0x7f0000000240)={@private=0xa010100, @dev={0xac, 0x14, 0x14, 0xc}, 0xffffffffffffffff, "0d9b6910d7e4d6a813c6b8e66c7a6b3dc0b480867457ff734eefef466da5356b", 0xb581, 0x1, 0x9d, 0x7}, 0x3c) (async)
setsockopt$MRT_ASSERT(r3, 0x0, 0xcf, 0x0, 0x0) (async)
bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000180)={@ifindex, r0, 0x1f, 0x24, 0x0, @prog_fd=r3}, 0x20) (async)
epoll_ctl$EPOLL_CTL_DEL(r1, 0x2, r2) (async)
read$qrtrtun(r0, &(0x7f00000000c0)=""/156, 0x9c) (async)
socket$phonet_pipe(0x23, 0x5, 0x2) (async)
bind$phonet(r5, &(0x7f0000000000)={0x23, 0x3, 0x5, 0xaf}, 0x10) (async)
03:50:51 executing program 4:
connect$pppoe(0xffffffffffffffff, &(0x7f0000000040)={0x18, 0x0, {0x2, @remote, 'batadv_slave_0\x00'}}, 0x1e)
ioctl$PPPOEIOCSFWD(0xffffffffffffffff, 0x4008b100, &(0x7f0000001140)={0x18, 0x0, {0x3, @broadcast, 'ipvlan1\x00'}})
syz_open_dev$loop(&(0x7f0000001180), 0x652, 0x101402)
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
r1 = memfd_secret(0x0)
bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000001100)={{r1}, &(0x7f0000000080), &(0x7f00000010c0)='%d \x00'}, 0x20)
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
ioctl$IOC_PR_PREEMPT_ABORT(r0, 0x401870cc, &(0x7f0000000000)={0x177e, 0x100000001, 0x10000, 0x6})
03:50:51 executing program 0:
pipe2$watch_queue(&(0x7f0000000000), 0x80) (async)
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
03:50:51 executing program 2:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst={0x0, 0x0, 0x0, 0x0, 0x0, 0x6800}], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:51 executing program 1:
r0 = getpid()
r1 = syz_open_procfs(r0, &(0x7f0000000040)='net/vlan/vlan0\x00')
read$qrtrtun(r1, &(0x7f00000000c0)=""/4096, 0x1000) (async)
timerfd_settime(r1, 0x1, &(0x7f0000000000)={{0x0, 0x989680}}, &(0x7f0000000080))
03:50:51 executing program 3:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x0, 0x0, &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:51 executing program 0:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
getuid()
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
03:50:51 executing program 3:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x0, 0x0, &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:51 executing program 2:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst={0x0, 0x0, 0x0, 0x0, 0x0, 0x6c00}], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:51 executing program 0:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
getuid() (async)
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
03:50:51 executing program 4:
connect$pppoe(0xffffffffffffffff, &(0x7f0000000040)={0x18, 0x0, {0x2, @remote, 'batadv_slave_0\x00'}}, 0x1e) (async)
ioctl$PPPOEIOCSFWD(0xffffffffffffffff, 0x4008b100, &(0x7f0000001140)={0x18, 0x0, {0x3, @broadcast, 'ipvlan1\x00'}}) (async, rerun: 32)
syz_open_dev$loop(&(0x7f0000001180), 0x652, 0x101402) (async, rerun: 32)
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
r1 = memfd_secret(0x0)
bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000001100)={{r1}, &(0x7f0000000080), &(0x7f00000010c0)='%d \x00'}, 0x20) (async)
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
ioctl$IOC_PR_PREEMPT_ABORT(r0, 0x401870cc, &(0x7f0000000000)={0x177e, 0x100000001, 0x10000, 0x6})
03:50:51 executing program 1:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r1, 0x0, 0xcf, 0x0, 0x0)
bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000000)={r1}, 0x4)
03:50:51 executing program 0:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
getuid()
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00') (async)
getuid() (async)
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000) (async)
03:50:51 executing program 3:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x0, 0x0, &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:51 executing program 2:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst={0x0, 0x0, 0x0, 0x0, 0x0, 0x7400}], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:51 executing program 1:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r1, 0x0, 0xcf, 0x0, 0x0)
bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000000)={r1}, 0x4) (async)
bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000000)={r1}, 0x4)
03:50:52 executing program 4:
connect$pppoe(0xffffffffffffffff, &(0x7f0000000040)={0x18, 0x0, {0x2, @remote, 'batadv_slave_0\x00'}}, 0x1e)
ioctl$PPPOEIOCSFWD(0xffffffffffffffff, 0x4008b100, &(0x7f0000001140)={0x18, 0x0, {0x3, @broadcast, 'ipvlan1\x00'}})
syz_open_dev$loop(&(0x7f0000001180), 0x652, 0x101402)
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00') (async)
r1 = memfd_secret(0x0)
bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000001100)={{r1}, &(0x7f0000000080), &(0x7f00000010c0)='%d \x00'}, 0x20) (async)
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
ioctl$IOC_PR_PREEMPT_ABORT(r0, 0x401870cc, &(0x7f0000000000)={0x177e, 0x100000001, 0x10000, 0x6})
03:50:52 executing program 0:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
r1 = memfd_secret(0x0)
sendmsg$NFT_MSG_GETRULE(r1, &(0x7f0000000080)={&(0x7f0000001180)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000040)={&(0x7f00000010c0)={0xc0, 0x7, 0xa, 0x401, 0x0, 0x0, {0x2, 0x0, 0xa}, [@NFTA_RULE_USERDATA={0x7a, 0x7, 0x1, 0x0, "4b6568c7b54f29766482d35cd0ad8d17fceb95fd981c1201300ca56e065f9055d6c67e90e754134c5c2a0e622f3a850b1d4d8550c9ea7cc9090740590a5c184bb31652a4e3d75e763dcbb2eb9faeb945302e6f07d3270126211b6f0472db1f5e204459ba4da12b79d94addc19c52bbb7d8429a9c785e"}, @NFTA_RULE_POSITION_ID={0x8}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_HANDLE={0xc, 0x3, 0x1, 0x0, 0x2}, @NFTA_RULE_POSITION_ID={0x8, 0xa, 0x1, 0x0, 0x2}, @NFTA_RULE_ID={0x8, 0x9, 0x1, 0x0, 0x2}]}, 0xc0}, 0x1, 0x0, 0x0, 0x4}, 0x20000000)
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
03:50:52 executing program 1:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000) (async)
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r1, 0x0, 0xcf, 0x0, 0x0) (async)
bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000000)={r1}, 0x4)
03:50:52 executing program 3:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x0, &(0x7f0000001240), &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:52 executing program 4:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000080)={'syztnl1\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x2f, 0x3, 0x4, 0x0, 0x2, @dev={0xfe, 0x80, '\x00', 0x37}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x40, 0x10, 0xffffffc1, 0xc040}})
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
03:50:52 executing program 2:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst={0x0, 0x0, 0x0, 0x0, 0x0, 0x7a00}], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:52 executing program 4:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000080)={'syztnl1\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x2f, 0x3, 0x4, 0x0, 0x2, @dev={0xfe, 0x80, '\x00', 0x37}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x40, 0x10, 0xffffffc1, 0xc040}})
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00') (async)
ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000080)={'syztnl1\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x2f, 0x3, 0x4, 0x0, 0x2, @dev={0xfe, 0x80, '\x00', 0x37}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x40, 0x10, 0xffffffc1, 0xc040}}) (async)
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000) (async)
03:50:52 executing program 0:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
r1 = memfd_secret(0x0)
sendmsg$NFT_MSG_GETRULE(r1, &(0x7f0000000080)={&(0x7f0000001180)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000040)={&(0x7f00000010c0)={0xc0, 0x7, 0xa, 0x401, 0x0, 0x0, {0x2, 0x0, 0xa}, [@NFTA_RULE_USERDATA={0x7a, 0x7, 0x1, 0x0, "4b6568c7b54f29766482d35cd0ad8d17fceb95fd981c1201300ca56e065f9055d6c67e90e754134c5c2a0e622f3a850b1d4d8550c9ea7cc9090740590a5c184bb31652a4e3d75e763dcbb2eb9faeb945302e6f07d3270126211b6f0472db1f5e204459ba4da12b79d94addc19c52bbb7d8429a9c785e"}, @NFTA_RULE_POSITION_ID={0x8}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_HANDLE={0xc, 0x3, 0x1, 0x0, 0x2}, @NFTA_RULE_POSITION_ID={0x8, 0xa, 0x1, 0x0, 0x2}, @NFTA_RULE_ID={0x8, 0x9, 0x1, 0x0, 0x2}]}, 0xc0}, 0x1, 0x0, 0x0, 0x4}, 0x20000000)
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00') (async)
memfd_secret(0x0) (async)
sendmsg$NFT_MSG_GETRULE(r1, &(0x7f0000000080)={&(0x7f0000001180)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000040)={&(0x7f00000010c0)={0xc0, 0x7, 0xa, 0x401, 0x0, 0x0, {0x2, 0x0, 0xa}, [@NFTA_RULE_USERDATA={0x7a, 0x7, 0x1, 0x0, "4b6568c7b54f29766482d35cd0ad8d17fceb95fd981c1201300ca56e065f9055d6c67e90e754134c5c2a0e622f3a850b1d4d8550c9ea7cc9090740590a5c184bb31652a4e3d75e763dcbb2eb9faeb945302e6f07d3270126211b6f0472db1f5e204459ba4da12b79d94addc19c52bbb7d8429a9c785e"}, @NFTA_RULE_POSITION_ID={0x8}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_HANDLE={0xc, 0x3, 0x1, 0x0, 0x2}, @NFTA_RULE_POSITION_ID={0x8, 0xa, 0x1, 0x0, 0x2}, @NFTA_RULE_ID={0x8, 0x9, 0x1, 0x0, 0x2}]}, 0xc0}, 0x1, 0x0, 0x0, 0x4}, 0x20000000) (async)
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000) (async)
03:50:52 executing program 1:
r0 = getpid()
r1 = getpid()
kcmp$KCMP_EPOLL_TFD(r1, r0, 0x7, 0xffffffffffffffff, &(0x7f0000001840))
r2 = syz_open_procfs(r0, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r2, &(0x7f00000000c0)=""/4096, 0x1000)
03:50:52 executing program 3:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x0, &(0x7f0000001240), &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:52 executing program 2:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst={0x0, 0x0, 0x0, 0x0, 0x0, 0x9d00}], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:52 executing program 5:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r0, 0x0, 0xcf, 0x0, 0x0)
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r1, 0x0, 0xcf, 0x0, 0x0)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f0000000000)={{0x1, 0x1, 0x18, r1, {0xee01, 0xee01}}, './file0\x00'})
r2 = memfd_secret(0x80000)
write$P9_RXATTRWALK(r2, &(0x7f0000000180)={0xf, 0x1f, 0x2, 0x3}, 0xf)
r3 = syz_open_procfs(0x0, &(0x7f0000000200)='net/protocols\x00')
read$qrtrtun(r3, &(0x7f0000000040)=""/85, 0x55)
read$qrtrtun(r3, &(0x7f00000000c0)=""/156, 0x9c)
03:50:52 executing program 0:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00') (async)
r1 = memfd_secret(0x0)
sendmsg$NFT_MSG_GETRULE(r1, &(0x7f0000000080)={&(0x7f0000001180)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000040)={&(0x7f00000010c0)={0xc0, 0x7, 0xa, 0x401, 0x0, 0x0, {0x2, 0x0, 0xa}, [@NFTA_RULE_USERDATA={0x7a, 0x7, 0x1, 0x0, "4b6568c7b54f29766482d35cd0ad8d17fceb95fd981c1201300ca56e065f9055d6c67e90e754134c5c2a0e622f3a850b1d4d8550c9ea7cc9090740590a5c184bb31652a4e3d75e763dcbb2eb9faeb945302e6f07d3270126211b6f0472db1f5e204459ba4da12b79d94addc19c52bbb7d8429a9c785e"}, @NFTA_RULE_POSITION_ID={0x8}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_HANDLE={0xc, 0x3, 0x1, 0x0, 0x2}, @NFTA_RULE_POSITION_ID={0x8, 0xa, 0x1, 0x0, 0x2}, @NFTA_RULE_ID={0x8, 0x9, 0x1, 0x0, 0x2}]}, 0xc0}, 0x1, 0x0, 0x0, 0x4}, 0x20000000)
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
03:50:52 executing program 3:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x0, &(0x7f0000001240), &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:52 executing program 2:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst={0x0, 0x0, 0x0, 0x0, 0x0, 0xe603}], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:52 executing program 4:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000080)={'syztnl1\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x2f, 0x3, 0x4, 0x0, 0x2, @dev={0xfe, 0x80, '\x00', 0x37}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x40, 0x10, 0xffffffc1, 0xc040}}) (async)
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
03:50:52 executing program 1:
r0 = getpid() (async)
r1 = getpid()
kcmp$KCMP_EPOLL_TFD(r1, r0, 0x7, 0xffffffffffffffff, &(0x7f0000001840))
r2 = syz_open_procfs(r0, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r2, &(0x7f00000000c0)=""/4096, 0x1000)
03:50:52 executing program 4:
read$qrtrtun(0xffffffffffffffff, &(0x7f0000002100)=""/4111, 0x100f)
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r0, 0x0, 0xcf, 0x0, 0x0)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000040)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYRES32, @ANYRES32=0xee00, @ANYBLOB="2e2f66907f269d734f7848cb3df1696c653000"])
03:50:52 executing program 5:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r0, 0x0, 0xcf, 0x0, 0x0) (async)
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r1, 0x0, 0xcf, 0x0, 0x0) (async)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f0000000000)={{0x1, 0x1, 0x18, r1, {0xee01, 0xee01}}, './file0\x00'})
r2 = memfd_secret(0x80000)
write$P9_RXATTRWALK(r2, &(0x7f0000000180)={0xf, 0x1f, 0x2, 0x3}, 0xf) (async)
r3 = syz_open_procfs(0x0, &(0x7f0000000200)='net/protocols\x00')
read$qrtrtun(r3, &(0x7f0000000040)=""/85, 0x55) (async)
read$qrtrtun(r3, &(0x7f00000000c0)=""/156, 0x9c)
03:50:52 executing program 0:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r1, 0x0, 0xcf, 0x0, 0x0)
ioctl$BLKPBSZGET(r1, 0x127b, &(0x7f0000000000))
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
03:50:52 executing program 2:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst={0x0, 0x0, 0x0, 0x0, 0x0, 0xe803}], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:52 executing program 1:
r0 = getpid() (async, rerun: 32)
r1 = getpid() (rerun: 32)
kcmp$KCMP_EPOLL_TFD(r1, r0, 0x7, 0xffffffffffffffff, &(0x7f0000001840)) (async, rerun: 64)
r2 = syz_open_procfs(r0, &(0x7f0000001280)='smaps\x00') (rerun: 64)
read$qrtrtun(r2, &(0x7f00000000c0)=""/4096, 0x1000)
03:50:52 executing program 3:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:52 executing program 4:
read$qrtrtun(0xffffffffffffffff, &(0x7f0000002100)=""/4111, 0x100f) (async)
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r0, 0x0, 0xcf, 0x0, 0x0)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000040)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYRES32, @ANYRES32=0xee00, @ANYBLOB="2e2f66907f269d734f7848cb3df1696c653000"])
03:50:52 executing program 2:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst={0x0, 0x0, 0x0, 0x0, 0x0, 0xe900}], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:52 executing program 0:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00') (async)
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r1, 0x0, 0xcf, 0x0, 0x0) (async)
ioctl$BLKPBSZGET(r1, 0x127b, &(0x7f0000000000)) (async)
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
03:50:52 executing program 3:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:52 executing program 5:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r0, 0x0, 0xcf, 0x0, 0x0) (async)
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r1, 0x0, 0xcf, 0x0, 0x0)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f0000000000)={{0x1, 0x1, 0x18, r1, {0xee01, 0xee01}}, './file0\x00'}) (async, rerun: 32)
r2 = memfd_secret(0x80000) (rerun: 32)
write$P9_RXATTRWALK(r2, &(0x7f0000000180)={0xf, 0x1f, 0x2, 0x3}, 0xf)
r3 = syz_open_procfs(0x0, &(0x7f0000000200)='net/protocols\x00')
read$qrtrtun(r3, &(0x7f0000000040)=""/85, 0x55) (async)
read$qrtrtun(r3, &(0x7f00000000c0)=""/156, 0x9c)
03:50:52 executing program 0:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r1, 0x0, 0xcf, 0x0, 0x0)
ioctl$BLKPBSZGET(r1, 0x127b, &(0x7f0000000000))
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000) (async)
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
03:50:52 executing program 3:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:52 executing program 4:
read$qrtrtun(0xffffffffffffffff, &(0x7f0000002100)=""/4111, 0x100f)
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r0, 0x0, 0xcf, 0x0, 0x0)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000040)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYRES32, @ANYRES32=0xee00, @ANYBLOB="2e2f66907f269d734f7848cb3df1696c653000"])
read$qrtrtun(0xffffffffffffffff, &(0x7f0000002100)=""/4111, 0x100f) (async)
syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00') (async)
setsockopt$MRT_ASSERT(r0, 0x0, 0xcf, 0x0, 0x0) (async)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000040)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYRES32, @ANYRES32=0xee00, @ANYBLOB="2e2f66907f269d734f7848cb3df1696c653000"]) (async)
03:50:52 executing program 2:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst={0x0, 0x0, 0x0, 0x0, 0x0, 0xf202}], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:52 executing program 5:
r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/protocols\x00')
openat$dir(0xffffffffffffff9c, &(0x7f0000000540)='./file0\x00', 0x20140, 0xac)
read$qrtrtun(r0, &(0x7f0000000040)=""/85, 0x55)
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r1, 0x0, 0xcf, 0x0, 0x0)
r2 = syz_open_procfs(0x0, &(0x7f0000000300)='statm\x00')
r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r3, 0x0, 0xcf, 0x0, 0x0)
setsockopt$MRT_FLUSH(r3, 0x0, 0xd4, &(0x7f00000005c0)=0x3, 0x4)
bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000003c0)={{r0, 0xffffffffffffffff}, &(0x7f0000000340), &(0x7f0000000380)='%p \x00'}, 0x20)
sendmsg$NFNL_MSG_ACCT_GET_CTRZERO(r3, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x20, 0x2, 0x7, 0x201, 0x0, 0x0, {0x7, 0x0, 0x9}, [@NFACCT_NAME={0x9, 0x1, 'syz0\x00'}]}, 0x20}}, 0x24000010)
r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r5, 0x0, 0xcf, 0x0, 0x0)
bpf$ITER_CREATE(0x21, &(0x7f0000000580)={r5}, 0x8)
bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x18, &(0x7f0000000240)=@raw=[@cb_func={0x18, 0x5, 0x4, 0x0, 0x5}, @exit, @generic={0x1, 0x5, 0x9, 0x157d, 0x31}, @initr0={0x18, 0x0, 0x0, 0x0, 0xdc, 0x0, 0x0, 0x0, 0x7fffffff}, @map_val={0x18, 0x1, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x3}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x7}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}, @func={0x85, 0x0, 0x1, 0x0, 0x6}], &(0x7f0000000000)='GPL\x00', 0x4, 0x0, 0x0, 0x41100, 0xa, '\x00', 0x0, 0x25, r0, 0x8, &(0x7f0000000180)={0xa, 0x2}, 0x8, 0x10, &(0x7f00000001c0)={0x2, 0x10, 0x5d54, 0x9}, 0x10, 0x0, 0x0, 0x3, &(0x7f0000000400)=[r0, r1, r2, r4], &(0x7f0000000440)=[{0x2, 0x4, 0x8, 0xc}, {0x4, 0x3, 0xe, 0x1}, {0x2, 0x3, 0xb, 0xa}], 0x10, 0x8001}, 0x90)
read$qrtrtun(r0, &(0x7f00000000c0)=""/156, 0x9c)
03:50:52 executing program 4:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
getegid()
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
03:50:52 executing program 3:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst={0x6}], 0x0, 0xb}, 0x90)
03:50:52 executing program 0:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4081, 0xff1)
03:50:52 executing program 4:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00') (async)
getegid()
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
03:50:52 executing program 1:
syz_io_uring_setup(0x54e2, &(0x7f0000000000)={0x0, 0xd0f3, 0x800, 0x1, 0x267}, &(0x7f0000000080), &(0x7f00000010c0)=0x0)
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r1, 0x0, 0xcf, 0x0, 0x0)
syz_io_uring_submit(0x0, r0, &(0x7f0000001100)=@IORING_OP_FALLOCATE={0x11, 0x45, 0x0, @fd=r1, 0x5, 0x0, 0x20, 0x0, 0x1})
r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r2, &(0x7f00000000c0)=""/4096, 0x1000)
03:50:52 executing program 2:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst={0x0, 0x0, 0x0, 0x0, 0x0, 0xff00}], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:52 executing program 5:
r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/protocols\x00')
openat$dir(0xffffffffffffff9c, &(0x7f0000000540)='./file0\x00', 0x20140, 0xac) (async)
read$qrtrtun(r0, &(0x7f0000000040)=""/85, 0x55) (async)
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r1, 0x0, 0xcf, 0x0, 0x0)
r2 = syz_open_procfs(0x0, &(0x7f0000000300)='statm\x00') (async)
r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r3, 0x0, 0xcf, 0x0, 0x0)
setsockopt$MRT_FLUSH(r3, 0x0, 0xd4, &(0x7f00000005c0)=0x3, 0x4)
bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000003c0)={{r0, 0xffffffffffffffff}, &(0x7f0000000340), &(0x7f0000000380)='%p \x00'}, 0x20) (async)
sendmsg$NFNL_MSG_ACCT_GET_CTRZERO(r3, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x20, 0x2, 0x7, 0x201, 0x0, 0x0, {0x7, 0x0, 0x9}, [@NFACCT_NAME={0x9, 0x1, 'syz0\x00'}]}, 0x20}}, 0x24000010) (async)
r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r5, 0x0, 0xcf, 0x0, 0x0)
bpf$ITER_CREATE(0x21, &(0x7f0000000580)={r5}, 0x8) (async)
bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x18, &(0x7f0000000240)=@raw=[@cb_func={0x18, 0x5, 0x4, 0x0, 0x5}, @exit, @generic={0x1, 0x5, 0x9, 0x157d, 0x31}, @initr0={0x18, 0x0, 0x0, 0x0, 0xdc, 0x0, 0x0, 0x0, 0x7fffffff}, @map_val={0x18, 0x1, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x3}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x7}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}, @func={0x85, 0x0, 0x1, 0x0, 0x6}], &(0x7f0000000000)='GPL\x00', 0x4, 0x0, 0x0, 0x41100, 0xa, '\x00', 0x0, 0x25, r0, 0x8, &(0x7f0000000180)={0xa, 0x2}, 0x8, 0x10, &(0x7f00000001c0)={0x2, 0x10, 0x5d54, 0x9}, 0x10, 0x0, 0x0, 0x3, &(0x7f0000000400)=[r0, r1, r2, r4], &(0x7f0000000440)=[{0x2, 0x4, 0x8, 0xc}, {0x4, 0x3, 0xe, 0x1}, {0x2, 0x3, 0xb, 0xa}], 0x10, 0x8001}, 0x90) (async)
read$qrtrtun(r0, &(0x7f00000000c0)=""/156, 0x9c)
03:50:52 executing program 3:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst={0x6}], 0x0, 0xb}, 0x90)
03:50:52 executing program 0:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4081, 0xff1)
03:50:52 executing program 4:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
getegid()
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00') (async)
getegid() (async)
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000) (async)
03:50:52 executing program 3:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst={0x6}], 0x0, 0xb}, 0x90)
03:50:52 executing program 1:
syz_io_uring_setup(0x54e2, &(0x7f0000000000)={0x0, 0xd0f3, 0x800, 0x1, 0x267}, &(0x7f0000000080), &(0x7f00000010c0)=0x0)
syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00') (async)
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r1, 0x0, 0xcf, 0x0, 0x0)
syz_io_uring_submit(0x0, r0, &(0x7f0000001100)=@IORING_OP_FALLOCATE={0x11, 0x45, 0x0, @fd=r1, 0x5, 0x0, 0x20, 0x0, 0x1}) (async)
syz_io_uring_submit(0x0, r0, &(0x7f0000001100)=@IORING_OP_FALLOCATE={0x11, 0x45, 0x0, @fd=r1, 0x5, 0x0, 0x20, 0x0, 0x1})
r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r2, &(0x7f00000000c0)=""/4096, 0x1000)
03:50:52 executing program 0:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4081, 0xff1)
syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00') (async)
read$qrtrtun(r0, &(0x7f00000000c0)=""/4081, 0xff1) (async)
03:50:52 executing program 5:
r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/protocols\x00')
openat$dir(0xffffffffffffff9c, &(0x7f0000000540)='./file0\x00', 0x20140, 0xac)
read$qrtrtun(r0, &(0x7f0000000040)=""/85, 0x55)
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r1, 0x0, 0xcf, 0x0, 0x0)
r2 = syz_open_procfs(0x0, &(0x7f0000000300)='statm\x00')
r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r3, 0x0, 0xcf, 0x0, 0x0)
setsockopt$MRT_FLUSH(r3, 0x0, 0xd4, &(0x7f00000005c0)=0x3, 0x4)
bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000003c0)={{r0, 0xffffffffffffffff}, &(0x7f0000000340), &(0x7f0000000380)='%p \x00'}, 0x20)
sendmsg$NFNL_MSG_ACCT_GET_CTRZERO(r3, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x20, 0x2, 0x7, 0x201, 0x0, 0x0, {0x7, 0x0, 0x9}, [@NFACCT_NAME={0x9, 0x1, 'syz0\x00'}]}, 0x20}}, 0x24000010)
r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r5, 0x0, 0xcf, 0x0, 0x0)
bpf$ITER_CREATE(0x21, &(0x7f0000000580)={r5}, 0x8)
bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x18, &(0x7f0000000240)=@raw=[@cb_func={0x18, 0x5, 0x4, 0x0, 0x5}, @exit, @generic={0x1, 0x5, 0x9, 0x157d, 0x31}, @initr0={0x18, 0x0, 0x0, 0x0, 0xdc, 0x0, 0x0, 0x0, 0x7fffffff}, @map_val={0x18, 0x1, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x3}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x7}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}, @func={0x85, 0x0, 0x1, 0x0, 0x6}], &(0x7f0000000000)='GPL\x00', 0x4, 0x0, 0x0, 0x41100, 0xa, '\x00', 0x0, 0x25, r0, 0x8, &(0x7f0000000180)={0xa, 0x2}, 0x8, 0x10, &(0x7f00000001c0)={0x2, 0x10, 0x5d54, 0x9}, 0x10, 0x0, 0x0, 0x3, &(0x7f0000000400)=[r0, r1, r2, r4], &(0x7f0000000440)=[{0x2, 0x4, 0x8, 0xc}, {0x4, 0x3, 0xe, 0x1}, {0x2, 0x3, 0xb, 0xa}], 0x10, 0x8001}, 0x90)
read$qrtrtun(r0, &(0x7f00000000c0)=""/156, 0x9c)
syz_open_procfs(0x0, &(0x7f0000000200)='net/protocols\x00') (async)
openat$dir(0xffffffffffffff9c, &(0x7f0000000540)='./file0\x00', 0x20140, 0xac) (async)
read$qrtrtun(r0, &(0x7f0000000040)=""/85, 0x55) (async)
syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00') (async)
setsockopt$MRT_ASSERT(r1, 0x0, 0xcf, 0x0, 0x0) (async)
syz_open_procfs(0x0, &(0x7f0000000300)='statm\x00') (async)
syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00') (async)
setsockopt$MRT_ASSERT(r3, 0x0, 0xcf, 0x0, 0x0) (async)
setsockopt$MRT_FLUSH(r3, 0x0, 0xd4, &(0x7f00000005c0)=0x3, 0x4) (async)
bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000003c0)={{r0}, &(0x7f0000000340), &(0x7f0000000380)='%p \x00'}, 0x20) (async)
sendmsg$NFNL_MSG_ACCT_GET_CTRZERO(r3, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x20, 0x2, 0x7, 0x201, 0x0, 0x0, {0x7, 0x0, 0x9}, [@NFACCT_NAME={0x9, 0x1, 'syz0\x00'}]}, 0x20}}, 0x24000010) (async)
syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00') (async)
setsockopt$MRT_ASSERT(r5, 0x0, 0xcf, 0x0, 0x0) (async)
bpf$ITER_CREATE(0x21, &(0x7f0000000580)={r5}, 0x8) (async)
bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x18, &(0x7f0000000240)=@raw=[@cb_func={0x18, 0x5, 0x4, 0x0, 0x5}, @exit, @generic={0x1, 0x5, 0x9, 0x157d, 0x31}, @initr0={0x18, 0x0, 0x0, 0x0, 0xdc, 0x0, 0x0, 0x0, 0x7fffffff}, @map_val={0x18, 0x1, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x3}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x7}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}, @func={0x85, 0x0, 0x1, 0x0, 0x6}], &(0x7f0000000000)='GPL\x00', 0x4, 0x0, 0x0, 0x41100, 0xa, '\x00', 0x0, 0x25, r0, 0x8, &(0x7f0000000180)={0xa, 0x2}, 0x8, 0x10, &(0x7f00000001c0)={0x2, 0x10, 0x5d54, 0x9}, 0x10, 0x0, 0x0, 0x3, &(0x7f0000000400)=[r0, r1, r2, r4], &(0x7f0000000440)=[{0x2, 0x4, 0x8, 0xc}, {0x4, 0x3, 0xe, 0x1}, {0x2, 0x3, 0xb, 0xa}], 0x10, 0x8001}, 0x90) (async)
read$qrtrtun(r0, &(0x7f00000000c0)=""/156, 0x9c) (async)
03:50:52 executing program 4:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000001100)={r0}, 0x8)
read$qrtrtun(r1, &(0x7f00000000c0)=""/4096, 0x1000)
r2 = getpid()
r3 = syz_open_procfs(r2, &(0x7f00000010c0)='net/l2cap\x00')
socket$isdn_base(0x22, 0x3, 0x0)
pipe2$watch_queue(&(0x7f0000001140), 0x80)
r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r4, 0x0, 0xcf, 0x0, 0x0)
setsockopt$MRT_ASSERT(r4, 0x0, 0xcf, 0x0, 0x0)
write$qrtrtun(r3, &(0x7f0000000000)="f6763f4e8d260726256e830a54864b58f3a689c5d27a320e4e94f3ed4b0ee919879eba420328ba96c5931bf178a270af662de4b7cce6b7d8678da7dddd0c51f45bbab2ef1a329303406d37a8d751797558501877453ce0ea49b40f4a849747244cda2787ca17e902e41df41109526097e366ae960e397c66741114f359cf698836", 0x81)
03:50:52 executing program 2:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:52 executing program 3:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst={0x6}], &(0x7f0000001340)='GPL\x00'}, 0x90)
03:50:52 executing program 2:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:52 executing program 1:
syz_io_uring_setup(0x54e2, &(0x7f0000000000)={0x0, 0xd0f3, 0x800, 0x1, 0x267}, &(0x7f0000000080), &(0x7f00000010c0)=0x0)
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r1, 0x0, 0xcf, 0x0, 0x0)
syz_io_uring_submit(0x0, r0, &(0x7f0000001100)=@IORING_OP_FALLOCATE={0x11, 0x45, 0x0, @fd=r1, 0x5, 0x0, 0x20, 0x0, 0x1})
r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r2, &(0x7f00000000c0)=""/4096, 0x1000)
syz_io_uring_setup(0x54e2, &(0x7f0000000000)={0x0, 0xd0f3, 0x800, 0x1, 0x267}, &(0x7f0000000080), &(0x7f00000010c0)) (async)
syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00') (async)
setsockopt$MRT_ASSERT(r1, 0x0, 0xcf, 0x0, 0x0) (async)
syz_io_uring_submit(0x0, r0, &(0x7f0000001100)=@IORING_OP_FALLOCATE={0x11, 0x45, 0x0, @fd=r1, 0x5, 0x0, 0x20, 0x0, 0x1}) (async)
syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00') (async)
read$qrtrtun(r2, &(0x7f00000000c0)=""/4096, 0x1000) (async)
03:50:52 executing program 0:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f0000000040))
syz_io_uring_submit(0x0, 0x0, &(0x7f0000000000)=@IORING_OP_SYNC_FILE_RANGE={0x8, 0x11, 0x0, @fd=r0, 0x5, 0x0, 0x7fff, 0x3})
03:50:52 executing program 4:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000001100)={r0}, 0x8)
read$qrtrtun(r1, &(0x7f00000000c0)=""/4096, 0x1000) (async)
r2 = getpid()
r3 = syz_open_procfs(r2, &(0x7f00000010c0)='net/l2cap\x00') (async)
socket$isdn_base(0x22, 0x3, 0x0) (async)
pipe2$watch_queue(&(0x7f0000001140), 0x80) (async)
r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r4, 0x0, 0xcf, 0x0, 0x0)
setsockopt$MRT_ASSERT(r4, 0x0, 0xcf, 0x0, 0x0) (async)
write$qrtrtun(r3, &(0x7f0000000000)="f6763f4e8d260726256e830a54864b58f3a689c5d27a320e4e94f3ed4b0ee919879eba420328ba96c5931bf178a270af662de4b7cce6b7d8678da7dddd0c51f45bbab2ef1a329303406d37a8d751797558501877453ce0ea49b40f4a849747244cda2787ca17e902e41df41109526097e366ae960e397c66741114f359cf698836", 0x81)
03:50:52 executing program 5:
r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/protocols\x00')
read$qrtrtun(r0, &(0x7f0000000040)=""/85, 0x55)
read$qrtrtun(r0, &(0x7f00000000c0)=""/156, 0x9c)
sendmsg$NFT_MSG_GETRULE(r0, &(0x7f0000000340)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000180)={&(0x7f0000000240)={0xd0, 0x7, 0xa, 0x101, 0x0, 0x0, {0x3}, [@NFTA_RULE_HANDLE={0xc, 0x3, 0x1, 0x0, 0x4}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_HANDLE={0xc, 0x3, 0x1, 0x0, 0x5}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_RULE_ID={0x8, 0x9, 0x1, 0x0, 0x3}, @NFTA_RULE_USERDATA={0x81, 0x7, 0x1, 0x0, "d11829082360ea6d19f01ed2f4924841194ce2287a3cda7f03d7849cd21108717fcef96a7fe3d88bc1d18b89a27076b9a2acf4a347e97c34ca61af06b1636e19fa68bdd0226d8e2de9e7a9a21e351ab2419656db56abfb280d653a6630e63c978431167a441f814a8db1680868685694cc028b1b0988dfcfe337aa1377"}]}, 0xd0}, 0x1, 0x0, 0x0, 0x24008890}, 0x40040)
03:50:52 executing program 3:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst={0x5}], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:52 executing program 2:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:52 executing program 0:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000) (async)
ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f0000000040)) (async)
syz_io_uring_submit(0x0, 0x0, &(0x7f0000000000)=@IORING_OP_SYNC_FILE_RANGE={0x8, 0x11, 0x0, @fd=r0, 0x5, 0x0, 0x7fff, 0x3})
03:50:52 executing program 4:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000001100)={r0}, 0x8)
read$qrtrtun(r1, &(0x7f00000000c0)=""/4096, 0x1000) (async)
r2 = getpid()
r3 = syz_open_procfs(r2, &(0x7f00000010c0)='net/l2cap\x00')
socket$isdn_base(0x22, 0x3, 0x0) (async)
pipe2$watch_queue(&(0x7f0000001140), 0x80) (async)
r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r4, 0x0, 0xcf, 0x0, 0x0) (async)
setsockopt$MRT_ASSERT(r4, 0x0, 0xcf, 0x0, 0x0) (async)
write$qrtrtun(r3, &(0x7f0000000000)="f6763f4e8d260726256e830a54864b58f3a689c5d27a320e4e94f3ed4b0ee919879eba420328ba96c5931bf178a270af662de4b7cce6b7d8678da7dddd0c51f45bbab2ef1a329303406d37a8d751797558501877453ce0ea49b40f4a849747244cda2787ca17e902e41df41109526097e366ae960e397c66741114f359cf698836", 0x81)
03:50:52 executing program 3:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst={0x5}], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:52 executing program 2:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:52 executing program 1:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
r2 = bpf$ITER_CREATE(0x21, &(0x7f0000001240)={r0}, 0x8)
sendmsg$IPCTNL_MSG_TIMEOUT_GET(r2, &(0x7f0000001400)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000013c0)={&(0x7f0000001300)={0x8c, 0x1, 0x8, 0x301, 0x0, 0x0, {0x5, 0x0, 0x6}, [@CTA_TIMEOUT_DATA={0x2c, 0x4, 0x0, 0x1, @udp=[@CTA_TIMEOUT_UDP_UNREPLIED={0x8, 0x1, 0x1, 0x0, 0x2}, @CTA_TIMEOUT_UDP_REPLIED={0x8, 0x2, 0x1, 0x0, 0xee}, @CTA_TIMEOUT_UDP_UNREPLIED={0x8, 0x1, 0x1, 0x0, 0x1}, @CTA_TIMEOUT_UDP_REPLIED={0x8, 0x2, 0x1, 0x0, 0x200}, @CTA_TIMEOUT_UDP_REPLIED={0x8, 0x2, 0x1, 0x0, 0x1}]}, @CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x21}, @CTA_TIMEOUT_L3PROTO={0x6, 0x2, 0x1, 0x0, 0x6}, @CTA_TIMEOUT_DATA={0x3c, 0x4, 0x0, 0x1, @udp=[@CTA_TIMEOUT_UDP_REPLIED={0x8, 0x2, 0x1, 0x0, 0xffff}, @CTA_TIMEOUT_UDP_REPLIED={0x8, 0x2, 0x1, 0x0, 0x1}, @CTA_TIMEOUT_UDP_UNREPLIED={0x8}, @CTA_TIMEOUT_UDP_UNREPLIED={0x8}, @CTA_TIMEOUT_UDP_UNREPLIED={0x8, 0x1, 0x1, 0x0, 0x4}, @CTA_TIMEOUT_UDP_UNREPLIED={0x8, 0x1, 0x1, 0x0, 0x8000}, @CTA_TIMEOUT_UDP_REPLIED={0x8, 0x2, 0x1, 0x0, 0x81}]}]}, 0x8c}, 0x1, 0x0, 0x0, 0x80}, 0x40080)
ioctl$BLKREPORTZONE(r0, 0xc0101282, &(0x7f00000010c0)={0x71, 0x3, 0x0, [{0x5, 0xfffffffffffff197, 0x6, 0x3, 0x9, 0x5, 0x3f, '\x00', 0x49}, {0x4, 0x3ff, 0x8, 0x1, 0xd6, 0x1, 0x3, '\x00', 0x1}, {0x1f7b, 0xdc41, 0x5, 0x7, 0x2, 0x1, 0x1, '\x00', 0xffffffffffffffff}]})
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r1, 0xc018937b, &(0x7f0000000040)={{0x1, 0x1, 0x18, r1, {0xffffffffffffffff, 0xee01}}, './file0\x00'})
r4 = getpid()
r5 = getpid()
write$P9_RWRITE(r1, &(0x7f0000001200)={0xb, 0x77, 0x2, 0x7}, 0xb)
r6 = getpid()
kcmp$KCMP_EPOLL_TFD(r6, r5, 0x7, 0xffffffffffffffff, &(0x7f0000001840))
r7 = socket$isdn_base(0x22, 0x3, 0x0)
socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff})
kcmp$KCMP_EPOLL_TFD(r4, r5, 0x7, r7, &(0x7f00000011c0)={r1, r8, 0x5b9c})
setsockopt$MRT_ASSERT(r3, 0x0, 0xcf, 0x0, 0x0)
ioctl$BLKBSZGET(r1, 0x80081270, &(0x7f0000000000))
03:50:52 executing program 5:
r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/protocols\x00')
read$qrtrtun(r0, &(0x7f0000000040)=""/85, 0x55)
read$qrtrtun(r0, &(0x7f00000000c0)=""/156, 0x9c)
sendmsg$NFT_MSG_GETRULE(r0, &(0x7f0000000340)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000180)={&(0x7f0000000240)={0xd0, 0x7, 0xa, 0x101, 0x0, 0x0, {0x3}, [@NFTA_RULE_HANDLE={0xc, 0x3, 0x1, 0x0, 0x4}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_HANDLE={0xc, 0x3, 0x1, 0x0, 0x5}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_RULE_ID={0x8, 0x9, 0x1, 0x0, 0x3}, @NFTA_RULE_USERDATA={0x81, 0x7, 0x1, 0x0, "d11829082360ea6d19f01ed2f4924841194ce2287a3cda7f03d7849cd21108717fcef96a7fe3d88bc1d18b89a27076b9a2acf4a347e97c34ca61af06b1636e19fa68bdd0226d8e2de9e7a9a21e351ab2419656db56abfb280d653a6630e63c978431167a441f814a8db1680868685694cc028b1b0988dfcfe337aa1377"}]}, 0xd0}, 0x1, 0x0, 0x0, 0x24008890}, 0x40040)
syz_open_procfs(0x0, &(0x7f0000000200)='net/protocols\x00') (async)
read$qrtrtun(r0, &(0x7f0000000040)=""/85, 0x55) (async)
read$qrtrtun(r0, &(0x7f00000000c0)=""/156, 0x9c) (async)
sendmsg$NFT_MSG_GETRULE(r0, &(0x7f0000000340)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000180)={&(0x7f0000000240)={0xd0, 0x7, 0xa, 0x101, 0x0, 0x0, {0x3}, [@NFTA_RULE_HANDLE={0xc, 0x3, 0x1, 0x0, 0x4}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_HANDLE={0xc, 0x3, 0x1, 0x0, 0x5}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_RULE_ID={0x8, 0x9, 0x1, 0x0, 0x3}, @NFTA_RULE_USERDATA={0x81, 0x7, 0x1, 0x0, "d11829082360ea6d19f01ed2f4924841194ce2287a3cda7f03d7849cd21108717fcef96a7fe3d88bc1d18b89a27076b9a2acf4a347e97c34ca61af06b1636e19fa68bdd0226d8e2de9e7a9a21e351ab2419656db56abfb280d653a6630e63c978431167a441f814a8db1680868685694cc028b1b0988dfcfe337aa1377"}]}, 0xd0}, 0x1, 0x0, 0x0, 0x24008890}, 0x40040) (async)
03:50:52 executing program 4:
pipe2$watch_queue(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80)
write$P9_RRENAME(r0, &(0x7f0000000080)={0x7, 0x15, 0x202}, 0x7)
syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
03:50:52 executing program 0:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f0000000040))
syz_io_uring_submit(0x0, 0x0, &(0x7f0000000000)=@IORING_OP_SYNC_FILE_RANGE={0x8, 0x11, 0x0, @fd=r0, 0x5, 0x0, 0x7fff, 0x3})
03:50:52 executing program 3:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst={0x5}], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:52 executing program 2:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:52 executing program 1:
syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00') (async)
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000) (async)
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
r2 = bpf$ITER_CREATE(0x21, &(0x7f0000001240)={r0}, 0x8)
sendmsg$IPCTNL_MSG_TIMEOUT_GET(r2, &(0x7f0000001400)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000013c0)={&(0x7f0000001300)={0x8c, 0x1, 0x8, 0x301, 0x0, 0x0, {0x5, 0x0, 0x6}, [@CTA_TIMEOUT_DATA={0x2c, 0x4, 0x0, 0x1, @udp=[@CTA_TIMEOUT_UDP_UNREPLIED={0x8, 0x1, 0x1, 0x0, 0x2}, @CTA_TIMEOUT_UDP_REPLIED={0x8, 0x2, 0x1, 0x0, 0xee}, @CTA_TIMEOUT_UDP_UNREPLIED={0x8, 0x1, 0x1, 0x0, 0x1}, @CTA_TIMEOUT_UDP_REPLIED={0x8, 0x2, 0x1, 0x0, 0x200}, @CTA_TIMEOUT_UDP_REPLIED={0x8, 0x2, 0x1, 0x0, 0x1}]}, @CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x21}, @CTA_TIMEOUT_L3PROTO={0x6, 0x2, 0x1, 0x0, 0x6}, @CTA_TIMEOUT_DATA={0x3c, 0x4, 0x0, 0x1, @udp=[@CTA_TIMEOUT_UDP_REPLIED={0x8, 0x2, 0x1, 0x0, 0xffff}, @CTA_TIMEOUT_UDP_REPLIED={0x8, 0x2, 0x1, 0x0, 0x1}, @CTA_TIMEOUT_UDP_UNREPLIED={0x8}, @CTA_TIMEOUT_UDP_UNREPLIED={0x8}, @CTA_TIMEOUT_UDP_UNREPLIED={0x8, 0x1, 0x1, 0x0, 0x4}, @CTA_TIMEOUT_UDP_UNREPLIED={0x8, 0x1, 0x1, 0x0, 0x8000}, @CTA_TIMEOUT_UDP_REPLIED={0x8, 0x2, 0x1, 0x0, 0x81}]}]}, 0x8c}, 0x1, 0x0, 0x0, 0x80}, 0x40080)
ioctl$BLKREPORTZONE(r0, 0xc0101282, &(0x7f00000010c0)={0x71, 0x3, 0x0, [{0x5, 0xfffffffffffff197, 0x6, 0x3, 0x9, 0x5, 0x3f, '\x00', 0x49}, {0x4, 0x3ff, 0x8, 0x1, 0xd6, 0x1, 0x3, '\x00', 0x1}, {0x1f7b, 0xdc41, 0x5, 0x7, 0x2, 0x1, 0x1, '\x00', 0xffffffffffffffff}]})
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r1, 0xc018937b, &(0x7f0000000040)={{0x1, 0x1, 0x18, r1, {0xffffffffffffffff, 0xee01}}, './file0\x00'})
r4 = getpid()
getpid() (async)
r5 = getpid()
write$P9_RWRITE(r1, &(0x7f0000001200)={0xb, 0x77, 0x2, 0x7}, 0xb)
r6 = getpid()
kcmp$KCMP_EPOLL_TFD(r6, r5, 0x7, 0xffffffffffffffff, &(0x7f0000001840)) (async)
kcmp$KCMP_EPOLL_TFD(r6, r5, 0x7, 0xffffffffffffffff, &(0x7f0000001840))
r7 = socket$isdn_base(0x22, 0x3, 0x0)
socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) (async)
socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff})
kcmp$KCMP_EPOLL_TFD(r4, r5, 0x7, r7, &(0x7f00000011c0)={r1, r8, 0x5b9c})
setsockopt$MRT_ASSERT(r3, 0x0, 0xcf, 0x0, 0x0)
ioctl$BLKBSZGET(r1, 0x80081270, &(0x7f0000000000))
03:50:52 executing program 4:
pipe2$watch_queue(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80)
write$P9_RRENAME(r0, &(0x7f0000000080)={0x7, 0x15, 0x202}, 0x7)
syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
pipe2$watch_queue(&(0x7f0000000000), 0x80) (async)
write$P9_RRENAME(r0, &(0x7f0000000080)={0x7, 0x15, 0x202}, 0x7) (async)
syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00') (async)
03:50:52 executing program 5:
r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/protocols\x00')
read$qrtrtun(r0, &(0x7f0000000040)=""/85, 0x55)
read$qrtrtun(r0, &(0x7f00000000c0)=""/156, 0x9c) (async, rerun: 64)
sendmsg$NFT_MSG_GETRULE(r0, &(0x7f0000000340)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000180)={&(0x7f0000000240)={0xd0, 0x7, 0xa, 0x101, 0x0, 0x0, {0x3}, [@NFTA_RULE_HANDLE={0xc, 0x3, 0x1, 0x0, 0x4}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_HANDLE={0xc, 0x3, 0x1, 0x0, 0x5}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_RULE_ID={0x8, 0x9, 0x1, 0x0, 0x3}, @NFTA_RULE_USERDATA={0x81, 0x7, 0x1, 0x0, "d11829082360ea6d19f01ed2f4924841194ce2287a3cda7f03d7849cd21108717fcef96a7fe3d88bc1d18b89a27076b9a2acf4a347e97c34ca61af06b1636e19fa68bdd0226d8e2de9e7a9a21e351ab2419656db56abfb280d653a6630e63c978431167a441f814a8db1680868685694cc028b1b0988dfcfe337aa1377"}]}, 0xd0}, 0x1, 0x0, 0x0, 0x24008890}, 0x40040) (rerun: 64)
03:50:52 executing program 3:
bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0)
03:50:52 executing program 0:
sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000040)={&(0x7f00000012c0)={{0x14}, [@NFT_MSG_NEWSETELEM={0x2dfc, 0xc, 0xa, 0x801, 0x0, 0x0, {0x0, 0x0, 0x9}, [@NFTA_SET_ELEM_LIST_SET_ID={0x8, 0x4, 0x1, 0x0, 0x3}, @NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz0\x00'}, @NFTA_SET_ELEM_LIST_ELEMENTS={0x2dc0, 0x3, 0x0, 0x1, [{0x110, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_EXPR={0x4}, @NFTA_SET_ELEM_EXPRESSIONS={0x38, 0xb, 0x0, 0x1, [{0x34, 0x1, 0x0, 0x1, @tproxy={{0xb}, @val={0x24, 0x2, 0x0, 0x1, [@NFTA_TPROXY_REG_PORT={0x8, 0x3, 0x1, 0x0, 0x8}, @NFTA_TPROXY_REG_PORT={0x8, 0x3, 0x1, 0x0, 0xc}, @NFTA_TPROXY_REG_PORT={0x8, 0x3, 0x1, 0x0, 0x17}, @NFTA_TPROXY_FAMILY={0x8, 0x1, 0x1, 0x0, 0x2}]}}}]}, @NFTA_SET_ELEM_EXPRESSIONS={0xd0, 0xb, 0x0, 0x1, [{0x2c, 0x1, 0x0, 0x1, @target={{0xb}, @val={0x1c, 0x2, 0x0, 0x1, [@NFTA_TARGET_REV={0x8, 0x2, 0x1, 0x0, 0x4}, @NFTA_TARGET_REV={0x8, 0x2, 0x1, 0x0, 0x80}, @NFTA_TARGET_REV={0x8, 0x2, 0x1, 0x0, 0x3f}]}}}, {0xa0, 0x1, 0x0, 0x1, @immediate={{0xe}, @val={0x8c, 0x2, 0x0, 0x1, [@NFTA_IMMEDIATE_DREG={0x8, 0x1, 0x1, 0x0, 0xf}, @NFTA_IMMEDIATE_DREG={0x8, 0x1, 0x1, 0x0, 0x17}, @NFTA_IMMEDIATE_DATA={0x78, 0x2, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x14, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}, @NFTA_VERDICT_CHAIN_ID={0x8, 0x3, 0x1, 0x0, 0x8}]}, @NFTA_DATA_VERDICT={0x10, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}]}, @NFTA_DATA_VERDICT={0x24, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}]}, @NFTA_DATA_VERDICT={0x2c, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN_ID={0x8, 0x3, 0x1, 0x0, 0x1}, @NFTA_VERDICT_CHAIN_ID={0x8, 0x3, 0x1, 0x0, 0x4}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}]}]}]}}}]}]}, {0x2574, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_OBJREF={0x9, 0x9, 'syz1\x00'}, @NFTA_SET_ELEM_TIMEOUT={0xc, 0x4, 0x1, 0x0, 0xc000000000000000}, @NFTA_SET_ELEM_FLAGS={0x8}, @NFTA_SET_ELEM_EXPR={0x4}, @NFTA_SET_ELEM_EXPRESSIONS={0xa0, 0xb, 0x0, 0x1, [{0x1c, 0x1, 0x0, 0x1, @log={{0x8}, @val={0x10, 0x2, 0x0, 0x1, [@NFTA_LOG_PREFIX={0xa, 0x2, 0x1, 0x0, 'smaps\x00'}]}}}, {0x10, 0x1, 0x0, 0x1, @objref={{0xb}, @void}}, {0x54, 0x1, 0x0, 0x1, @redir={{0xa}, @val={0x44, 0x2, 0x0, 0x1, [@NFTA_REDIR_REG_PROTO_MIN={0x8, 0x1, 0x1, 0x0, 0xb}, @NFTA_REDIR_REG_PROTO_MIN={0x8, 0x1, 0x1, 0x0, 0xb}, @NFTA_REDIR_REG_PROTO_MIN={0x8, 0x1, 0x1, 0x0, 0x14}, @NFTA_REDIR_REG_PROTO_MIN={0x8, 0x1, 0x1, 0x0, 0x16}, @NFTA_REDIR_FLAGS={0x8, 0x3, 0x1, 0x0, 0x42}, @NFTA_REDIR_FLAGS={0x8, 0x3, 0x1, 0x0, 0x4}, @NFTA_REDIR_REG_PROTO_MAX={0x8, 0x2, 0x1, 0x0, 0x17}, @NFTA_REDIR_REG_PROTO_MAX={0x8, 0x2, 0x1, 0x0, 0x12}]}}}, {0x10, 0x1, 0x0, 0x1, @reject={{0xb}, @void}}, {0xc, 0x1, 0x0, 0x1, @ct={{0x7}, @void}}]}, @NFTA_SET_ELEM_EXPRESSIONS={0x13a8, 0xb, 0x0, 0x1, [{0x1374, 0x1, 0x0, 0x1, @bitwise={{0xc}, @val={0x1364, 0x2, 0x0, 0x1, [@NFTA_BITWISE_MASK={0x8, 0x4, 0x0, 0x1, [@NFTA_DATA_VALUE={0x4}]}, @NFTA_BITWISE_DATA={0x1350, 0x7, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x40, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffd}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN_ID={0x8, 0x3, 0x1, 0x0, 0x8}, @NFTA_VERDICT_CHAIN_ID={0x8, 0x3, 0x1, 0x0, 0x3}]}, @NFTA_DATA_VALUE={0xeb, 0x1, "c52f3dac8d3517de643d0d152f1135f58584a48e139f335a1317b28a2bf5e96e5f9c76ccf04e677c0eb23c7a87ba3c1a4550c696d7d4e5963ef1dac62355594f2fe691f3c33b29a7b0637c39cba49fa4a7d0aba21df12e8a29fe8d8dc58c0a5376bf52f1eb397bd705cdc42e34ff995bec192f19636cb22740e6822a9a584d36def515d017aeb1767cb59a22995a34946bd421b8a8103cadd61db300ef8e0b842044a514c1c78979fadc9ca50700aa9cc7135898522c1fd797445fbb94cb4bce5c5aa5b03fc07c6d16f28e2fe96b625fbd419cf469eb4a8097c85dae8d3b78731a8fbacec38823"}, @NFTA_DATA_VALUE={0x61, 0x1, "08f042c227abbae3b711f801af3a20f96e2fb6e4a2a7520132d92087718e471ef3c4649503da492e2016172fa92ea045b12282a0da9cfefe79f9e3f21efbae7a8658162b1561d54f60b03c3eb163f3ec91f0555cf99c408e8c0bceea9b"}, @NFTA_DATA_VERDICT={0x64, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN_ID={0x8, 0x3, 0x1, 0x0, 0xfffff000}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN_ID={0x8, 0x3, 0x1, 0x0, 0x200}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN_ID={0x8, 0x3, 0x1, 0x0, 0x78}, @NFTA_VERDICT_CHAIN_ID={0x8}, @NFTA_VERDICT_CHAIN_ID={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}]}, @NFTA_DATA_VALUE={0x1004, 0x1, "0308e774866aa9ebba875d3c4c980a3709b644a719fe0f08f8efa804d91262b365488382de0b71aed6e76d176a22c040dff87952908402054768e2afdfa7427c6fab4360bb89b9f1aa2d35b608d95c47630dc1a1f2bff788810e2a299a04be20ef2d31cd6a0dd579c942be389f5b0c574777fa2d00f4bb2d21d769753372395f557cfc7a8cb3f8400128dbda912730d4748706886d6440bb764dd47715e70e317b88413e65288e16e86d601d68feb6ad8757dbc3ada7dffb3a0d94e6415feb7a87100485442f72f638aa1d30f16228718268729c7e0849249940188034f09f566d696d590865fa381813092289c628dba0e24edb362c66784c05f3bbcd67e239ad5ac4f84dc7c565922b7b742a4b375e79c35bd960c0e681f0884b8c704c32662322e55e0b85b13648de71d39f315f99925a5d54998dbde72b8b8290b0c45654abb41931fba0c0afdb641be39f6db3c79db3505721821233eb86cadabe0884f90e76655af41edfcf20c56de5bd66508c7c4ad3e20d2a894290bcd0ed220bbe6b148914ee96ec3e3bc5ea3417036eeaad7ae436cb3d15d6b499da929d37991772979b33c06c247638bc2588f4718317c4151e2f93409702af9e59fca73c5bc21a428b3225f1cdbdf62ae43c352bf3826e1b61ad0284bd2955e957a5cbaa77bb3f9d97ca48ecdeb885634ba40b6dc5e1f4b26705aee79570c823b3de2fed4f875079b703bfa3530236ff1d17417152696e9aa48b5437eaec57d038f1e8b42d6e035a495014bb084b755df53580efac744b0de6537673ae60d265a444e2a12ca35b557bcd4d916a295f5ead8d46d346cae06e02e4efc8d609ed9ec2c9db0fab71b7cf8428d7c2cb6ecdba49c31773c9408daf531e7f580326d7bec9ca46f7201ab5d400ccb2ed7ed95f2afed33b0fe34b9d638edba57299f185a4a79a14bf46eb5959bd45f155f70680e2ce919b7794e07a7f583d258063adf746e64f23f82fa407f147eb99a01511cbf15c929b0348b30a923cb83319acfbdfcd945a6fa76552d7ea18dc3ab57cfd2b7dc43136f2db4b2fc7a32037ad2c9a2ed337c3b9f27bf75c7cf3a56bd776ac593683d1472da4fc0fa8557ab067824e3d44930458a15dccf17f9e29cf84aae12501ed68e24add9ef06ccde5ce1c042de5b675766a718e02e1b47b405bdc6ee778e56ec7cea8c907443ea4570479f7e2766552695baeb67f783b32fb32b78d3c9b191a37f327460aea7b2b5d8897a94c5e5606d53363a62f63af94b22904093a6eb62f9c6a7857b9ad103255663fab6605ebad8e84006637f7527dbfd7453349cdeac08b3982730d880da9156774682bf207ada94fa3fb8deff1e5b331446032cdbdb4cc0c8948bc2151c529f8c42a58a187c249b4a7c1b4c893a62b4f1f58e8c0ca02ac5dde9113ccbc20e31a4f8c319706106269cf094de2cafb648c5c236556545b2b353d0a400d7aac87e602d9264ab3332b0ea3efbe3f9ada7a6c7e2579792180c8304c23cce8532ca1ad8dadffca7ca6b91359051c3b883616d2add58990315a80e3305282b549ba2928f14d370a2cc49db41d301a80fb4164fb577b2ee2947c94dbad17241a1cc787321ca3e50dd30a03eb20954a6533cc401890e31ea9548c86c4dfd8f13c4a030b25d765db9f12fb113e961cb30f28de7fe6d0690ac4b279f362caca47a6f9376d88ad4f21e790b39b9ae5f32bdd0d3581d732e235e63bcac41d18e3883d420f650b356a38f09788fac42ca4fe90221e7717779e8a829f5bfe5998f25f18566f4b9ee810de8c6864166ca4c9eb6c8a01123912560c146697abd9feb084cd3b0821e5ef091bac3da37f2464e1113254664628fb13a518a645ce2e5756fa517c530e94197a04460e7bef70969efbb6002f67572a8bd87d8eaeddabeea535e4dfa86ec3fe47045dc7f414735f27aeffa9ee25019e9da66d8dfe0bcb581a3fc2d575f1cb7ea6b9727598d535397a08a4b845960bddfdc9e7fb3cec4dc9bf86b732199b5c1dbec9d41ecaf6f853e2b9a5b78a5fe794bfddc10ed9caba079d60f1b380e3f9ddb3e06f171cd4a1184a4382d8f5692415eaeb3a02c7a7c2e1efdda6086bbd19807f418cec11fd28c3484738d2f5396a1570d9ef2033f2731be6510fc37784b6c2dda3752f2edffebfd0eab296164691d232dec84df39e98e0b251f8169f6987a13d4813c10fe74fd48ca075b3ee39654521d7d86009af096d200363f77d5f0a5253b52ddbf0fa76f00b1e8ef8a7a22dec013ace48bbd9cd02a96bb7d7e44ab7e35b22de8df118adb53b8700e04334cbe6649e58b9f329517da03429ac30d527dac5e759a0b80caeba1759d99d50e170f0f720daf33ec9215905635bd05af323b9dcc8458eb44f4653e6fa0eee49eb4832a74efa2f9fae264ad697035fe1b35034cbc90a85ab8ee7ea221e5c32187b3a750b9574ecabf782b93d645f49602786c8faf7be4505b3c8582c54117348834efd9f29951873d6dd00b484923bdd1a11cff110ebea3171888fcef57aed425d5520cda256ee2291a9c90676e4e9039ef4e1f3196e7ce88e838c0b8f5f2d98779c6ad72384de862d00335dc9e38518fa6ed07d126f615bcedcad6bb125826f95d6a9dcd65588d94a92684f2475fd44468b3ecb8ea3335f277e97ed16f6b9ea1e5c0df06f887639ca165d3908c208012824d40210dbfb38178e338fd2898ff259d03b80de8e9f6fe76405b569d52cabe4fbeaf53d2e56e3af5fc054bc638b38b11dae915a57f46b5f3eeb88cadab75c0cea90360416ef43120e4ef9d541f284e251edda3957089076e70129e4f4d224e3f9e12e7e0b0dc2e130fcc2e11da5e06c058491e1f2fb31537c87dee3872b0ea5a10cc67448600f6b29bfba5a3c1d9bc4afd0acb21ec5b4ec7926efc0a9fad03c3a08003cb972c3c4aaf40c894fd95327b4decc2e1c3623aa70726ab298caeab1f81bab630f96dbaef0487a959bd8be820fdfa96c32a253cee9c2ff7a749d072657b44d52058368d809625302ba8b44d518bd1d93db97d1f80730e9e52d952371bf99560331985d889fa2fdafbbb142676d46acda70e5ab4284af36f3ca06effdab23f0adb97f99e5d7702443617dcfd9d1fc25c486e930b1b1082c0c9348d5ef9579d170e8480c18147a7388aa1deb27f34e2f8fbd0a189590ae83228271c7acbd17d534da0f153f31ff5b038245b494d3f10109724ad6e33a365f1db277990425e24cd66fa64b78a66382edd2d01757d8485ac1a3e70f36b5ff57bdb91dd0ebf87a99b637ca549cd69b454cf2c1760bb1469e7529656a457de7586cd3af01daf0aed68b7321eaeb029dc77b25e14e39ae9745417c826cb8afa5cc0dd178f3cf5101ef95576414dc5db8b87968b7fa5c462556a341281512a110d838ebbd2a38b60cd78b10c326548413c04813c50dbfdc96bddbe2b7c55dbbfc6ce034d4abb037eb581b3bcbb388f0f0615c75399cc5a688f9463693c92c4e27949941a5c35a189c8bc9f7e511ae489e1f22c67d6631fd85e859e6211223764e823691ac4610fcf55f0a8af621a7c81f800cb274ca97e73df563d349f77944e76830302e29af7fc92e2f6055f935a48ff2c3a9ea29b6b3b63ca3cbdb0689642f2d5ca42edd01e70f4c71b0e7f91d84aed598af3e0022d9d3b4f0bfc8413b9e0080391e17a470ece0c5a983eb469b423fc97511b41c065e8190c986a5746773e1814ea73487ef45750c8da18bed96786900092a6c3da2a0fdb30d5b0c508d024d78617338f435654761101604ecbf06ae9a28113fe5de17833bf3c2336e96c7eec65812fe7605db87facc71bd66b6a6369207b9f356bb90e1588bbe8f9a9d4bef6bd6fa7c5ff379f4daffca9e6bd28fa22a4e25857bdc1835306660c8dd18de31844cb8e9ef26cb53891af243a9b2c673fd3ee7d313b356a9d0cff03638a656ff124a13a17276bbd8eaafe26d2fcfea682acaadff08fbaba58db5199006aa3ed09b860c7edabf30842724ecd8f31b03d7b8d87a9056d150179e097bc97c8acb08d0570a76ebbd39ae078e00d507733af903037ed2ac7861eee937f459cf80d1a25d7cedaab841e8ab58006fd11e1bcaf5ce531fbe8b6037a036af74b0c1a395cf26ba27fb58361d39b4ebd8afa8272947996b22ea44a67c03bc8b75804a6aa75e1a6dd71319d58ded0eaf15ad1f71348e6aec3a6037259d20c9764fde76155c73446380acc3a7bc7f76afefd26bf8560368d38df5d9a619d0971c27dfb00de368da160c4fbd32e9efc1402a861c612c9e7a9711c5a9cbbd882e6bd2b7a165ae3254311293844a9faec50c9ba4be2897b85c8884af6619ffb51f2142ab997ef77e026c6f715a2098376e849a2a3f4f495ef3620473b0d74518de0d46fffb6969860e4a84c0a053c6b02228009d7145a94c1483ccd40ed3fb2f12dbd8f84f4c5aa3293331a8812b41901e4a8cee8f7310c466066717616cf8254f23dc765b824bf8517381fcc0736f8411e7966ece46516b68d6f8271d3109d12a74b419eb4727a981b882c75a318641ad3f76bb1c8da971d42c21f41978561eb695558a149253b5dc1120c2507c9ba9ad6b023d74ee7f5c7c6fd0bd4e63a56f8dd2bc40606e46cf65dc0c822b3fed7ae1ae20149fb7bb7d90eb55f12dd5b525e38374991de350f2f78c9688cb8453b755a029386e479c403a0e24694e142bf73a839c36420a18028e5605e3a3e00ddab4e9bfae7e282021cd27f1eb4e7255c89ecf4c78431e81cdaaab4cf4997b2bce33d050f0b1c2dd66c5f51d9874f6fc9780125f3844c844bc9728243e4bc9ace6dff54807c739b5856dd73339a32cd1cf4537da9399ce44ac4b738541d691f01f4a3bfbcf915e5a03d0cc04d8ce118a0d8e8db113f8994e22c2724ce3e557e0115f2b49bc8c26402bac008a2e40bb1f7078a299463cee3007edc2d7da350223ae1f266773a5de882208fcd0ab22871dd259221cc4e00abea516a36a28f46c9d5a5b6581646789b6e03b87c75028a743a906562e6b7e4716d5eb68fe6fc7bbc3c4d4f830940b5172bade32edcdae69a41d2ea47f9f4ecabae0a4bbbae8100a93a2a72956072f990d81d51c4cde89bcb1a5f6dcc870bb6291fb37d976af1d37621709c85669da70bcfb65bc71f5c05704593a0588f2565ff43298d889a1e213a5c2a31bb71d61db80a1441bd78b574a7ecb0721a1e286beb7b7f1dd498d5a3c634053e06219e2e22d380e4fe635191baacf2c903af739fbe5684d558ca42b94c1ac368e2a2258a2e663a58e475ab6e087f2ec37239808e7c96a5edea80b5a824c3dba059029ba4cb2960d54d938462e2872d2fb9dc2f6f1d7d9958af9901e910b2fb9f091ea0a3175267b0fca8859fd3dc7ce0f7e6cab8f333898bd4f2181aee9f0e97d124bf928b9eb020c5c18e71ed97959298245275e064ecbfef43d4a4a13518831e1f38ecd27374f7478094bb57a2074636ab6767568725ee29e771d7637925317f1682876df21e68dcba484d35d459a7e62734d2a62b488fb453d79130e59fa643df63af2a02f40bd41d7b60e0bdf463f52fa2779de0ef849fe7b6c642433b4c7d0200ba7e084dee3c89700b005020fa058a53763b0d7e35a4380b144eadda07d81ecb91661aa5e6bed009b282c41bf95c66eea9d5e7d8bcacc922462c666e8353fead2bd6c374292174c382b519275959829f7fef8fd099396afca374e72aececa2e2150f4a8a69962c7a2a89e9abc6b03898459543899c8f3afe0390f9cf218cc0b92ecbadf3822ec"}, @NFTA_DATA_VERDICT={0x4c, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffd}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}]}, @NFTA_DATA_VALUE={0xfa, 0x1, "c8d2402d55a3fa2532c61f60203ee9828270b03e4cca89e5fc925f4797313ecb136dc5bfe441e676c9f4a61d303dfe79038cc1f4d244eafba551e14ab1b3099c47819335fab32a442888381e091a107d378b829ca2175e5592e6cf62c70ecb660a3215f45e1694555004d7b59e25e22870d74cae49fa82e70dd01440ebd05d76b3274a6a3ea398635524dda22ecd888917c6a989755e148b1f72889c6ca572d7af7a0b2436074df0c9afcb75067a03e9c5032a06b942fd323e8e5c6355d428e78d5c2c6abcfac6e023aa8f672cfcd416b1d4f25c5618bee02e47112aded96723ab7d9bebc03dfb86122dc0437d9ff33e839319fb8916"}, @NFTA_DATA_VERDICT={0xc, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}]}]}, @NFTA_BITWISE_OP={0x8, 0x6, 0x1, 0x0, 0x2}]}}}, {0xc, 0x1, 0x0, 0x1, @dup={{0x8}, @void}}, {0x24, 0x1, 0x0, 0x1, @socket={{0xb}, @val={0x14, 0x2, 0x0, 0x1, [@NFTA_SOCKET_KEY={0x8, 0x1, 0x1, 0x0, 0x1}, @NFTA_SOCKET_LEVEL={0x8, 0x3, 0x3a}]}}}]}, @NFTA_SET_ELEM_USERDATA={0x1004, 0x6, 0x1, 0x0, "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"}, @NFTA_SET_ELEM_USERDATA={0xfd, 0x6, 0x1, 0x0, "63873c79c86523413af704de1f62613553fe61919909496fd2ff00347ccf9a2bd6e3ed30899d857af7e9f46a7b2951e58c75323cd76bef7079b17a75be5116fec9db2fa74328adf8835cfef683ff6258b575a210b42fffe78fc2e87a364ac7ad509e8db527edd18103f2fd00bb102b9c82be52c8270698725a017f8d1d138542bec02ec3ce2738b38da96c36394c781329537f287ce906b55d4e8e8ab9a4db05b67fbb9aaa4035e03bfbcab0a755c5e2d5dff571266e0199b7f08d6c5406e1845e4ce865b6530387ecf22f6cdda40c0ecab9251c3b5d62a6beb3b6adbcd911fd851f731754cc4b2a42f16e00cb8a49cffc0853c46ecc44de3a"}]}, {0x730, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_EXPRESSIONS={0xc4, 0xb, 0x0, 0x1, [{0xc, 0x1, 0x0, 0x1, @fib={{0x8}, @void}}, {0x34, 0x1, 0x0, 0x1, @tunnel={{0xb}, @val={0x24, 0x2, 0x0, 0x1, [@NFTA_TUNNEL_DREG={0x8, 0x2, 0x1, 0x0, 0xe}, @NFTA_TUNNEL_KEY={0x8, 0x1, 0x1, 0x0, 0x1}, @NFTA_TUNNEL_KEY={0x8}, @NFTA_TUNNEL_KEY={0x8}]}}}, {0x2c, 0x1, 0x0, 0x1, @exthdr={{0xb}, @val={0x1c, 0x2, 0x0, 0x1, [@NFTA_EXTHDR_OFFSET={0x8, 0x3, 0x1, 0x0, 0xf3}, @NFTA_EXTHDR_OFFSET={0x8, 0x3, 0x1, 0x0, 0xd1}, @NFTA_EXTHDR_DREG={0x8, 0x1, 0x1, 0x0, 0x2}]}}}, {0x44, 0x1, 0x0, 0x1, @objref={{0xb}, @val={0x34, 0x2, 0x0, 0x1, [@NFTA_OBJREF_SET_ID={0x8, 0x5, 0x1, 0x0, 0x1}, @NFTA_OBJREF_IMM_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_OBJREF_SET_ID={0x8, 0x5, 0x1, 0x0, 0x1}, @NFTA_OBJREF_SET_NAME={0x9, 0x4, 'syz0\x00'}, @NFTA_OBJREF_SET_SREG={0x8, 0x3, 0x1, 0x0, 0x12}]}}}, {0x10, 0x1, 0x0, 0x1, @objref={{0xb}, @void}}]}, @NFTA_SET_ELEM_KEY_END={0x350, 0xa, 0x0, 0x1, [@NFTA_DATA_VALUE={0xde, 0x1, "d4a87c8c17e8c4af912330afb8a06d89594ec43d53c205a109fa11a54d7fd42f116485f89d309ac6076a99b062c4ddb1a197d1383a69462b0fe6e72dd268c92962be46a9a5715c1eef464610b3d2df0285a2e306f201708c1d16d2358b7374ca59a8de8dcf1f6fb8d5480604daa2535f7246ecfde1b55882c21810d1d6eb7c983b0b881b80bac3ac9c0d29977b976829631f523a1309b76ce87292630660064b10d66e958e5dc0f09b00b50094c28ae34793ba0fa41552ab8c5c8f8e1fd579a8541f1cb43e65dddb73875e611ff2322b034f50662562f0756d6e"}, @NFTA_DATA_VALUE={0xbd, 0x1, "1e4b36a5c97a650e19a9f290411b3077bbbeb770c9e5894e4d64c3ecc5bc5ad299a4d0bfbf7fc4c26724f7f1e0b6302f688ad0695e99ecb6ac92de41da55222bdc2276cad6c61c06219717252b903e945dd533ad3151be44333ea4e62975ee3130c914bb3ef0c795b999a08c08d81f49e5fc6986de85ad57e99fed9bd696a7bef7f7c951078bb8611a8a6ad8160fd2c1b3bf5e3191560b62e84126aa10e96d0c848f824a5f87730c396fd5eae2d4709c0c535f5567abfdb41b"}, @NFTA_DATA_VERDICT={0x4c, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffd}, @NFTA_VERDICT_CHAIN_ID={0x8, 0x3, 0x1, 0x0, 0x1}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN_ID={0x8, 0x3, 0x1, 0x0, 0x1}, @NFTA_VERDICT_CHAIN_ID={0x8, 0x3, 0x1, 0x0, 0x4}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}]}, @NFTA_DATA_VALUE={0xa6, 0x1, "febf8d6c97adad06e32ee71eaf920c586ca7a40f2385b600c14f83bab79e264a6a653f8b897c6d07bf7a2264126fafe7554499c5ca9bf217a4f9a9be4c28cc4ff6302ab963e912f0e4b7e9972e1e41318a16fb7fb63365503a5fc2348cc71c5408a5f01fb323a02c8420a1088b866c814cc089acf03e6f715660b2a96d99b3f4f26188816fa2343f7b194ea53c4420010dbb351c140c2dc25b2c30b858eb3fe42538"}, @NFTA_DATA_VALUE={0x17, 0x1, "cd82f2886fee9a0ea456c7bdb4a6b383f2209d"}, @NFTA_DATA_VALUE={0x5f, 0x1, "52fd05c7c3c9ecfa61ad8c87c14c19135f2e801fef7f6210bfb032372e191be1fdc5942c85325d366c59e984f182cecec46d66222e1a7a156393549e570ac53f08f65a593eddc7b9ac4324886e537dc250f9a0764f1a96787592ed"}, @NFTA_DATA_VERDICT={0x14, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN_ID={0x8, 0x3, 0x1, 0x0, 0x1}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffd}]}, @NFTA_DATA_VALUE={0x2c, 0x1, "f9644e0842398b17040671f9d72ba877659e035ac8b17f54cf9f46974f1b535e7f5f8deb9135a8d8"}]}, @NFTA_SET_ELEM_OBJREF={0x9, 0x9, 'syz2\x00'}, @NFTA_SET_ELEM_KEY={0x10, 0x1, 0x0, 0x1, [@NFTA_DATA_VERDICT={0xc, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN_ID={0x8, 0x3, 0x1, 0x0, 0x4}]}]}, @NFTA_SET_ELEM_EXPRESSIONS={0x78, 0xb, 0x0, 0x1, [{0x10, 0x1, 0x0, 0x1, @masq={{0x9}, @void}}, {0x10, 0x1, 0x0, 0x1, @notrack={{0xc}, @void}}, {0x10, 0x1, 0x0, 0x1, @target={{0xb}, @void}}, {0x24, 0x1, 0x0, 0x1, @hash={{0x9}, @val={0x14, 0x2, 0x0, 0x1, [@NFTA_HASH_LEN={0x8, 0x3, 0x1, 0x0, 0x35}, @NFTA_HASH_SREG={0x8, 0x1, 0x1, 0x0, 0x8}]}}}, {0x20, 0x1, 0x0, 0x1, @immediate={{0xe}, @val={0xc, 0x2, 0x0, 0x1, [@NFTA_IMMEDIATE_DREG={0x8, 0x1, 0x1, 0x0, 0x12}]}}}]}, @NFTA_SET_ELEM_USERDATA={0x88, 0x6, 0x1, 0x0, "222f7f4410dcb1360bd85199ec7b97c6420af0ccdb402e57ea38e71b9f5c1769d3f2fe065e500ecdee963a54eaea4d76290ff317199f5d5d0557f2f8649261246e1cdecfa5506f7893ba4907101f394c3c40effd55f4e852adf5d1dca70f59ed3ad8c958dd62924b7b58d97bbbe202e2b4c3bf97dee01074085753f91147f560f2cb2252"}, @NFTA_SET_ELEM_EXPRESSIONS={0x80, 0xb, 0x0, 0x1, [{0x14, 0x1, 0x0, 0x1, @notrack={{0xc}, @val={0x4, 0x2, 0x0, 0x1, ["", "", ""]}}}, {0x10, 0x1, 0x0, 0x1, @counter={{0xc}, @void}}, {0x14, 0x1, 0x0, 0x1, @immediate={{0xe}, @void}}, {0x44, 0x1, 0x0, 0x1, @lookup={{0xb}, @val={0x34, 0x2, 0x0, 0x1, [@NFTA_LOOKUP_SET={0x9, 0x1, 'syz2\x00'}, @NFTA_LOOKUP_SET={0x9, 0x1, 'syz0\x00'}, @NFTA_LOOKUP_SREG={0x8, 0x2, 0x1, 0x0, 0x11}, @NFTA_LOOKUP_DREG={0x8, 0x3, 0x1, 0x0, 0x9}, @NFTA_LOOKUP_FLAGS={0x8, 0x5, 0x1, 0x0, 0x1}]}}}]}, @NFTA_SET_ELEM_KEY={0x174, 0x1, 0x0, 0x1, [@NFTA_DATA_VALUE={0x41, 0x1, "1a3f3467e7455846487ebfb496ccda8d3ac842308d0045f8c542389bacc61d33f0b281ee1505933c9183074cb49d91e486576d01a25d250dc374a2192d"}, @NFTA_DATA_VERDICT={0xc, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN_ID={0x8, 0x3, 0x1, 0x0, 0x2a0000}]}, @NFTA_DATA_VALUE={0x39, 0x1, "f12fd4d18e68121c59c6c052717a565cd0fa1b8815d7e053084900f8dddebda6971d4ac9b57996d3efde4f37a139bf89fe9fd53a6a"}, @NFTA_DATA_VERDICT={0x44, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN_ID={0x8, 0x3, 0x1, 0x0, 0x2}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN_ID={0x8, 0x3, 0x1, 0x0, 0x80000000}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}]}, @NFTA_DATA_VERDICT={0xc, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN_ID={0x8, 0x3, 0x1, 0x0, 0x3ff}]}, @NFTA_DATA_VALUE={0x91, 0x1, "06e4f897822facabca844c2631209d0dbcd0e4fc5881c67b7a9d20f79b633cff4857657cd67fddde3c7e5a3fd9fc7105890bab92b646f483e020629db90850e6a9114060a4d7a185ef2604889a383f53118750dbf65586f42017797c86321ea96eea7c8ab2f3589d2606aee2e37639da5c6e2cbb3eb00f36c0222d1314180bb31442f22e9a3b81d0d357964117"}]}, @NFTA_SET_ELEM_FLAGS={0x8}]}, {0x8, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_EXPR={0x4}]}]}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_ELEM_LIST_SET_ID={0x8, 0x4, 0x1, 0x0, 0x2}]}, @NFT_MSG_DELSET={0x28, 0xb, 0xa, 0x201, 0x0, 0x0, {0x3, 0x0, 0x4}, [@NFTA_SET_HANDLE={0xc, 0x10, 0x1, 0x0, 0x5}, @NFTA_SET_ID={0x8, 0xa, 0x1, 0x0, 0x2}]}, @NFT_MSG_DELRULE={0x13f0, 0x8, 0xa, 0x204, 0x0, 0x0, {0x7, 0x0, 0x4}, [@NFTA_RULE_USERDATA={0xbd, 0x7, 0x1, 0x0, "9f65465596b19f8bfb883f628bb9b913f560db725bf2762070693164a62e8db02fad738693f96345c36da20d795293f69cee1cb04593e89d31b4a6abbdc46b5590b283edc5c3ecbf1dcaa6c89d8f253f108df0143a40e0b04cc52b33537314c48f2377a33411c8f59ee172bb5f54e6838979ffe8c990a0f9514dc2e3c53cc17071d92b43de06fd3d6d487bff500b5a8b71ee4ed24eab61915f8448f3018bc7a54d1502657227084f3a166a8027cb4dbaf57a9a74998449e6c1"}, @NFTA_RULE_EXPRESSIONS={0x131c, 0x4, 0x0, 0x1, [{0x28, 0x1, 0x0, 0x1, @rt={{0x7}, @val={0x1c, 0x2, 0x0, 0x1, [@NFTA_RT_KEY={0x8}, @NFTA_RT_DREG={0x8, 0x1, 0x1, 0x0, 0xc}, @NFTA_RT_KEY={0x8, 0x2, 0x1, 0x0, 0x2}]}}}, {0x10, 0x1, 0x0, 0x1, @match={{0xa}, @void}}, {0x10, 0x1, 0x0, 0x1, @tunnel={{0xb}, @void}}, {0x1c, 0x1, 0x0, 0x1, @lookup={{0xb}, @val={0xc, 0x2, 0x0, 0x1, [@NFTA_LOOKUP_SREG={0x8, 0x2, 0x1, 0x0, 0x12}]}}}, {0x10, 0x1, 0x0, 0x1, @masq={{0x9}, @void}}, {0x10, 0x1, 0x0, 0x1, @reject={{0xb}, @void}}, {0x126c, 0x1, 0x0, 0x1, @target={{0xb}, @val={0x125c, 0x2, 0x0, 0x1, [@NFTA_TARGET_REV={0x8, 0x2, 0x1, 0x0, 0x3}, @NFTA_TARGET_INFO={0x1004, 0x3, "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"}, @NFTA_TARGET_INFO={0xb5, 0x3, "3f25542ac739307423809f6503ac6d4656304c04e3522afe03e5e9cd9e7e9bb3b03932cc64021daa36b8d71d312226cdf8b44bf0c97487f139b37f44de00fab5f2e7c6dfb64cf0086207af1eef745924cbafae28824ebaf3c6af4f70ac5a3cb97542d31bb037f3bdbe9496273963f13b272e2eee0f090a5f6680646ef30eaceaf499435ec2d15f93f49d9df8f06d3f7251dcfdb64cd655e6cdd50ddeec5828da4098bdfe75b9255df171406962043aad7b"}, @NFTA_TARGET_REV={0x8, 0x2, 0x1, 0x0, 0x1b}, @NFTA_TARGET_NAME={0xa, 0x1, 'smaps\x00'}, @NFTA_TARGET_INFO={0xe7, 0x3, "6c3da194c4240ccb58cf7391f223497e86f5ae67f4fd416bee585b189f5cff52c6841dfe8af0b938401f9aa73b2e5b437b2f5f3e038137b411cfb60afbbe5f4f4c92d7b66fbf724ebf32e9469d8d7b38052f317e526b9aa43a3f51b52627da13a03000da7c6e7a297614ab75b3dd7b390402fe601adc70d9dbe7d05dc46b923cbd45fb891dfcf4c51399567b5ecf6cb2be05b9caa927099a820d68feb5d72452ed889f8fb9b8ec12cc673c9462418d679de0c45aeb95a646440785ccf4f765af77b6b6a15e74a4f4617794ba15b38ed7c3c627aecdd786dd834a88691108cb58d58f2a"}, @NFTA_TARGET_INFO={0x96, 0x3, "4d01eff73fa4ba6edfa8eceea5f0b41e0aabd8fc193f11cd78d85e03ff93a26d40ffb0e384bbe8fdc8936df1c89a58f14d49cedacd3c14862fe21cd99f3d251755bedaf78fbbf624e38e49a8ec07d07a2f711dba1f5cc9a56cae61de814a7488a6c35c36b1d57dd7a78d310c529f8434e4cc72b26b8e8480e6c00c13474ee1caf548934c73219ade5316908b3b46834f4fe5"}]}}}, {0x28, 0x1, 0x0, 0x1, @dup_ipv6={{0x8}, @val={0x1c, 0x2, 0x0, 0x1, [@NFTA_DUP_SREG_ADDR={0x8, 0x1, 0x1, 0x0, 0x45d5c5aad9c0d2c6}, @NFTA_DUP_SREG_ADDR={0x8, 0x1, 0x1, 0x0, 0x12}, @NFTA_DUP_SREG_DEV={0x8, 0x2, 0x1, 0x0, 0xe}]}}}]}]}], {0x14}}, 0x423c}, 0x1, 0x0, 0x0, 0x8814}, 0x4000)
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r0, 0x0, 0xcf, 0x0, 0x0)
sendmsg$NFQNL_MSG_VERDICT_BATCH(r0, &(0x7f0000005700)={&(0x7f0000001180)={0x10, 0x0, 0x0, 0x20400}, 0xc, &(0x7f0000001240)={&(0x7f00000011c0)={0x64, 0x3, 0x3, 0x101, 0x0, 0x0, {0xa, 0x0, 0x3}, [@NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0xffffffc0}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x4}, @NFQA_VERDICT_HDR={0xc, 0x2, {0xfffffffffffffffe, 0x7}}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x80000000}, @NFQA_VERDICT_HDR={0xc, 0x2, {0xfffffffffffffffd, 0xff}}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x3}, @NFQA_VERDICT_HDR={0xc, 0x2, {0xfffffffffffffffe, 0x4}}, @NFQA_VERDICT_HDR={0xc, 0x2, {0xfffffffffffffffd, 0x90}}]}, 0x64}, 0x1, 0x0, 0x0, 0x20020082}, 0x4000000)
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r1, &(0x7f00000000c0)=""/4096, 0x1000)
sendmsg$IPCTNL_MSG_EXP_DELETE(r1, &(0x7f0000001140)={&(0x7f00000010c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000001100)={&(0x7f0000005500)={0x1c4, 0x2, 0x2, 0x801, 0x0, 0x0, {0x0, 0x0, 0x5}, [@CTA_EXPECT_MASK={0x64, 0x3, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x11}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8, 0x2, @rand_addr=0x64010102}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @ipv4={'\x00', '\xff\xff', @private=0xa010100}}, {0x14, 0x4, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}]}, @CTA_EXPECT_TUPLE={0x88, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @private1}, {0x14, 0x4, @remote}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @broadcast}, {0x8, 0x2, @broadcast}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x8, 0x2, @rand_addr=0x64010100}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x3a}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x8, 0x2, @loopback}}}]}, @CTA_EXPECT_FN={0x8, 0xb, 'sip\x00'}, @CTA_EXPECT_HELP_NAME={0xf, 0x6, 'netbios-ns\x00'}, @CTA_EXPECT_FN={0xa, 0xb, 'Q.931\x00'}, @CTA_EXPECT_NAT={0x1c, 0xa, 0x0, 0x1, [@CTA_EXPECT_NAT_DIR={0x8}, @CTA_EXPECT_NAT_DIR={0x8, 0x1, 0x1, 0x0, 0x1}, @CTA_EXPECT_NAT_DIR={0x8, 0x1, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_HELP_NAME={0xe, 0x6, 'ftp-20000\x00'}, @CTA_EXPECT_ZONE={0x6, 0x7, 0x1, 0x0, 0x4}, @CTA_EXPECT_FN={0x8, 0xb, 'sip\x00'}, @CTA_EXPECT_TUPLE={0x64, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @ipv4={'\x00', '\xff\xff', @multicast2}}, {0x14, 0x4, @mcast2}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @private2={0xfc, 0x2, '\x00', 0x1}}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}]}]}, 0x1c4}, 0x1, 0x0, 0x0, 0x20000000}, 0x2)
03:50:52 executing program 2:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:52 executing program 4:
pipe2$watch_queue(&(0x7f0000000000), 0x80) (async)
pipe2$watch_queue(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80)
write$P9_RRENAME(r0, &(0x7f0000000080)={0x7, 0x15, 0x202}, 0x7)
syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
03:50:52 executing program 1:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
r2 = bpf$ITER_CREATE(0x21, &(0x7f0000001240)={r0}, 0x8)
sendmsg$IPCTNL_MSG_TIMEOUT_GET(r2, &(0x7f0000001400)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000013c0)={&(0x7f0000001300)={0x8c, 0x1, 0x8, 0x301, 0x0, 0x0, {0x5, 0x0, 0x6}, [@CTA_TIMEOUT_DATA={0x2c, 0x4, 0x0, 0x1, @udp=[@CTA_TIMEOUT_UDP_UNREPLIED={0x8, 0x1, 0x1, 0x0, 0x2}, @CTA_TIMEOUT_UDP_REPLIED={0x8, 0x2, 0x1, 0x0, 0xee}, @CTA_TIMEOUT_UDP_UNREPLIED={0x8, 0x1, 0x1, 0x0, 0x1}, @CTA_TIMEOUT_UDP_REPLIED={0x8, 0x2, 0x1, 0x0, 0x200}, @CTA_TIMEOUT_UDP_REPLIED={0x8, 0x2, 0x1, 0x0, 0x1}]}, @CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x21}, @CTA_TIMEOUT_L3PROTO={0x6, 0x2, 0x1, 0x0, 0x6}, @CTA_TIMEOUT_DATA={0x3c, 0x4, 0x0, 0x1, @udp=[@CTA_TIMEOUT_UDP_REPLIED={0x8, 0x2, 0x1, 0x0, 0xffff}, @CTA_TIMEOUT_UDP_REPLIED={0x8, 0x2, 0x1, 0x0, 0x1}, @CTA_TIMEOUT_UDP_UNREPLIED={0x8}, @CTA_TIMEOUT_UDP_UNREPLIED={0x8}, @CTA_TIMEOUT_UDP_UNREPLIED={0x8, 0x1, 0x1, 0x0, 0x4}, @CTA_TIMEOUT_UDP_UNREPLIED={0x8, 0x1, 0x1, 0x0, 0x8000}, @CTA_TIMEOUT_UDP_REPLIED={0x8, 0x2, 0x1, 0x0, 0x81}]}]}, 0x8c}, 0x1, 0x0, 0x0, 0x80}, 0x40080) (async)
ioctl$BLKREPORTZONE(r0, 0xc0101282, &(0x7f00000010c0)={0x71, 0x3, 0x0, [{0x5, 0xfffffffffffff197, 0x6, 0x3, 0x9, 0x5, 0x3f, '\x00', 0x49}, {0x4, 0x3ff, 0x8, 0x1, 0xd6, 0x1, 0x3, '\x00', 0x1}, {0x1f7b, 0xdc41, 0x5, 0x7, 0x2, 0x1, 0x1, '\x00', 0xffffffffffffffff}]}) (async)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r1, 0xc018937b, &(0x7f0000000040)={{0x1, 0x1, 0x18, r1, {0xffffffffffffffff, 0xee01}}, './file0\x00'})
r4 = getpid() (async)
r5 = getpid()
write$P9_RWRITE(r1, &(0x7f0000001200)={0xb, 0x77, 0x2, 0x7}, 0xb)
r6 = getpid()
kcmp$KCMP_EPOLL_TFD(r6, r5, 0x7, 0xffffffffffffffff, &(0x7f0000001840))
r7 = socket$isdn_base(0x22, 0x3, 0x0)
socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff})
kcmp$KCMP_EPOLL_TFD(r4, r5, 0x7, r7, &(0x7f00000011c0)={r1, r8, 0x5b9c})
setsockopt$MRT_ASSERT(r3, 0x0, 0xcf, 0x0, 0x0) (async)
ioctl$BLKBSZGET(r1, 0x80081270, &(0x7f0000000000))
03:50:52 executing program 0:
sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000040)={&(0x7f00000012c0)={{0x14}, [@NFT_MSG_NEWSETELEM={0x2dfc, 0xc, 0xa, 0x801, 0x0, 0x0, {0x0, 0x0, 0x9}, [@NFTA_SET_ELEM_LIST_SET_ID={0x8, 0x4, 0x1, 0x0, 0x3}, @NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz0\x00'}, @NFTA_SET_ELEM_LIST_ELEMENTS={0x2dc0, 0x3, 0x0, 0x1, [{0x110, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_EXPR={0x4}, @NFTA_SET_ELEM_EXPRESSIONS={0x38, 0xb, 0x0, 0x1, [{0x34, 0x1, 0x0, 0x1, @tproxy={{0xb}, @val={0x24, 0x2, 0x0, 0x1, [@NFTA_TPROXY_REG_PORT={0x8, 0x3, 0x1, 0x0, 0x8}, @NFTA_TPROXY_REG_PORT={0x8, 0x3, 0x1, 0x0, 0xc}, @NFTA_TPROXY_REG_PORT={0x8, 0x3, 0x1, 0x0, 0x17}, @NFTA_TPROXY_FAMILY={0x8, 0x1, 0x1, 0x0, 0x2}]}}}]}, @NFTA_SET_ELEM_EXPRESSIONS={0xd0, 0xb, 0x0, 0x1, [{0x2c, 0x1, 0x0, 0x1, @target={{0xb}, @val={0x1c, 0x2, 0x0, 0x1, [@NFTA_TARGET_REV={0x8, 0x2, 0x1, 0x0, 0x4}, @NFTA_TARGET_REV={0x8, 0x2, 0x1, 0x0, 0x80}, @NFTA_TARGET_REV={0x8, 0x2, 0x1, 0x0, 0x3f}]}}}, {0xa0, 0x1, 0x0, 0x1, @immediate={{0xe}, @val={0x8c, 0x2, 0x0, 0x1, [@NFTA_IMMEDIATE_DREG={0x8, 0x1, 0x1, 0x0, 0xf}, @NFTA_IMMEDIATE_DREG={0x8, 0x1, 0x1, 0x0, 0x17}, @NFTA_IMMEDIATE_DATA={0x78, 0x2, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x14, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}, @NFTA_VERDICT_CHAIN_ID={0x8, 0x3, 0x1, 0x0, 0x8}]}, @NFTA_DATA_VERDICT={0x10, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}]}, @NFTA_DATA_VERDICT={0x24, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}]}, @NFTA_DATA_VERDICT={0x2c, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN_ID={0x8, 0x3, 0x1, 0x0, 0x1}, @NFTA_VERDICT_CHAIN_ID={0x8, 0x3, 0x1, 0x0, 0x4}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}]}]}]}}}]}]}, {0x2574, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_OBJREF={0x9, 0x9, 'syz1\x00'}, @NFTA_SET_ELEM_TIMEOUT={0xc, 0x4, 0x1, 0x0, 0xc000000000000000}, @NFTA_SET_ELEM_FLAGS={0x8}, @NFTA_SET_ELEM_EXPR={0x4}, @NFTA_SET_ELEM_EXPRESSIONS={0xa0, 0xb, 0x0, 0x1, [{0x1c, 0x1, 0x0, 0x1, @log={{0x8}, @val={0x10, 0x2, 0x0, 0x1, [@NFTA_LOG_PREFIX={0xa, 0x2, 0x1, 0x0, 'smaps\x00'}]}}}, {0x10, 0x1, 0x0, 0x1, @objref={{0xb}, @void}}, {0x54, 0x1, 0x0, 0x1, @redir={{0xa}, @val={0x44, 0x2, 0x0, 0x1, [@NFTA_REDIR_REG_PROTO_MIN={0x8, 0x1, 0x1, 0x0, 0xb}, @NFTA_REDIR_REG_PROTO_MIN={0x8, 0x1, 0x1, 0x0, 0xb}, @NFTA_REDIR_REG_PROTO_MIN={0x8, 0x1, 0x1, 0x0, 0x14}, @NFTA_REDIR_REG_PROTO_MIN={0x8, 0x1, 0x1, 0x0, 0x16}, @NFTA_REDIR_FLAGS={0x8, 0x3, 0x1, 0x0, 0x42}, @NFTA_REDIR_FLAGS={0x8, 0x3, 0x1, 0x0, 0x4}, @NFTA_REDIR_REG_PROTO_MAX={0x8, 0x2, 0x1, 0x0, 0x17}, @NFTA_REDIR_REG_PROTO_MAX={0x8, 0x2, 0x1, 0x0, 0x12}]}}}, {0x10, 0x1, 0x0, 0x1, @reject={{0xb}, @void}}, {0xc, 0x1, 0x0, 0x1, @ct={{0x7}, @void}}]}, @NFTA_SET_ELEM_EXPRESSIONS={0x13a8, 0xb, 0x0, 0x1, [{0x1374, 0x1, 0x0, 0x1, @bitwise={{0xc}, @val={0x1364, 0x2, 0x0, 0x1, [@NFTA_BITWISE_MASK={0x8, 0x4, 0x0, 0x1, [@NFTA_DATA_VALUE={0x4}]}, @NFTA_BITWISE_DATA={0x1350, 0x7, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x40, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffd}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN_ID={0x8, 0x3, 0x1, 0x0, 0x8}, @NFTA_VERDICT_CHAIN_ID={0x8, 0x3, 0x1, 0x0, 0x3}]}, @NFTA_DATA_VALUE={0xeb, 0x1, "c52f3dac8d3517de643d0d152f1135f58584a48e139f335a1317b28a2bf5e96e5f9c76ccf04e677c0eb23c7a87ba3c1a4550c696d7d4e5963ef1dac62355594f2fe691f3c33b29a7b0637c39cba49fa4a7d0aba21df12e8a29fe8d8dc58c0a5376bf52f1eb397bd705cdc42e34ff995bec192f19636cb22740e6822a9a584d36def515d017aeb1767cb59a22995a34946bd421b8a8103cadd61db300ef8e0b842044a514c1c78979fadc9ca50700aa9cc7135898522c1fd797445fbb94cb4bce5c5aa5b03fc07c6d16f28e2fe96b625fbd419cf469eb4a8097c85dae8d3b78731a8fbacec38823"}, @NFTA_DATA_VALUE={0x61, 0x1, "08f042c227abbae3b711f801af3a20f96e2fb6e4a2a7520132d92087718e471ef3c4649503da492e2016172fa92ea045b12282a0da9cfefe79f9e3f21efbae7a8658162b1561d54f60b03c3eb163f3ec91f0555cf99c408e8c0bceea9b"}, @NFTA_DATA_VERDICT={0x64, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN_ID={0x8, 0x3, 0x1, 0x0, 0xfffff000}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN_ID={0x8, 0x3, 0x1, 0x0, 0x200}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN_ID={0x8, 0x3, 0x1, 0x0, 0x78}, @NFTA_VERDICT_CHAIN_ID={0x8}, @NFTA_VERDICT_CHAIN_ID={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}]}, @NFTA_DATA_VALUE={0x1004, 0x1, "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"}, @NFTA_DATA_VERDICT={0x4c, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffd}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}]}, @NFTA_DATA_VALUE={0xfa, 0x1, "c8d2402d55a3fa2532c61f60203ee9828270b03e4cca89e5fc925f4797313ecb136dc5bfe441e676c9f4a61d303dfe79038cc1f4d244eafba551e14ab1b3099c47819335fab32a442888381e091a107d378b829ca2175e5592e6cf62c70ecb660a3215f45e1694555004d7b59e25e22870d74cae49fa82e70dd01440ebd05d76b3274a6a3ea398635524dda22ecd888917c6a989755e148b1f72889c6ca572d7af7a0b2436074df0c9afcb75067a03e9c5032a06b942fd323e8e5c6355d428e78d5c2c6abcfac6e023aa8f672cfcd416b1d4f25c5618bee02e47112aded96723ab7d9bebc03dfb86122dc0437d9ff33e839319fb8916"}, @NFTA_DATA_VERDICT={0xc, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}]}]}, @NFTA_BITWISE_OP={0x8, 0x6, 0x1, 0x0, 0x2}]}}}, {0xc, 0x1, 0x0, 0x1, @dup={{0x8}, @void}}, {0x24, 0x1, 0x0, 0x1, @socket={{0xb}, @val={0x14, 0x2, 0x0, 0x1, [@NFTA_SOCKET_KEY={0x8, 0x1, 0x1, 0x0, 0x1}, @NFTA_SOCKET_LEVEL={0x8, 0x3, 0x3a}]}}}]}, @NFTA_SET_ELEM_USERDATA={0x1004, 0x6, 0x1, 0x0, "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"}, @NFTA_SET_ELEM_USERDATA={0xfd, 0x6, 0x1, 0x0, "63873c79c86523413af704de1f62613553fe61919909496fd2ff00347ccf9a2bd6e3ed30899d857af7e9f46a7b2951e58c75323cd76bef7079b17a75be5116fec9db2fa74328adf8835cfef683ff6258b575a210b42fffe78fc2e87a364ac7ad509e8db527edd18103f2fd00bb102b9c82be52c8270698725a017f8d1d138542bec02ec3ce2738b38da96c36394c781329537f287ce906b55d4e8e8ab9a4db05b67fbb9aaa4035e03bfbcab0a755c5e2d5dff571266e0199b7f08d6c5406e1845e4ce865b6530387ecf22f6cdda40c0ecab9251c3b5d62a6beb3b6adbcd911fd851f731754cc4b2a42f16e00cb8a49cffc0853c46ecc44de3a"}]}, {0x730, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_EXPRESSIONS={0xc4, 0xb, 0x0, 0x1, [{0xc, 0x1, 0x0, 0x1, @fib={{0x8}, @void}}, {0x34, 0x1, 0x0, 0x1, @tunnel={{0xb}, @val={0x24, 0x2, 0x0, 0x1, [@NFTA_TUNNEL_DREG={0x8, 0x2, 0x1, 0x0, 0xe}, @NFTA_TUNNEL_KEY={0x8, 0x1, 0x1, 0x0, 0x1}, @NFTA_TUNNEL_KEY={0x8}, @NFTA_TUNNEL_KEY={0x8}]}}}, {0x2c, 0x1, 0x0, 0x1, @exthdr={{0xb}, @val={0x1c, 0x2, 0x0, 0x1, [@NFTA_EXTHDR_OFFSET={0x8, 0x3, 0x1, 0x0, 0xf3}, @NFTA_EXTHDR_OFFSET={0x8, 0x3, 0x1, 0x0, 0xd1}, @NFTA_EXTHDR_DREG={0x8, 0x1, 0x1, 0x0, 0x2}]}}}, {0x44, 0x1, 0x0, 0x1, @objref={{0xb}, @val={0x34, 0x2, 0x0, 0x1, [@NFTA_OBJREF_SET_ID={0x8, 0x5, 0x1, 0x0, 0x1}, @NFTA_OBJREF_IMM_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_OBJREF_SET_ID={0x8, 0x5, 0x1, 0x0, 0x1}, @NFTA_OBJREF_SET_NAME={0x9, 0x4, 'syz0\x00'}, @NFTA_OBJREF_SET_SREG={0x8, 0x3, 0x1, 0x0, 0x12}]}}}, {0x10, 0x1, 0x0, 0x1, @objref={{0xb}, @void}}]}, @NFTA_SET_ELEM_KEY_END={0x350, 0xa, 0x0, 0x1, [@NFTA_DATA_VALUE={0xde, 0x1, "d4a87c8c17e8c4af912330afb8a06d89594ec43d53c205a109fa11a54d7fd42f116485f89d309ac6076a99b062c4ddb1a197d1383a69462b0fe6e72dd268c92962be46a9a5715c1eef464610b3d2df0285a2e306f201708c1d16d2358b7374ca59a8de8dcf1f6fb8d5480604daa2535f7246ecfde1b55882c21810d1d6eb7c983b0b881b80bac3ac9c0d29977b976829631f523a1309b76ce87292630660064b10d66e958e5dc0f09b00b50094c28ae34793ba0fa41552ab8c5c8f8e1fd579a8541f1cb43e65dddb73875e611ff2322b034f50662562f0756d6e"}, @NFTA_DATA_VALUE={0xbd, 0x1, "1e4b36a5c97a650e19a9f290411b3077bbbeb770c9e5894e4d64c3ecc5bc5ad299a4d0bfbf7fc4c26724f7f1e0b6302f688ad0695e99ecb6ac92de41da55222bdc2276cad6c61c06219717252b903e945dd533ad3151be44333ea4e62975ee3130c914bb3ef0c795b999a08c08d81f49e5fc6986de85ad57e99fed9bd696a7bef7f7c951078bb8611a8a6ad8160fd2c1b3bf5e3191560b62e84126aa10e96d0c848f824a5f87730c396fd5eae2d4709c0c535f5567abfdb41b"}, @NFTA_DATA_VERDICT={0x4c, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffd}, @NFTA_VERDICT_CHAIN_ID={0x8, 0x3, 0x1, 0x0, 0x1}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN_ID={0x8, 0x3, 0x1, 0x0, 0x1}, @NFTA_VERDICT_CHAIN_ID={0x8, 0x3, 0x1, 0x0, 0x4}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}]}, @NFTA_DATA_VALUE={0xa6, 0x1, "febf8d6c97adad06e32ee71eaf920c586ca7a40f2385b600c14f83bab79e264a6a653f8b897c6d07bf7a2264126fafe7554499c5ca9bf217a4f9a9be4c28cc4ff6302ab963e912f0e4b7e9972e1e41318a16fb7fb63365503a5fc2348cc71c5408a5f01fb323a02c8420a1088b866c814cc089acf03e6f715660b2a96d99b3f4f26188816fa2343f7b194ea53c4420010dbb351c140c2dc25b2c30b858eb3fe42538"}, @NFTA_DATA_VALUE={0x17, 0x1, "cd82f2886fee9a0ea456c7bdb4a6b383f2209d"}, @NFTA_DATA_VALUE={0x5f, 0x1, "52fd05c7c3c9ecfa61ad8c87c14c19135f2e801fef7f6210bfb032372e191be1fdc5942c85325d366c59e984f182cecec46d66222e1a7a156393549e570ac53f08f65a593eddc7b9ac4324886e537dc250f9a0764f1a96787592ed"}, @NFTA_DATA_VERDICT={0x14, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN_ID={0x8, 0x3, 0x1, 0x0, 0x1}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffd}]}, @NFTA_DATA_VALUE={0x2c, 0x1, "f9644e0842398b17040671f9d72ba877659e035ac8b17f54cf9f46974f1b535e7f5f8deb9135a8d8"}]}, @NFTA_SET_ELEM_OBJREF={0x9, 0x9, 'syz2\x00'}, @NFTA_SET_ELEM_KEY={0x10, 0x1, 0x0, 0x1, [@NFTA_DATA_VERDICT={0xc, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN_ID={0x8, 0x3, 0x1, 0x0, 0x4}]}]}, @NFTA_SET_ELEM_EXPRESSIONS={0x78, 0xb, 0x0, 0x1, [{0x10, 0x1, 0x0, 0x1, @masq={{0x9}, @void}}, {0x10, 0x1, 0x0, 0x1, @notrack={{0xc}, @void}}, {0x10, 0x1, 0x0, 0x1, @target={{0xb}, @void}}, {0x24, 0x1, 0x0, 0x1, @hash={{0x9}, @val={0x14, 0x2, 0x0, 0x1, [@NFTA_HASH_LEN={0x8, 0x3, 0x1, 0x0, 0x35}, @NFTA_HASH_SREG={0x8, 0x1, 0x1, 0x0, 0x8}]}}}, {0x20, 0x1, 0x0, 0x1, @immediate={{0xe}, @val={0xc, 0x2, 0x0, 0x1, [@NFTA_IMMEDIATE_DREG={0x8, 0x1, 0x1, 0x0, 0x12}]}}}]}, @NFTA_SET_ELEM_USERDATA={0x88, 0x6, 0x1, 0x0, "222f7f4410dcb1360bd85199ec7b97c6420af0ccdb402e57ea38e71b9f5c1769d3f2fe065e500ecdee963a54eaea4d76290ff317199f5d5d0557f2f8649261246e1cdecfa5506f7893ba4907101f394c3c40effd55f4e852adf5d1dca70f59ed3ad8c958dd62924b7b58d97bbbe202e2b4c3bf97dee01074085753f91147f560f2cb2252"}, @NFTA_SET_ELEM_EXPRESSIONS={0x80, 0xb, 0x0, 0x1, [{0x14, 0x1, 0x0, 0x1, @notrack={{0xc}, @val={0x4, 0x2, 0x0, 0x1, ["", "", ""]}}}, {0x10, 0x1, 0x0, 0x1, @counter={{0xc}, @void}}, {0x14, 0x1, 0x0, 0x1, @immediate={{0xe}, @void}}, {0x44, 0x1, 0x0, 0x1, @lookup={{0xb}, @val={0x34, 0x2, 0x0, 0x1, [@NFTA_LOOKUP_SET={0x9, 0x1, 'syz2\x00'}, @NFTA_LOOKUP_SET={0x9, 0x1, 'syz0\x00'}, @NFTA_LOOKUP_SREG={0x8, 0x2, 0x1, 0x0, 0x11}, @NFTA_LOOKUP_DREG={0x8, 0x3, 0x1, 0x0, 0x9}, @NFTA_LOOKUP_FLAGS={0x8, 0x5, 0x1, 0x0, 0x1}]}}}]}, @NFTA_SET_ELEM_KEY={0x174, 0x1, 0x0, 0x1, [@NFTA_DATA_VALUE={0x41, 0x1, "1a3f3467e7455846487ebfb496ccda8d3ac842308d0045f8c542389bacc61d33f0b281ee1505933c9183074cb49d91e486576d01a25d250dc374a2192d"}, @NFTA_DATA_VERDICT={0xc, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN_ID={0x8, 0x3, 0x1, 0x0, 0x2a0000}]}, @NFTA_DATA_VALUE={0x39, 0x1, "f12fd4d18e68121c59c6c052717a565cd0fa1b8815d7e053084900f8dddebda6971d4ac9b57996d3efde4f37a139bf89fe9fd53a6a"}, @NFTA_DATA_VERDICT={0x44, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN_ID={0x8, 0x3, 0x1, 0x0, 0x2}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN_ID={0x8, 0x3, 0x1, 0x0, 0x80000000}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}]}, @NFTA_DATA_VERDICT={0xc, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN_ID={0x8, 0x3, 0x1, 0x0, 0x3ff}]}, @NFTA_DATA_VALUE={0x91, 0x1, "06e4f897822facabca844c2631209d0dbcd0e4fc5881c67b7a9d20f79b633cff4857657cd67fddde3c7e5a3fd9fc7105890bab92b646f483e020629db90850e6a9114060a4d7a185ef2604889a383f53118750dbf65586f42017797c86321ea96eea7c8ab2f3589d2606aee2e37639da5c6e2cbb3eb00f36c0222d1314180bb31442f22e9a3b81d0d357964117"}]}, @NFTA_SET_ELEM_FLAGS={0x8}]}, {0x8, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_EXPR={0x4}]}]}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_ELEM_LIST_SET_ID={0x8, 0x4, 0x1, 0x0, 0x2}]}, @NFT_MSG_DELSET={0x28, 0xb, 0xa, 0x201, 0x0, 0x0, {0x3, 0x0, 0x4}, [@NFTA_SET_HANDLE={0xc, 0x10, 0x1, 0x0, 0x5}, @NFTA_SET_ID={0x8, 0xa, 0x1, 0x0, 0x2}]}, @NFT_MSG_DELRULE={0x13f0, 0x8, 0xa, 0x204, 0x0, 0x0, {0x7, 0x0, 0x4}, [@NFTA_RULE_USERDATA={0xbd, 0x7, 0x1, 0x0, "9f65465596b19f8bfb883f628bb9b913f560db725bf2762070693164a62e8db02fad738693f96345c36da20d795293f69cee1cb04593e89d31b4a6abbdc46b5590b283edc5c3ecbf1dcaa6c89d8f253f108df0143a40e0b04cc52b33537314c48f2377a33411c8f59ee172bb5f54e6838979ffe8c990a0f9514dc2e3c53cc17071d92b43de06fd3d6d487bff500b5a8b71ee4ed24eab61915f8448f3018bc7a54d1502657227084f3a166a8027cb4dbaf57a9a74998449e6c1"}, @NFTA_RULE_EXPRESSIONS={0x131c, 0x4, 0x0, 0x1, [{0x28, 0x1, 0x0, 0x1, @rt={{0x7}, @val={0x1c, 0x2, 0x0, 0x1, [@NFTA_RT_KEY={0x8}, @NFTA_RT_DREG={0x8, 0x1, 0x1, 0x0, 0xc}, @NFTA_RT_KEY={0x8, 0x2, 0x1, 0x0, 0x2}]}}}, {0x10, 0x1, 0x0, 0x1, @match={{0xa}, @void}}, {0x10, 0x1, 0x0, 0x1, @tunnel={{0xb}, @void}}, {0x1c, 0x1, 0x0, 0x1, @lookup={{0xb}, @val={0xc, 0x2, 0x0, 0x1, [@NFTA_LOOKUP_SREG={0x8, 0x2, 0x1, 0x0, 0x12}]}}}, {0x10, 0x1, 0x0, 0x1, @masq={{0x9}, @void}}, {0x10, 0x1, 0x0, 0x1, @reject={{0xb}, @void}}, {0x126c, 0x1, 0x0, 0x1, @target={{0xb}, @val={0x125c, 0x2, 0x0, 0x1, [@NFTA_TARGET_REV={0x8, 0x2, 0x1, 0x0, 0x3}, @NFTA_TARGET_INFO={0x1004, 0x3, "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"}, @NFTA_TARGET_INFO={0xb5, 0x3, "3f25542ac739307423809f6503ac6d4656304c04e3522afe03e5e9cd9e7e9bb3b03932cc64021daa36b8d71d312226cdf8b44bf0c97487f139b37f44de00fab5f2e7c6dfb64cf0086207af1eef745924cbafae28824ebaf3c6af4f70ac5a3cb97542d31bb037f3bdbe9496273963f13b272e2eee0f090a5f6680646ef30eaceaf499435ec2d15f93f49d9df8f06d3f7251dcfdb64cd655e6cdd50ddeec5828da4098bdfe75b9255df171406962043aad7b"}, @NFTA_TARGET_REV={0x8, 0x2, 0x1, 0x0, 0x1b}, @NFTA_TARGET_NAME={0xa, 0x1, 'smaps\x00'}, @NFTA_TARGET_INFO={0xe7, 0x3, "6c3da194c4240ccb58cf7391f223497e86f5ae67f4fd416bee585b189f5cff52c6841dfe8af0b938401f9aa73b2e5b437b2f5f3e038137b411cfb60afbbe5f4f4c92d7b66fbf724ebf32e9469d8d7b38052f317e526b9aa43a3f51b52627da13a03000da7c6e7a297614ab75b3dd7b390402fe601adc70d9dbe7d05dc46b923cbd45fb891dfcf4c51399567b5ecf6cb2be05b9caa927099a820d68feb5d72452ed889f8fb9b8ec12cc673c9462418d679de0c45aeb95a646440785ccf4f765af77b6b6a15e74a4f4617794ba15b38ed7c3c627aecdd786dd834a88691108cb58d58f2a"}, @NFTA_TARGET_INFO={0x96, 0x3, "4d01eff73fa4ba6edfa8eceea5f0b41e0aabd8fc193f11cd78d85e03ff93a26d40ffb0e384bbe8fdc8936df1c89a58f14d49cedacd3c14862fe21cd99f3d251755bedaf78fbbf624e38e49a8ec07d07a2f711dba1f5cc9a56cae61de814a7488a6c35c36b1d57dd7a78d310c529f8434e4cc72b26b8e8480e6c00c13474ee1caf548934c73219ade5316908b3b46834f4fe5"}]}}}, {0x28, 0x1, 0x0, 0x1, @dup_ipv6={{0x8}, @val={0x1c, 0x2, 0x0, 0x1, [@NFTA_DUP_SREG_ADDR={0x8, 0x1, 0x1, 0x0, 0x45d5c5aad9c0d2c6}, @NFTA_DUP_SREG_ADDR={0x8, 0x1, 0x1, 0x0, 0x12}, @NFTA_DUP_SREG_DEV={0x8, 0x2, 0x1, 0x0, 0xe}]}}}]}]}], {0x14}}, 0x423c}, 0x1, 0x0, 0x0, 0x8814}, 0x4000) (async)
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r0, 0x0, 0xcf, 0x0, 0x0) (async)
sendmsg$NFQNL_MSG_VERDICT_BATCH(r0, &(0x7f0000005700)={&(0x7f0000001180)={0x10, 0x0, 0x0, 0x20400}, 0xc, &(0x7f0000001240)={&(0x7f00000011c0)={0x64, 0x3, 0x3, 0x101, 0x0, 0x0, {0xa, 0x0, 0x3}, [@NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0xffffffc0}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x4}, @NFQA_VERDICT_HDR={0xc, 0x2, {0xfffffffffffffffe, 0x7}}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x80000000}, @NFQA_VERDICT_HDR={0xc, 0x2, {0xfffffffffffffffd, 0xff}}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x3}, @NFQA_VERDICT_HDR={0xc, 0x2, {0xfffffffffffffffe, 0x4}}, @NFQA_VERDICT_HDR={0xc, 0x2, {0xfffffffffffffffd, 0x90}}]}, 0x64}, 0x1, 0x0, 0x0, 0x20020082}, 0x4000000) (async)
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r1, &(0x7f00000000c0)=""/4096, 0x1000)
sendmsg$IPCTNL_MSG_EXP_DELETE(r1, &(0x7f0000001140)={&(0x7f00000010c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000001100)={&(0x7f0000005500)={0x1c4, 0x2, 0x2, 0x801, 0x0, 0x0, {0x0, 0x0, 0x5}, [@CTA_EXPECT_MASK={0x64, 0x3, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x11}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8, 0x2, @rand_addr=0x64010102}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @ipv4={'\x00', '\xff\xff', @private=0xa010100}}, {0x14, 0x4, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}]}, @CTA_EXPECT_TUPLE={0x88, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @private1}, {0x14, 0x4, @remote}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @broadcast}, {0x8, 0x2, @broadcast}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x8, 0x2, @rand_addr=0x64010100}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x3a}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x8, 0x2, @loopback}}}]}, @CTA_EXPECT_FN={0x8, 0xb, 'sip\x00'}, @CTA_EXPECT_HELP_NAME={0xf, 0x6, 'netbios-ns\x00'}, @CTA_EXPECT_FN={0xa, 0xb, 'Q.931\x00'}, @CTA_EXPECT_NAT={0x1c, 0xa, 0x0, 0x1, [@CTA_EXPECT_NAT_DIR={0x8}, @CTA_EXPECT_NAT_DIR={0x8, 0x1, 0x1, 0x0, 0x1}, @CTA_EXPECT_NAT_DIR={0x8, 0x1, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_HELP_NAME={0xe, 0x6, 'ftp-20000\x00'}, @CTA_EXPECT_ZONE={0x6, 0x7, 0x1, 0x0, 0x4}, @CTA_EXPECT_FN={0x8, 0xb, 'sip\x00'}, @CTA_EXPECT_TUPLE={0x64, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @ipv4={'\x00', '\xff\xff', @multicast2}}, {0x14, 0x4, @mcast2}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @private2={0xfc, 0x2, '\x00', 0x1}}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}]}]}, 0x1c4}, 0x1, 0x0, 0x0, 0x20000000}, 0x2)
03:50:52 executing program 2:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:52 executing program 3:
bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0)
03:50:52 executing program 5:
r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/netfilter\x00')
read$qrtrtun(r0, &(0x7f0000000040)=""/85, 0x55)
read$qrtrtun(r0, &(0x7f00000000c0)=""/156, 0x9c)
mmap$qrtrtun(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1000006, 0x30, r0, 0x0)
ioctl$BLKSECTGET(r0, 0x1267, &(0x7f00000001c0))
ioctl$BLKRAGET(r0, 0x1263, &(0x7f0000000000))
bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000240)={0x4}, 0x8)
ioctl$BLKSECTGET(r0, 0x1267, &(0x7f0000000280))
write$qrtrtun(0xffffffffffffffff, &(0x7f0000000180)="233488a4c84b91d9e75be3e85319a1dac75761247fe75cf709c603ea1ac357590f28480aca91c3e85d8feff349c057fc5aff3151bef49c7e7e9119bfee", 0x3d)
03:50:52 executing program 2:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:52 executing program 0:
sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000040)={&(0x7f00000012c0)={{0x14}, [@NFT_MSG_NEWSETELEM={0x2dfc, 0xc, 0xa, 0x801, 0x0, 0x0, {0x0, 0x0, 0x9}, [@NFTA_SET_ELEM_LIST_SET_ID={0x8, 0x4, 0x1, 0x0, 0x3}, @NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz0\x00'}, @NFTA_SET_ELEM_LIST_ELEMENTS={0x2dc0, 0x3, 0x0, 0x1, [{0x110, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_EXPR={0x4}, @NFTA_SET_ELEM_EXPRESSIONS={0x38, 0xb, 0x0, 0x1, [{0x34, 0x1, 0x0, 0x1, @tproxy={{0xb}, @val={0x24, 0x2, 0x0, 0x1, [@NFTA_TPROXY_REG_PORT={0x8, 0x3, 0x1, 0x0, 0x8}, @NFTA_TPROXY_REG_PORT={0x8, 0x3, 0x1, 0x0, 0xc}, @NFTA_TPROXY_REG_PORT={0x8, 0x3, 0x1, 0x0, 0x17}, @NFTA_TPROXY_FAMILY={0x8, 0x1, 0x1, 0x0, 0x2}]}}}]}, @NFTA_SET_ELEM_EXPRESSIONS={0xd0, 0xb, 0x0, 0x1, [{0x2c, 0x1, 0x0, 0x1, @target={{0xb}, @val={0x1c, 0x2, 0x0, 0x1, [@NFTA_TARGET_REV={0x8, 0x2, 0x1, 0x0, 0x4}, @NFTA_TARGET_REV={0x8, 0x2, 0x1, 0x0, 0x80}, @NFTA_TARGET_REV={0x8, 0x2, 0x1, 0x0, 0x3f}]}}}, {0xa0, 0x1, 0x0, 0x1, @immediate={{0xe}, @val={0x8c, 0x2, 0x0, 0x1, [@NFTA_IMMEDIATE_DREG={0x8, 0x1, 0x1, 0x0, 0xf}, @NFTA_IMMEDIATE_DREG={0x8, 0x1, 0x1, 0x0, 0x17}, @NFTA_IMMEDIATE_DATA={0x78, 0x2, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x14, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}, @NFTA_VERDICT_CHAIN_ID={0x8, 0x3, 0x1, 0x0, 0x8}]}, @NFTA_DATA_VERDICT={0x10, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}]}, @NFTA_DATA_VERDICT={0x24, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}]}, @NFTA_DATA_VERDICT={0x2c, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN_ID={0x8, 0x3, 0x1, 0x0, 0x1}, @NFTA_VERDICT_CHAIN_ID={0x8, 0x3, 0x1, 0x0, 0x4}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}]}]}]}}}]}]}, {0x2574, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_OBJREF={0x9, 0x9, 'syz1\x00'}, @NFTA_SET_ELEM_TIMEOUT={0xc, 0x4, 0x1, 0x0, 0xc000000000000000}, @NFTA_SET_ELEM_FLAGS={0x8}, @NFTA_SET_ELEM_EXPR={0x4}, @NFTA_SET_ELEM_EXPRESSIONS={0xa0, 0xb, 0x0, 0x1, [{0x1c, 0x1, 0x0, 0x1, @log={{0x8}, @val={0x10, 0x2, 0x0, 0x1, [@NFTA_LOG_PREFIX={0xa, 0x2, 0x1, 0x0, 'smaps\x00'}]}}}, {0x10, 0x1, 0x0, 0x1, @objref={{0xb}, @void}}, {0x54, 0x1, 0x0, 0x1, @redir={{0xa}, @val={0x44, 0x2, 0x0, 0x1, [@NFTA_REDIR_REG_PROTO_MIN={0x8, 0x1, 0x1, 0x0, 0xb}, @NFTA_REDIR_REG_PROTO_MIN={0x8, 0x1, 0x1, 0x0, 0xb}, @NFTA_REDIR_REG_PROTO_MIN={0x8, 0x1, 0x1, 0x0, 0x14}, @NFTA_REDIR_REG_PROTO_MIN={0x8, 0x1, 0x1, 0x0, 0x16}, @NFTA_REDIR_FLAGS={0x8, 0x3, 0x1, 0x0, 0x42}, @NFTA_REDIR_FLAGS={0x8, 0x3, 0x1, 0x0, 0x4}, @NFTA_REDIR_REG_PROTO_MAX={0x8, 0x2, 0x1, 0x0, 0x17}, @NFTA_REDIR_REG_PROTO_MAX={0x8, 0x2, 0x1, 0x0, 0x12}]}}}, {0x10, 0x1, 0x0, 0x1, @reject={{0xb}, @void}}, {0xc, 0x1, 0x0, 0x1, @ct={{0x7}, @void}}]}, @NFTA_SET_ELEM_EXPRESSIONS={0x13a8, 0xb, 0x0, 0x1, [{0x1374, 0x1, 0x0, 0x1, @bitwise={{0xc}, @val={0x1364, 0x2, 0x0, 0x1, [@NFTA_BITWISE_MASK={0x8, 0x4, 0x0, 0x1, [@NFTA_DATA_VALUE={0x4}]}, @NFTA_BITWISE_DATA={0x1350, 0x7, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x40, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffd}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN_ID={0x8, 0x3, 0x1, 0x0, 0x8}, @NFTA_VERDICT_CHAIN_ID={0x8, 0x3, 0x1, 0x0, 0x3}]}, @NFTA_DATA_VALUE={0xeb, 0x1, "c52f3dac8d3517de643d0d152f1135f58584a48e139f335a1317b28a2bf5e96e5f9c76ccf04e677c0eb23c7a87ba3c1a4550c696d7d4e5963ef1dac62355594f2fe691f3c33b29a7b0637c39cba49fa4a7d0aba21df12e8a29fe8d8dc58c0a5376bf52f1eb397bd705cdc42e34ff995bec192f19636cb22740e6822a9a584d36def515d017aeb1767cb59a22995a34946bd421b8a8103cadd61db300ef8e0b842044a514c1c78979fadc9ca50700aa9cc7135898522c1fd797445fbb94cb4bce5c5aa5b03fc07c6d16f28e2fe96b625fbd419cf469eb4a8097c85dae8d3b78731a8fbacec38823"}, @NFTA_DATA_VALUE={0x61, 0x1, "08f042c227abbae3b711f801af3a20f96e2fb6e4a2a7520132d92087718e471ef3c4649503da492e2016172fa92ea045b12282a0da9cfefe79f9e3f21efbae7a8658162b1561d54f60b03c3eb163f3ec91f0555cf99c408e8c0bceea9b"}, @NFTA_DATA_VERDICT={0x64, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN_ID={0x8, 0x3, 0x1, 0x0, 0xfffff000}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN_ID={0x8, 0x3, 0x1, 0x0, 0x200}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN_ID={0x8, 0x3, 0x1, 0x0, 0x78}, @NFTA_VERDICT_CHAIN_ID={0x8}, @NFTA_VERDICT_CHAIN_ID={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}]}, @NFTA_DATA_VALUE={0x1004, 0x1, "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"}, @NFTA_DATA_VERDICT={0x4c, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffd}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}]}, @NFTA_DATA_VALUE={0xfa, 0x1, "c8d2402d55a3fa2532c61f60203ee9828270b03e4cca89e5fc925f4797313ecb136dc5bfe441e676c9f4a61d303dfe79038cc1f4d244eafba551e14ab1b3099c47819335fab32a442888381e091a107d378b829ca2175e5592e6cf62c70ecb660a3215f45e1694555004d7b59e25e22870d74cae49fa82e70dd01440ebd05d76b3274a6a3ea398635524dda22ecd888917c6a989755e148b1f72889c6ca572d7af7a0b2436074df0c9afcb75067a03e9c5032a06b942fd323e8e5c6355d428e78d5c2c6abcfac6e023aa8f672cfcd416b1d4f25c5618bee02e47112aded96723ab7d9bebc03dfb86122dc0437d9ff33e839319fb8916"}, @NFTA_DATA_VERDICT={0xc, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}]}]}, @NFTA_BITWISE_OP={0x8, 0x6, 0x1, 0x0, 0x2}]}}}, {0xc, 0x1, 0x0, 0x1, @dup={{0x8}, @void}}, {0x24, 0x1, 0x0, 0x1, @socket={{0xb}, @val={0x14, 0x2, 0x0, 0x1, [@NFTA_SOCKET_KEY={0x8, 0x1, 0x1, 0x0, 0x1}, @NFTA_SOCKET_LEVEL={0x8, 0x3, 0x3a}]}}}]}, @NFTA_SET_ELEM_USERDATA={0x1004, 0x6, 0x1, 0x0, "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"}, @NFTA_SET_ELEM_USERDATA={0xfd, 0x6, 0x1, 0x0, "63873c79c86523413af704de1f62613553fe61919909496fd2ff00347ccf9a2bd6e3ed30899d857af7e9f46a7b2951e58c75323cd76bef7079b17a75be5116fec9db2fa74328adf8835cfef683ff6258b575a210b42fffe78fc2e87a364ac7ad509e8db527edd18103f2fd00bb102b9c82be52c8270698725a017f8d1d138542bec02ec3ce2738b38da96c36394c781329537f287ce906b55d4e8e8ab9a4db05b67fbb9aaa4035e03bfbcab0a755c5e2d5dff571266e0199b7f08d6c5406e1845e4ce865b6530387ecf22f6cdda40c0ecab9251c3b5d62a6beb3b6adbcd911fd851f731754cc4b2a42f16e00cb8a49cffc0853c46ecc44de3a"}]}, {0x730, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_EXPRESSIONS={0xc4, 0xb, 0x0, 0x1, [{0xc, 0x1, 0x0, 0x1, @fib={{0x8}, @void}}, {0x34, 0x1, 0x0, 0x1, @tunnel={{0xb}, @val={0x24, 0x2, 0x0, 0x1, [@NFTA_TUNNEL_DREG={0x8, 0x2, 0x1, 0x0, 0xe}, @NFTA_TUNNEL_KEY={0x8, 0x1, 0x1, 0x0, 0x1}, @NFTA_TUNNEL_KEY={0x8}, @NFTA_TUNNEL_KEY={0x8}]}}}, {0x2c, 0x1, 0x0, 0x1, @exthdr={{0xb}, @val={0x1c, 0x2, 0x0, 0x1, [@NFTA_EXTHDR_OFFSET={0x8, 0x3, 0x1, 0x0, 0xf3}, @NFTA_EXTHDR_OFFSET={0x8, 0x3, 0x1, 0x0, 0xd1}, @NFTA_EXTHDR_DREG={0x8, 0x1, 0x1, 0x0, 0x2}]}}}, {0x44, 0x1, 0x0, 0x1, @objref={{0xb}, @val={0x34, 0x2, 0x0, 0x1, [@NFTA_OBJREF_SET_ID={0x8, 0x5, 0x1, 0x0, 0x1}, @NFTA_OBJREF_IMM_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_OBJREF_SET_ID={0x8, 0x5, 0x1, 0x0, 0x1}, @NFTA_OBJREF_SET_NAME={0x9, 0x4, 'syz0\x00'}, @NFTA_OBJREF_SET_SREG={0x8, 0x3, 0x1, 0x0, 0x12}]}}}, {0x10, 0x1, 0x0, 0x1, @objref={{0xb}, @void}}]}, @NFTA_SET_ELEM_KEY_END={0x350, 0xa, 0x0, 0x1, [@NFTA_DATA_VALUE={0xde, 0x1, "d4a87c8c17e8c4af912330afb8a06d89594ec43d53c205a109fa11a54d7fd42f116485f89d309ac6076a99b062c4ddb1a197d1383a69462b0fe6e72dd268c92962be46a9a5715c1eef464610b3d2df0285a2e306f201708c1d16d2358b7374ca59a8de8dcf1f6fb8d5480604daa2535f7246ecfde1b55882c21810d1d6eb7c983b0b881b80bac3ac9c0d29977b976829631f523a1309b76ce87292630660064b10d66e958e5dc0f09b00b50094c28ae34793ba0fa41552ab8c5c8f8e1fd579a8541f1cb43e65dddb73875e611ff2322b034f50662562f0756d6e"}, @NFTA_DATA_VALUE={0xbd, 0x1, "1e4b36a5c97a650e19a9f290411b3077bbbeb770c9e5894e4d64c3ecc5bc5ad299a4d0bfbf7fc4c26724f7f1e0b6302f688ad0695e99ecb6ac92de41da55222bdc2276cad6c61c06219717252b903e945dd533ad3151be44333ea4e62975ee3130c914bb3ef0c795b999a08c08d81f49e5fc6986de85ad57e99fed9bd696a7bef7f7c951078bb8611a8a6ad8160fd2c1b3bf5e3191560b62e84126aa10e96d0c848f824a5f87730c396fd5eae2d4709c0c535f5567abfdb41b"}, @NFTA_DATA_VERDICT={0x4c, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffd}, @NFTA_VERDICT_CHAIN_ID={0x8, 0x3, 0x1, 0x0, 0x1}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN_ID={0x8, 0x3, 0x1, 0x0, 0x1}, @NFTA_VERDICT_CHAIN_ID={0x8, 0x3, 0x1, 0x0, 0x4}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}]}, @NFTA_DATA_VALUE={0xa6, 0x1, "febf8d6c97adad06e32ee71eaf920c586ca7a40f2385b600c14f83bab79e264a6a653f8b897c6d07bf7a2264126fafe7554499c5ca9bf217a4f9a9be4c28cc4ff6302ab963e912f0e4b7e9972e1e41318a16fb7fb63365503a5fc2348cc71c5408a5f01fb323a02c8420a1088b866c814cc089acf03e6f715660b2a96d99b3f4f26188816fa2343f7b194ea53c4420010dbb351c140c2dc25b2c30b858eb3fe42538"}, @NFTA_DATA_VALUE={0x17, 0x1, "cd82f2886fee9a0ea456c7bdb4a6b383f2209d"}, @NFTA_DATA_VALUE={0x5f, 0x1, "52fd05c7c3c9ecfa61ad8c87c14c19135f2e801fef7f6210bfb032372e191be1fdc5942c85325d366c59e984f182cecec46d66222e1a7a156393549e570ac53f08f65a593eddc7b9ac4324886e537dc250f9a0764f1a96787592ed"}, @NFTA_DATA_VERDICT={0x14, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN_ID={0x8, 0x3, 0x1, 0x0, 0x1}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffd}]}, @NFTA_DATA_VALUE={0x2c, 0x1, "f9644e0842398b17040671f9d72ba877659e035ac8b17f54cf9f46974f1b535e7f5f8deb9135a8d8"}]}, @NFTA_SET_ELEM_OBJREF={0x9, 0x9, 'syz2\x00'}, @NFTA_SET_ELEM_KEY={0x10, 0x1, 0x0, 0x1, [@NFTA_DATA_VERDICT={0xc, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN_ID={0x8, 0x3, 0x1, 0x0, 0x4}]}]}, @NFTA_SET_ELEM_EXPRESSIONS={0x78, 0xb, 0x0, 0x1, [{0x10, 0x1, 0x0, 0x1, @masq={{0x9}, @void}}, {0x10, 0x1, 0x0, 0x1, @notrack={{0xc}, @void}}, {0x10, 0x1, 0x0, 0x1, @target={{0xb}, @void}}, {0x24, 0x1, 0x0, 0x1, @hash={{0x9}, @val={0x14, 0x2, 0x0, 0x1, [@NFTA_HASH_LEN={0x8, 0x3, 0x1, 0x0, 0x35}, @NFTA_HASH_SREG={0x8, 0x1, 0x1, 0x0, 0x8}]}}}, {0x20, 0x1, 0x0, 0x1, @immediate={{0xe}, @val={0xc, 0x2, 0x0, 0x1, [@NFTA_IMMEDIATE_DREG={0x8, 0x1, 0x1, 0x0, 0x12}]}}}]}, @NFTA_SET_ELEM_USERDATA={0x88, 0x6, 0x1, 0x0, "222f7f4410dcb1360bd85199ec7b97c6420af0ccdb402e57ea38e71b9f5c1769d3f2fe065e500ecdee963a54eaea4d76290ff317199f5d5d0557f2f8649261246e1cdecfa5506f7893ba4907101f394c3c40effd55f4e852adf5d1dca70f59ed3ad8c958dd62924b7b58d97bbbe202e2b4c3bf97dee01074085753f91147f560f2cb2252"}, @NFTA_SET_ELEM_EXPRESSIONS={0x80, 0xb, 0x0, 0x1, [{0x14, 0x1, 0x0, 0x1, @notrack={{0xc}, @val={0x4, 0x2, 0x0, 0x1, ["", "", ""]}}}, {0x10, 0x1, 0x0, 0x1, @counter={{0xc}, @void}}, {0x14, 0x1, 0x0, 0x1, @immediate={{0xe}, @void}}, {0x44, 0x1, 0x0, 0x1, @lookup={{0xb}, @val={0x34, 0x2, 0x0, 0x1, [@NFTA_LOOKUP_SET={0x9, 0x1, 'syz2\x00'}, @NFTA_LOOKUP_SET={0x9, 0x1, 'syz0\x00'}, @NFTA_LOOKUP_SREG={0x8, 0x2, 0x1, 0x0, 0x11}, @NFTA_LOOKUP_DREG={0x8, 0x3, 0x1, 0x0, 0x9}, @NFTA_LOOKUP_FLAGS={0x8, 0x5, 0x1, 0x0, 0x1}]}}}]}, @NFTA_SET_ELEM_KEY={0x174, 0x1, 0x0, 0x1, [@NFTA_DATA_VALUE={0x41, 0x1, "1a3f3467e7455846487ebfb496ccda8d3ac842308d0045f8c542389bacc61d33f0b281ee1505933c9183074cb49d91e486576d01a25d250dc374a2192d"}, @NFTA_DATA_VERDICT={0xc, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN_ID={0x8, 0x3, 0x1, 0x0, 0x2a0000}]}, @NFTA_DATA_VALUE={0x39, 0x1, "f12fd4d18e68121c59c6c052717a565cd0fa1b8815d7e053084900f8dddebda6971d4ac9b57996d3efde4f37a139bf89fe9fd53a6a"}, @NFTA_DATA_VERDICT={0x44, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN_ID={0x8, 0x3, 0x1, 0x0, 0x2}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN_ID={0x8, 0x3, 0x1, 0x0, 0x80000000}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}]}, @NFTA_DATA_VERDICT={0xc, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN_ID={0x8, 0x3, 0x1, 0x0, 0x3ff}]}, @NFTA_DATA_VALUE={0x91, 0x1, "06e4f897822facabca844c2631209d0dbcd0e4fc5881c67b7a9d20f79b633cff4857657cd67fddde3c7e5a3fd9fc7105890bab92b646f483e020629db90850e6a9114060a4d7a185ef2604889a383f53118750dbf65586f42017797c86321ea96eea7c8ab2f3589d2606aee2e37639da5c6e2cbb3eb00f36c0222d1314180bb31442f22e9a3b81d0d357964117"}]}, @NFTA_SET_ELEM_FLAGS={0x8}]}, {0x8, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_EXPR={0x4}]}]}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_ELEM_LIST_SET_ID={0x8, 0x4, 0x1, 0x0, 0x2}]}, @NFT_MSG_DELSET={0x28, 0xb, 0xa, 0x201, 0x0, 0x0, {0x3, 0x0, 0x4}, [@NFTA_SET_HANDLE={0xc, 0x10, 0x1, 0x0, 0x5}, @NFTA_SET_ID={0x8, 0xa, 0x1, 0x0, 0x2}]}, @NFT_MSG_DELRULE={0x13f0, 0x8, 0xa, 0x204, 0x0, 0x0, {0x7, 0x0, 0x4}, [@NFTA_RULE_USERDATA={0xbd, 0x7, 0x1, 0x0, "9f65465596b19f8bfb883f628bb9b913f560db725bf2762070693164a62e8db02fad738693f96345c36da20d795293f69cee1cb04593e89d31b4a6abbdc46b5590b283edc5c3ecbf1dcaa6c89d8f253f108df0143a40e0b04cc52b33537314c48f2377a33411c8f59ee172bb5f54e6838979ffe8c990a0f9514dc2e3c53cc17071d92b43de06fd3d6d487bff500b5a8b71ee4ed24eab61915f8448f3018bc7a54d1502657227084f3a166a8027cb4dbaf57a9a74998449e6c1"}, @NFTA_RULE_EXPRESSIONS={0x131c, 0x4, 0x0, 0x1, [{0x28, 0x1, 0x0, 0x1, @rt={{0x7}, @val={0x1c, 0x2, 0x0, 0x1, [@NFTA_RT_KEY={0x8}, @NFTA_RT_DREG={0x8, 0x1, 0x1, 0x0, 0xc}, @NFTA_RT_KEY={0x8, 0x2, 0x1, 0x0, 0x2}]}}}, {0x10, 0x1, 0x0, 0x1, @match={{0xa}, @void}}, {0x10, 0x1, 0x0, 0x1, @tunnel={{0xb}, @void}}, {0x1c, 0x1, 0x0, 0x1, @lookup={{0xb}, @val={0xc, 0x2, 0x0, 0x1, [@NFTA_LOOKUP_SREG={0x8, 0x2, 0x1, 0x0, 0x12}]}}}, {0x10, 0x1, 0x0, 0x1, @masq={{0x9}, @void}}, {0x10, 0x1, 0x0, 0x1, @reject={{0xb}, @void}}, {0x126c, 0x1, 0x0, 0x1, @target={{0xb}, @val={0x125c, 0x2, 0x0, 0x1, [@NFTA_TARGET_REV={0x8, 0x2, 0x1, 0x0, 0x3}, @NFTA_TARGET_INFO={0x1004, 0x3, "c530b789ce49212d7bcc025b7a47eb37ed97efcca9dc2dc634ce8187bcc1403a9cdfbe8c06e16c6339ef2357111c11e9f31dd232bf90011d7104b7b9635a0856de2447ebdfd34dbfc76cd0e85427b8ceae23fe689bf6759862a9624bbb2f498fd3c174afe92c97c39b0489dca29ba39cf7868aa085d56d3413ef1247d86de9d3389a9f322bca3873abdb9057b12d3c6a9ca1837380e10092479083ad71bc8e91d7658f2cff07c597156d25cde30922200af543b8d9df72e9002324431e6b2fdd79024714ef82c551e932c523c9632a34d41de53b23d6bb42d7072260305f116208f20365f7b60657bf5a1815e8c7582930a01c28970db3737f838a8383fe0a8f5abad5bb5e06e26311ce3d293ac1c5d58152b40b3578b4a78630febbfae08d41ce9f377ac8311c9051ee88947c1d9db2958f56dffd6f12d109687cd387be90977ced8018f52d330e97c398ad555276b99c710de51d937af97d8cd8257806aaa693710fbd86669d3d36f1cea15c481f5ec914a125fcaf57cb170e194d6cc61346d1084e7f3e6648289468d696d1516cd19cc93b9983798d1b38e89d00c98a588048a29fc1e0c85dffe353eb0e1e5f0a60df82c6218b834fb998a034cb1af90c889231fe92f2f04af211cb71df399905a377fd4b2dd62a5345731427b4af24c90b951989b223aa6b3882914a44b33f66a2999eb1f4c48d86a59c8160ba7e5cc9790e61e580305ed6c56e502fa7f36585a97604de87a4ebea2dfd1ce054a084d8088ef715d899a0ac1ecdb41f9b287e65e03db9bc54d40901419665756b2688de4cdd31b5f85171397354f4ea4848796e20992d7b4948dc7ebaebc34c161f51ad3cea53fbdc2f3ec1f5c67fe7526d643e983e833eb89ab32cd10cb7798b639d82bc3d88a1a806691290bb3a662a6a7daf0764a33a0d104084b92d4b223af0daa84af6e4b51a6dd139548708d0f128825907a3470b3ab85561bfa8459fa63d67efde225432af4d2347ebbe217cd767bd95030e1cd283685f245ee22313494c226c3e3e172f77f80e9dff21036cd8e2ec8e66ad188c0a94243db2c9053ebb0042d03d0729cbb0fb8a249b13c24f44c3a07cd46e521abf60a247d6e893944e122242feacbd19ce0a693dd45fc340a9b8cbb9ac25733338af55e28326ef1450fb39e16ed3411eb40ada61c09baf7a5e337eb20fecf9594d0604e5b8f6df786e475308c8da6ee8da4f2b40908929ed87d8e4272e8e9e5e3055e4e64825c53be232faa50c3875fd06e9b7447ebf944cf5a80150184b94679f17193a1bf8380eeee9fa152cf4e4bc303b444f1b7dc5f9778c679344bb04cad2aee7cab6e15f2e49f8d328ec79b30491a1559397b077e7fcef5dc5b9f2c4792f5fa4ef5efad76fe89d7a04670c5c9c11e9b088b9c6b8bae49bb8f3090779b0b3f1852ad5e8be0435633a6cd7084cda6cd2f1232106b4145d1a0ba2afc0ce4a56344b44bd3b488d6a3ecf290e066ce50dafab9559a15972cde718c5bafbf8ebeff85eafb1e98778efcd81d64ec5af2657e31a8d65157034c78f61dc7a0d8435e3429180fe42fc6af9bafcf8c171d27a89abdcca540926866bd3ccfc7fcdb9f68cc63a583ead697d8d0bb0edb526a477f8d10102b3fc4560636198dbe3c6f4c9d110ebf8dbe43500727e864d2d49018cb910508c8f10e3805667581bae59702e040cbaff3adfc9db18c939a47d98b7e0fa1170dc9136c9b29cad366b6670b76b9f45cd279f4f29024a9972190342936c7f987135aa996102d9664d82680b476aad526d6ab605e9f2aabf4403e9edbc941d842bdab2deb9b02db7bd420f1e148792c233b0cc66a65a51c40ae9c503f37d977a7c3602dfb71ff427d3d3372bd8f04d6dd409777db5a3beef545604d12b70e3fe955dd0b456605adb5ce7836752b9ba7b21cd576b532b35095f9fe4a4d835316e662c94c091402d9a36d067138b91da2cf3b3b2e79d74988d16cba93de68700f6030fb801ed133558c45d12295add264db48529a310955b9d4206af24e5a9d4ac72ac938b5e9333f130953a27a24e93bdf609836e8851c7a97020f61d424a7d2f4d4b8863cc50b4fdf068331bf7e835def7b8025671abe5965343a3db6dbe5556894ce7349b1faa4cea8a6497aa328498d38d2ee2a750ebd47b79764dc777a6f1a289e77bff607f125288bfedb88f42054fe2bb120d02a900e0aabbc222a528e856cb61434da24aae8ac4db897d23dc3b69db31da4ea0bd6f2c3bdf94c7ead9fef68dd030379a3f77e25d5e7d82de6268296b468fb98bc4954733f0d041bf8cab9f42d40b7fb04640ac0f60b2ee2f6a7cb32467dc4efb7ffcc345d6d4f8994085c24c540c596a5cb153d0c7a128d57f5ea5b5f84079dde1b72f1223c24fb1c041db199a99d7d825bd79bd13345ac9eb652d70ee8ff5584e30e9f1060da12cf96f884a12a9f4f32594a6f0eeaf13ce11b7888bf8f2e15a5c65eaa58fd793efb937e0abb447b6d50c7d72360998a53fce404e65301c340e9d319a17d365246343d525639d1162feb743ef2ad3e77bcc8460f0dc68b1571829b9b6d02176ceb2a1b2e1e01884c5a9b0df6c461a732ec1eaf610f61a8b46983cbcc88e066ff5fcbc4e71137492dd28060af1944626ff753d4769ac92b923e159837acc4b1a11a0638d42db4aff40e64381d757510457d481c05c6ca97a66d075512a7113543085a9e6b3b6031ffb432352d0fb70afc44606148f39c90ab01859b00757a2f2120cd415bc766a4ea0d4b83d9eb37a767c092de20f3385eec50de2845c5e61eb6a8b375291c13180d022f285015005929e7b59ec223b31af1d8d813c5f502dd43614c515c6408de60517b320c2fdcfe9b4b93d6ebd094ec5dd12724f83225aee4279ec40ede2f08fb068ffcec7d43e76b4b72139dea8d1266329a82864e5471532f8fbd1ab794035020b151a22e9ec185e0490986ae3368a2faa4003220f22873183187442f72ab6aaf1e527462d25b0a179958fdb9ff61ce2c9fc828368e10d9ea566dfd05127921aa2f4ab0c3aba03aa54a5b270feee5701e9e7232b931974a980bcd88bbdb0f71db07f001506fb90770dc113c1e59051c0b8b24f8daf90389a9d45fda25f6a00a4f08f3c0d65d524d17475fd80020523da656900708f83bb3508b5cc24e33e049f0b4e8e94bd114f1bd408eb76f99d7f7c4f1fb6cad824fd2cdf011b3877488b1a793ed40d26f155aab5726bcabf8106c3e6cee233e6c01e9a75fb198857a3269d02cfec0c9657b5b72dde19b1db71e6e7fe98e9c0cee1dfa3ad27a984f151c61a88bd4e1852945be443b0845ca46b228f5e7100bfb1c07f08183c71441f2bed5f3c27b3392ca8c7c700c466da72145ec448227f3e1a934a13e44fbaf279b0581a9a0cecad574f5cd9230657bc39027faa445caa7c2eb189b64b0686928882b301b1c9536a460648369476cccea649f6905a6d488e1b75f18d335b322736776e79c6c3a4e4d4d68fadd7e5aea935198de2fd740a095980e6c43401b8d9ca01450a1ee74157c293db8fb7c81138ce5ea5d5145d7800a71141d5c5babba17a1899c2a0a2efb13b88e84433f490550282f8a3732a462caf1903627eca2ee1340e21db7c246d96ad5c3c28c8570a4c0d45683380872c4b6d82c140ef806fdae25c4209d9839a39c561805bfc9a4ae4b6a06f539bc41d9e4527cb6fa95876c4ea8a713a427f34fd8f9a74384587f97b92e408ffd28baad5941aea40b341b148cb01c5c7c417ea547d904701351e2d62c4a01382c2c371d2f56c8255d5f4b2d1fc6e058abf5e7e936846108e47e4716ac813b15e41b5ec628ccd38cb4e09b8c4f85cf4e77581b475b4cc166b22c337d21d525a377649470cc5e1753514b7b600d1c7332fd6a98045c45d2a3a69e671b6c822032ff14213d471363d5b4c8f53cfe8c57c565515727ffc38884f96d87ca032ccd85275f0309f41742386893096f0bf0226e933b038ab01d3ea78d77c4b31e758e987447c94fc1a699244dd957cee8b11e474820e1be95cbd9e9548dbf6687861d992298f4e735ec38d5f5d17d3c22c41bae99270d143909bd180e214223645f04e580925b21abdad35e9345f0f501fb8820bcfbf97412d49d2181fcdf28dbab1e8c35fadd7b8365d33f529dea21eb48aba9c4011dcc4675050c5055951563d1ffe63fbbf1e2f54e74e28cab8289095b673ee85f5ee180b5495388fb5e32bd857213c0af4c0ce09fee0fbbaddb6b182766cf54462f69e5c22bb983b6c73ef035071788c8025aef64e137641f079fa387b23b5f844ac59dbb96dd1d1185df918df55d6c39da38ef4edc5bbaac9ffb218a0469f151ad40476d121fa6c38dacc094ce5235d3eba912ce8971f798f5515332d62076e85d35790f5f9490cefcd4a4c30e7f9d1fb0fc3fa9d926350047c708111247935184189fb4707c054ed6cd54425e52e13d89c815d94fd504b10f6574467cbca7d76bc6077f9d6fd413eac1c9688ec0292fb0a05c4ee8ac2988fa8d4e9fdbac247fae79d1ab6b9308f73c359bf23de56615daf22eb32c0fa1d7c1e3be1ae5941e230bdadcac92094afc334bb759eb5467930cb8333f695497940fdae2c9d1ee554f4483d5f5000151ae7407a5196f92eb8b535ec0bde77918ced3d705e08db31d60a148df506dc5a5bb25a420dead9656ae4a739271384bbdb8add56560cc6ca587813575a0b58e87fe29b1c0473d7bce85c2799e6eb0636b22238ab933d7cbbccdd837fee57230106eb451d38365c5449815a448dcd5146d960beb60fc8863c0e447a0cfb82ec293bcca5ae3c5a639a6966b883fd1ece91f0eade2bd86a0e19df4b849d54480cd5cc9642ddaf2def10461273d6ca093eb492bd2c372e7bfc6f11aee466c36283d39d8ff72035c28fe352966d4560a71616476336f09b7a0d70c733a140bdbdb2a20f40b3642c30076266954a7b5bffb354f4bf145374f8a984051172f8cd050fb4176bcdb86015617e932bad7f9b924629f4bd06f4050c32393f947a9c3c5ca47ceade447a8f5c6bd7f1f53a6974442fa6138343f0f881d85f5a59fcb38ebc4c1470beb5b5ad7749d1bf18461c553a0612c535941e9370681c1fdffb84bba28342a225113bfc05b6083cf18c79cd02cd64f17fe67e995bec5598f6da35fdfa9f235f3659d796649f4adab2d26ef9c13e97f23a7ebe4f82f978b43e6b2e551f193acacbb7e878bd8e6b579addb085ec67866422ac750b11355d961a6904ccc4524aa3600779681574ce6a2171df0455c6d3d81a0079315a3cc5fc9320698c68686a04b4397a1680a9204963b4ffd5bb0dfeb30597f7ccf8fb84d923f6c17532fcf492a0dbaadb61fa3c80101736e657c8a743bf3fb7b51ad8a9797ac9c83554c2d59db816c518e3639497efb666cefc56c2f9091a2629e99d4e07afa2043294d9df6a473fb88faec7528f25dd30a92306c5546e6ce253cc5d9dc60856a66d564f21fa05b0e5b48c9f21d154cb06633233102fdf956f44d7378c13517f8280a95c28174cc1f46973c1563a402f014882b67aad3c8db0e45c2ff7c2ed092c7951a9be7a8e578331273fe2d5dbd751195b55cb5c03764b26f4795a49db19cb07a8ed6d71aa40e4ac67667edef05ff6d21d0a2baa62171741ef518313e42d6d61f17e01a07dc93dd395f4a62bb5171d875afa5955e2e011e5259a896ccd010847e190da94f5e34625bb0942964df9c0cab3e68fb1bfd80925d8d00cea6476da996a2b66373bdf757a45fe2a3fe6bf296f4c"}, @NFTA_TARGET_INFO={0xb5, 0x3, "3f25542ac739307423809f6503ac6d4656304c04e3522afe03e5e9cd9e7e9bb3b03932cc64021daa36b8d71d312226cdf8b44bf0c97487f139b37f44de00fab5f2e7c6dfb64cf0086207af1eef745924cbafae28824ebaf3c6af4f70ac5a3cb97542d31bb037f3bdbe9496273963f13b272e2eee0f090a5f6680646ef30eaceaf499435ec2d15f93f49d9df8f06d3f7251dcfdb64cd655e6cdd50ddeec5828da4098bdfe75b9255df171406962043aad7b"}, @NFTA_TARGET_REV={0x8, 0x2, 0x1, 0x0, 0x1b}, @NFTA_TARGET_NAME={0xa, 0x1, 'smaps\x00'}, @NFTA_TARGET_INFO={0xe7, 0x3, "6c3da194c4240ccb58cf7391f223497e86f5ae67f4fd416bee585b189f5cff52c6841dfe8af0b938401f9aa73b2e5b437b2f5f3e038137b411cfb60afbbe5f4f4c92d7b66fbf724ebf32e9469d8d7b38052f317e526b9aa43a3f51b52627da13a03000da7c6e7a297614ab75b3dd7b390402fe601adc70d9dbe7d05dc46b923cbd45fb891dfcf4c51399567b5ecf6cb2be05b9caa927099a820d68feb5d72452ed889f8fb9b8ec12cc673c9462418d679de0c45aeb95a646440785ccf4f765af77b6b6a15e74a4f4617794ba15b38ed7c3c627aecdd786dd834a88691108cb58d58f2a"}, @NFTA_TARGET_INFO={0x96, 0x3, "4d01eff73fa4ba6edfa8eceea5f0b41e0aabd8fc193f11cd78d85e03ff93a26d40ffb0e384bbe8fdc8936df1c89a58f14d49cedacd3c14862fe21cd99f3d251755bedaf78fbbf624e38e49a8ec07d07a2f711dba1f5cc9a56cae61de814a7488a6c35c36b1d57dd7a78d310c529f8434e4cc72b26b8e8480e6c00c13474ee1caf548934c73219ade5316908b3b46834f4fe5"}]}}}, {0x28, 0x1, 0x0, 0x1, @dup_ipv6={{0x8}, @val={0x1c, 0x2, 0x0, 0x1, [@NFTA_DUP_SREG_ADDR={0x8, 0x1, 0x1, 0x0, 0x45d5c5aad9c0d2c6}, @NFTA_DUP_SREG_ADDR={0x8, 0x1, 0x1, 0x0, 0x12}, @NFTA_DUP_SREG_DEV={0x8, 0x2, 0x1, 0x0, 0xe}]}}}]}]}], {0x14}}, 0x423c}, 0x1, 0x0, 0x0, 0x8814}, 0x4000)
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r0, 0x0, 0xcf, 0x0, 0x0) (async)
sendmsg$NFQNL_MSG_VERDICT_BATCH(r0, &(0x7f0000005700)={&(0x7f0000001180)={0x10, 0x0, 0x0, 0x20400}, 0xc, &(0x7f0000001240)={&(0x7f00000011c0)={0x64, 0x3, 0x3, 0x101, 0x0, 0x0, {0xa, 0x0, 0x3}, [@NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0xffffffc0}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x4}, @NFQA_VERDICT_HDR={0xc, 0x2, {0xfffffffffffffffe, 0x7}}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x80000000}, @NFQA_VERDICT_HDR={0xc, 0x2, {0xfffffffffffffffd, 0xff}}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x3}, @NFQA_VERDICT_HDR={0xc, 0x2, {0xfffffffffffffffe, 0x4}}, @NFQA_VERDICT_HDR={0xc, 0x2, {0xfffffffffffffffd, 0x90}}]}, 0x64}, 0x1, 0x0, 0x0, 0x20020082}, 0x4000000) (async, rerun: 64)
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00') (rerun: 64)
read$qrtrtun(r1, &(0x7f00000000c0)=""/4096, 0x1000)
sendmsg$IPCTNL_MSG_EXP_DELETE(r1, &(0x7f0000001140)={&(0x7f00000010c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000001100)={&(0x7f0000005500)={0x1c4, 0x2, 0x2, 0x801, 0x0, 0x0, {0x0, 0x0, 0x5}, [@CTA_EXPECT_MASK={0x64, 0x3, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x11}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8, 0x2, @rand_addr=0x64010102}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @ipv4={'\x00', '\xff\xff', @private=0xa010100}}, {0x14, 0x4, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}]}, @CTA_EXPECT_TUPLE={0x88, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @private1}, {0x14, 0x4, @remote}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @broadcast}, {0x8, 0x2, @broadcast}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x8, 0x2, @rand_addr=0x64010100}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x3a}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x8, 0x2, @loopback}}}]}, @CTA_EXPECT_FN={0x8, 0xb, 'sip\x00'}, @CTA_EXPECT_HELP_NAME={0xf, 0x6, 'netbios-ns\x00'}, @CTA_EXPECT_FN={0xa, 0xb, 'Q.931\x00'}, @CTA_EXPECT_NAT={0x1c, 0xa, 0x0, 0x1, [@CTA_EXPECT_NAT_DIR={0x8}, @CTA_EXPECT_NAT_DIR={0x8, 0x1, 0x1, 0x0, 0x1}, @CTA_EXPECT_NAT_DIR={0x8, 0x1, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_HELP_NAME={0xe, 0x6, 'ftp-20000\x00'}, @CTA_EXPECT_ZONE={0x6, 0x7, 0x1, 0x0, 0x4}, @CTA_EXPECT_FN={0x8, 0xb, 'sip\x00'}, @CTA_EXPECT_TUPLE={0x64, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @ipv4={'\x00', '\xff\xff', @multicast2}}, {0x14, 0x4, @mcast2}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @private2={0xfc, 0x2, '\x00', 0x1}}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}]}]}, 0x1c4}, 0x1, 0x0, 0x0, 0x20000000}, 0x2)
03:50:52 executing program 4:
r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$NBD_CMD_CONNECT(r0, &(0x7f00000010c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x20, 0x0, 0x128, 0x70b92d, 0x25dfdbff, {}, [@NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0xed}]}, 0x20}, 0x1, 0x0, 0x0, 0x80}, 0x24008882)
r1 = getpid()
r2 = syz_open_procfs(r1, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r2, &(0x7f00000000c0)=""/4096, 0x1000)
r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000001100), 0x101000, 0x0)
sendmsg$NFULNL_MSG_CONFIG(r3, &(0x7f0000001240)={&(0x7f0000001140)={0x10, 0x0, 0x0, 0x2a082}, 0xc, &(0x7f0000001200)={&(0x7f0000001180)={0x50, 0x1, 0x4, 0x201, 0x0, 0x0, {0x7, 0x0, 0x5}, [@NFULA_CFG_NLBUFSIZ={0x8, 0x3, 0x1, 0x0, 0x100}, @NFULA_CFG_NLBUFSIZ={0x8, 0x3, 0x1, 0x0, 0x7}, @NFULA_CFG_NLBUFSIZ={0x8, 0x3, 0x1, 0x0, 0xbe}, @NFULA_CFG_FLAGS={0x6, 0x6, 0x1, 0x0, 0x1}, @NFULA_CFG_QTHRESH={0x8, 0x5, 0x1, 0x0, 0x875f}, @NFULA_CFG_FLAGS={0x6, 0x6, 0x1, 0x0, 0x5}, @NFULA_CFG_MODE={0xa, 0x2, {0x3, 0x1}}]}, 0x50}, 0x1, 0x0, 0x0, 0x48001}, 0x20000010)
03:50:52 executing program 3:
bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0)
03:50:52 executing program 2:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:52 executing program 5:
r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/netfilter\x00')
read$qrtrtun(r0, &(0x7f0000000040)=""/85, 0x55)
read$qrtrtun(r0, &(0x7f00000000c0)=""/156, 0x9c)
mmap$qrtrtun(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1000006, 0x30, r0, 0x0)
ioctl$BLKSECTGET(r0, 0x1267, &(0x7f00000001c0))
ioctl$BLKRAGET(r0, 0x1263, &(0x7f0000000000))
bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000240)={0x4}, 0x8)
ioctl$BLKSECTGET(r0, 0x1267, &(0x7f0000000280))
write$qrtrtun(0xffffffffffffffff, &(0x7f0000000180)="233488a4c84b91d9e75be3e85319a1dac75761247fe75cf709c603ea1ac357590f28480aca91c3e85d8feff349c057fc5aff3151bef49c7e7e9119bfee", 0x3d)
syz_open_procfs(0x0, &(0x7f0000000200)='net/netfilter\x00') (async)
read$qrtrtun(r0, &(0x7f0000000040)=""/85, 0x55) (async)
read$qrtrtun(r0, &(0x7f00000000c0)=""/156, 0x9c) (async)
mmap$qrtrtun(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1000006, 0x30, r0, 0x0) (async)
ioctl$BLKSECTGET(r0, 0x1267, &(0x7f00000001c0)) (async)
ioctl$BLKRAGET(r0, 0x1263, &(0x7f0000000000)) (async)
bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000240)={0x4}, 0x8) (async)
ioctl$BLKSECTGET(r0, 0x1267, &(0x7f0000000280)) (async)
write$qrtrtun(0xffffffffffffffff, &(0x7f0000000180)="233488a4c84b91d9e75be3e85319a1dac75761247fe75cf709c603ea1ac357590f28480aca91c3e85d8feff349c057fc5aff3151bef49c7e7e9119bfee", 0x3d) (async)
03:50:52 executing program 2:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa}], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:52 executing program 4:
syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) (async)
r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$NBD_CMD_CONNECT(r0, &(0x7f00000010c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x20, 0x0, 0x128, 0x70b92d, 0x25dfdbff, {}, [@NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0xed}]}, 0x20}, 0x1, 0x0, 0x0, 0x80}, 0x24008882)
r1 = getpid()
syz_open_procfs(r1, &(0x7f0000001280)='smaps\x00') (async)
r2 = syz_open_procfs(r1, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r2, &(0x7f00000000c0)=""/4096, 0x1000)
r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000001100), 0x101000, 0x0)
sendmsg$NFULNL_MSG_CONFIG(r3, &(0x7f0000001240)={&(0x7f0000001140)={0x10, 0x0, 0x0, 0x2a082}, 0xc, &(0x7f0000001200)={&(0x7f0000001180)={0x50, 0x1, 0x4, 0x201, 0x0, 0x0, {0x7, 0x0, 0x5}, [@NFULA_CFG_NLBUFSIZ={0x8, 0x3, 0x1, 0x0, 0x100}, @NFULA_CFG_NLBUFSIZ={0x8, 0x3, 0x1, 0x0, 0x7}, @NFULA_CFG_NLBUFSIZ={0x8, 0x3, 0x1, 0x0, 0xbe}, @NFULA_CFG_FLAGS={0x6, 0x6, 0x1, 0x0, 0x1}, @NFULA_CFG_QTHRESH={0x8, 0x5, 0x1, 0x0, 0x875f}, @NFULA_CFG_FLAGS={0x6, 0x6, 0x1, 0x0, 0x5}, @NFULA_CFG_MODE={0xa, 0x2, {0x3, 0x1}}]}, 0x50}, 0x1, 0x0, 0x0, 0x48001}, 0x20000010)
03:50:52 executing program 3:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x0, 0x0, &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:52 executing program 2:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:52 executing program 4:
r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$NBD_CMD_CONNECT(r0, &(0x7f00000010c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x20, 0x0, 0x128, 0x70b92d, 0x25dfdbff, {}, [@NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0xed}]}, 0x20}, 0x1, 0x0, 0x0, 0x80}, 0x24008882)
r1 = getpid()
r2 = syz_open_procfs(r1, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r2, &(0x7f00000000c0)=""/4096, 0x1000)
openat$bsg(0xffffffffffffff9c, &(0x7f0000001100), 0x101000, 0x0) (async)
r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000001100), 0x101000, 0x0)
sendmsg$NFULNL_MSG_CONFIG(r3, &(0x7f0000001240)={&(0x7f0000001140)={0x10, 0x0, 0x0, 0x2a082}, 0xc, &(0x7f0000001200)={&(0x7f0000001180)={0x50, 0x1, 0x4, 0x201, 0x0, 0x0, {0x7, 0x0, 0x5}, [@NFULA_CFG_NLBUFSIZ={0x8, 0x3, 0x1, 0x0, 0x100}, @NFULA_CFG_NLBUFSIZ={0x8, 0x3, 0x1, 0x0, 0x7}, @NFULA_CFG_NLBUFSIZ={0x8, 0x3, 0x1, 0x0, 0xbe}, @NFULA_CFG_FLAGS={0x6, 0x6, 0x1, 0x0, 0x1}, @NFULA_CFG_QTHRESH={0x8, 0x5, 0x1, 0x0, 0x875f}, @NFULA_CFG_FLAGS={0x6, 0x6, 0x1, 0x0, 0x5}, @NFULA_CFG_MODE={0xa, 0x2, {0x3, 0x1}}]}, 0x50}, 0x1, 0x0, 0x0, 0x48001}, 0x20000010) (async)
sendmsg$NFULNL_MSG_CONFIG(r3, &(0x7f0000001240)={&(0x7f0000001140)={0x10, 0x0, 0x0, 0x2a082}, 0xc, &(0x7f0000001200)={&(0x7f0000001180)={0x50, 0x1, 0x4, 0x201, 0x0, 0x0, {0x7, 0x0, 0x5}, [@NFULA_CFG_NLBUFSIZ={0x8, 0x3, 0x1, 0x0, 0x100}, @NFULA_CFG_NLBUFSIZ={0x8, 0x3, 0x1, 0x0, 0x7}, @NFULA_CFG_NLBUFSIZ={0x8, 0x3, 0x1, 0x0, 0xbe}, @NFULA_CFG_FLAGS={0x6, 0x6, 0x1, 0x0, 0x1}, @NFULA_CFG_QTHRESH={0x8, 0x5, 0x1, 0x0, 0x875f}, @NFULA_CFG_FLAGS={0x6, 0x6, 0x1, 0x0, 0x5}, @NFULA_CFG_MODE={0xa, 0x2, {0x3, 0x1}}]}, 0x50}, 0x1, 0x0, 0x0, 0x48001}, 0x20000010)
03:50:52 executing program 5:
r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/netfilter\x00')
read$qrtrtun(r0, &(0x7f0000000040)=""/85, 0x55) (async)
read$qrtrtun(r0, &(0x7f00000000c0)=""/156, 0x9c)
mmap$qrtrtun(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1000006, 0x30, r0, 0x0)
ioctl$BLKSECTGET(r0, 0x1267, &(0x7f00000001c0)) (async)
ioctl$BLKRAGET(r0, 0x1263, &(0x7f0000000000)) (async)
bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000240)={0x4}, 0x8) (async)
ioctl$BLKSECTGET(r0, 0x1267, &(0x7f0000000280)) (async)
write$qrtrtun(0xffffffffffffffff, &(0x7f0000000180)="233488a4c84b91d9e75be3e85319a1dac75761247fe75cf709c603ea1ac357590f28480aca91c3e85d8feff349c057fc5aff3151bef49c7e7e9119bfee", 0x3d)
03:50:52 executing program 3:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x0, 0x0, &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:52 executing program 0:
r0 = getpid()
r1 = getpid()
kcmp$KCMP_EPOLL_TFD(r1, r0, 0x7, 0xffffffffffffffff, &(0x7f0000001840))
r2 = syz_open_procfs(r1, &(0x7f0000000000)='net/ipv6_route\x00')
ioctl$IOC_WATCH_QUEUE_SET_SIZE(r2, 0x5760, 0x2)
read$qrtrtun(r2, &(0x7f00000000c0)=""/4096, 0x1000)
03:50:52 executing program 2:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc}], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:52 executing program 2:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd}], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:52 executing program 3:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x0, 0x0, &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:52 executing program 5:
r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/protocols\x00')
read$qrtrtun(r0, &(0x7f0000000040)=""/85, 0x55)
read$qrtrtun(r0, &(0x7f00000000c0)=""/156, 0x9c)
03:50:52 executing program 0:
r0 = getpid()
r1 = getpid()
kcmp$KCMP_EPOLL_TFD(r1, r0, 0x7, 0xffffffffffffffff, &(0x7f0000001840))
r2 = syz_open_procfs(r1, &(0x7f0000000000)='net/ipv6_route\x00')
ioctl$IOC_WATCH_QUEUE_SET_SIZE(r2, 0x5760, 0x2)
read$qrtrtun(r2, &(0x7f00000000c0)=""/4096, 0x1000)
getpid() (async)
getpid() (async)
kcmp$KCMP_EPOLL_TFD(r1, r0, 0x7, 0xffffffffffffffff, &(0x7f0000001840)) (async)
syz_open_procfs(r1, &(0x7f0000000000)='net/ipv6_route\x00') (async)
ioctl$IOC_WATCH_QUEUE_SET_SIZE(r2, 0x5760, 0x2) (async)
read$qrtrtun(r2, &(0x7f00000000c0)=""/4096, 0x1000) (async)
03:50:52 executing program 4:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
r1 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPCTNL_MSG_CT_GET(r1, &(0x7f0000001100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x30d8d9f6a7f8eac2}, 0xc, &(0x7f00000010c0)={&(0x7f0000000040)={0x50, 0x1, 0x1, 0x301, 0x0, 0x0, {0xa, 0x0, 0x5}, [@CTA_SYNPROXY={0xc, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x9}]}, @CTA_TUPLE_REPLY={0x30, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @local}, {0x14, 0x4, @mcast2}}}]}]}, 0x50}, 0x1, 0x0, 0x0, 0x4}, 0x20000044)
03:50:52 executing program 1:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
r1 = syz_io_uring_setup(0x2832, &(0x7f0000000000)={0x0, 0xea97, 0x0, 0x1, 0x3b6}, &(0x7f0000000080), &(0x7f00000010c0)=0x0)
syz_io_uring_setup(0x75, &(0x7f0000001180)={0x0, 0x3325, 0x0, 0x2, 0xcf, 0x0, r1}, &(0x7f0000001200), &(0x7f0000001240))
syz_io_uring_submit(0x0, r2, &(0x7f0000001140)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r0, 0x0, &(0x7f0000001100)="0d2f7535ab1d4cd7d30fb8ddc02fe5ca0a4ad7f725fcc9d1", 0x18, 0x2130})
epoll_create1(0x0)
03:50:53 executing program 1:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000) (async)
r1 = syz_io_uring_setup(0x2832, &(0x7f0000000000)={0x0, 0xea97, 0x0, 0x1, 0x3b6}, &(0x7f0000000080), &(0x7f00000010c0)=0x0)
syz_io_uring_setup(0x75, &(0x7f0000001180)={0x0, 0x3325, 0x0, 0x2, 0xcf, 0x0, r1}, &(0x7f0000001200), &(0x7f0000001240)) (async)
syz_io_uring_submit(0x0, r2, &(0x7f0000001140)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r0, 0x0, &(0x7f0000001100)="0d2f7535ab1d4cd7d30fb8ddc02fe5ca0a4ad7f725fcc9d1", 0x18, 0x2130}) (async)
epoll_create1(0x0)
03:50:53 executing program 3:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x0, &(0x7f0000001240), &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:53 executing program 5:
r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/protocols\x00')
read$qrtrtun(r0, &(0x7f0000000040)=""/85, 0x55) (async)
read$qrtrtun(r0, &(0x7f0000000040)=""/85, 0x55)
read$qrtrtun(r0, &(0x7f00000000c0)=""/156, 0x9c)
03:50:53 executing program 2:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe}], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:53 executing program 5:
r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/protocols\x00')
read$qrtrtun(r0, &(0x7f0000000040)=""/85, 0x55) (async)
read$qrtrtun(r0, &(0x7f00000000c0)=""/156, 0x9c)
03:50:53 executing program 2:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:53 executing program 0:
r0 = getpid()
r1 = getpid()
kcmp$KCMP_EPOLL_TFD(r1, r0, 0x7, 0xffffffffffffffff, &(0x7f0000001840)) (async)
r2 = syz_open_procfs(r1, &(0x7f0000000000)='net/ipv6_route\x00')
ioctl$IOC_WATCH_QUEUE_SET_SIZE(r2, 0x5760, 0x2) (async)
read$qrtrtun(r2, &(0x7f00000000c0)=""/4096, 0x1000)
03:50:53 executing program 3:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x0, &(0x7f0000001240), &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:53 executing program 1:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000) (async)
r1 = syz_io_uring_setup(0x2832, &(0x7f0000000000)={0x0, 0xea97, 0x0, 0x1, 0x3b6}, &(0x7f0000000080), &(0x7f00000010c0)=0x0)
syz_io_uring_setup(0x75, &(0x7f0000001180)={0x0, 0x3325, 0x0, 0x2, 0xcf, 0x0, r1}, &(0x7f0000001200), &(0x7f0000001240)) (async)
syz_io_uring_submit(0x0, r2, &(0x7f0000001140)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r0, 0x0, &(0x7f0000001100)="0d2f7535ab1d4cd7d30fb8ddc02fe5ca0a4ad7f725fcc9d1", 0x18, 0x2130}) (async)
epoll_create1(0x0)
03:50:53 executing program 5:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r0, 0x0, 0xcf, 0x0, 0x0)
bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x4, &(0x7f00000000c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x3}, [@ldst={0x1, 0x1, 0x7, 0x1, 0x7, 0xfffffffffffffff0, 0xfffffffffffffffc}]}, &(0x7f0000000100)='GPL\x00', 0x1, 0x1000, &(0x7f0000000140)=""/4096, 0x41000, 0x1, '\x00', 0x0, 0x25, r0, 0x8, &(0x7f0000001140)={0x1, 0x1}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, &(0x7f0000001180)=[{0x4, 0x4, 0xf}, {0x0, 0x2, 0x9, 0x9}, {0x4, 0x3, 0xd, 0xb}, {0x2, 0x5, 0x10, 0xa}, {0x3, 0x3, 0x8, 0xa}], 0x10, 0x7}, 0x90)
r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/protocols\x00')
write$P9_RCREATE(r1, &(0x7f00000012c0)={0x18, 0x73, 0x2, {{0x10, 0x2, 0x5}, 0x5}}, 0x18)
read$qrtrtun(r1, &(0x7f0000000040)=""/85, 0x55)
03:50:53 executing program 4:
syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00') (async)
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
r1 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPCTNL_MSG_CT_GET(r1, &(0x7f0000001100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x30d8d9f6a7f8eac2}, 0xc, &(0x7f00000010c0)={&(0x7f0000000040)={0x50, 0x1, 0x1, 0x301, 0x0, 0x0, {0xa, 0x0, 0x5}, [@CTA_SYNPROXY={0xc, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x9}]}, @CTA_TUPLE_REPLY={0x30, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @local}, {0x14, 0x4, @mcast2}}}]}]}, 0x50}, 0x1, 0x0, 0x0, 0x4}, 0x20000044)
03:50:53 executing program 2:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11}], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:53 executing program 3:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x0, &(0x7f0000001240), &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:53 executing program 2:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x12}], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:53 executing program 0:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='net/igmp\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0xee00, 0xee00}}, './file0\x00'})
write$qrtrtun(r1, &(0x7f00000010c0)="6795fee6280b4fbaff66adb7ae2ea140e992ca3b7e29ba01aa730c173e4fed1cc0d2fc92ef28f5a784b13e09139c9f9cf6db35604e926d428baae3d34e3f9577a8f7a2b380f2b333518e4c966640319c8726347ae91bdcd227c0399e3d92f9bff700976b46d748c004390436c7534f4ab9646c4c6276540c62cc8401cde250a51626d5af8d29c054b2e8820f371ac59743e4e02fc9c5dc9910e210b32a1c2f83ac75a2d2d5ccce9bff080b0c0baa8dd3e42fe5d911d7a7be19cd062e44b84ad95cd8bafaf7a31a064f0b6b1b85814fcb9d74e8e18109b0b1b7fadf79eafa2b673d6afd543fbd831dd81a41902171670afbf6", 0xf2)
add_key$user(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000011c0)="1deb6596963ff7f15990b6d13ac44752c5e25a98e79d41946df24992350c2586c5c587d2a7e9828d2379d024cadc9a927f6d93d925750334cf0024a7da501183f51b363d68a12a4eb3ed8be2cce5e2714b7ca32aef9b7e3f5e716500f3a56d36852e77bddf98fba9793f2182826345b7b3ff5ec628fa86fdc08409d0393244da3fa3956bdd229df9e28975895ed0bd61f56580bf17238c8bcf1074de855465d0", 0xa0, 0xfffffffffffffffb)
03:50:53 executing program 5:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r0, 0x0, 0xcf, 0x0, 0x0)
bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x4, &(0x7f00000000c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x3}, [@ldst={0x1, 0x1, 0x7, 0x1, 0x7, 0xfffffffffffffff0, 0xfffffffffffffffc}]}, &(0x7f0000000100)='GPL\x00', 0x1, 0x1000, &(0x7f0000000140)=""/4096, 0x41000, 0x1, '\x00', 0x0, 0x25, r0, 0x8, &(0x7f0000001140)={0x1, 0x1}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, &(0x7f0000001180)=[{0x4, 0x4, 0xf}, {0x0, 0x2, 0x9, 0x9}, {0x4, 0x3, 0xd, 0xb}, {0x2, 0x5, 0x10, 0xa}, {0x3, 0x3, 0x8, 0xa}], 0x10, 0x7}, 0x90) (async)
r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/protocols\x00')
write$P9_RCREATE(r1, &(0x7f00000012c0)={0x18, 0x73, 0x2, {{0x10, 0x2, 0x5}, 0x5}}, 0x18)
read$qrtrtun(r1, &(0x7f0000000040)=""/85, 0x55)
03:50:53 executing program 0:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='net/igmp\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000) (async)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0xee00, 0xee00}}, './file0\x00'})
write$qrtrtun(r1, &(0x7f00000010c0)="6795fee6280b4fbaff66adb7ae2ea140e992ca3b7e29ba01aa730c173e4fed1cc0d2fc92ef28f5a784b13e09139c9f9cf6db35604e926d428baae3d34e3f9577a8f7a2b380f2b333518e4c966640319c8726347ae91bdcd227c0399e3d92f9bff700976b46d748c004390436c7534f4ab9646c4c6276540c62cc8401cde250a51626d5af8d29c054b2e8820f371ac59743e4e02fc9c5dc9910e210b32a1c2f83ac75a2d2d5ccce9bff080b0c0baa8dd3e42fe5d911d7a7be19cd062e44b84ad95cd8bafaf7a31a064f0b6b1b85814fcb9d74e8e18109b0b1b7fadf79eafa2b673d6afd543fbd831dd81a41902171670afbf6", 0xf2) (async)
add_key$user(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000011c0)="1deb6596963ff7f15990b6d13ac44752c5e25a98e79d41946df24992350c2586c5c587d2a7e9828d2379d024cadc9a927f6d93d925750334cf0024a7da501183f51b363d68a12a4eb3ed8be2cce5e2714b7ca32aef9b7e3f5e716500f3a56d36852e77bddf98fba9793f2182826345b7b3ff5ec628fa86fdc08409d0393244da3fa3956bdd229df9e28975895ed0bd61f56580bf17238c8bcf1074de855465d0", 0xa0, 0xfffffffffffffffb)
03:50:53 executing program 1:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
write$P9_RWALK(r0, &(0x7f0000000040)={0x64, 0x6f, 0x2, {0x7, [{0x4, 0x3}, {0x40, 0x3, 0x5}, {0x82, 0x2, 0x7}, {0x2, 0x2, 0x3}, {0x40, 0x1, 0x1}, {0x10, 0x1}, {0x8, 0x4, 0x3}]}}, 0x64)
openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0)
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
03:50:53 executing program 3:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:53 executing program 2:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18}], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:53 executing program 3:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:53 executing program 1:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
write$P9_RWALK(r0, &(0x7f0000000040)={0x64, 0x6f, 0x2, {0x7, [{0x4, 0x3}, {0x40, 0x3, 0x5}, {0x82, 0x2, 0x7}, {0x2, 0x2, 0x3}, {0x40, 0x1, 0x1}, {0x10, 0x1}, {0x8, 0x4, 0x3}]}}, 0x64)
openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async)
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
03:50:53 executing program 4:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000) (async)
r1 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPCTNL_MSG_CT_GET(r1, &(0x7f0000001100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x30d8d9f6a7f8eac2}, 0xc, &(0x7f00000010c0)={&(0x7f0000000040)={0x50, 0x1, 0x1, 0x301, 0x0, 0x0, {0xa, 0x0, 0x5}, [@CTA_SYNPROXY={0xc, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x9}]}, @CTA_TUPLE_REPLY={0x30, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @local}, {0x14, 0x4, @mcast2}}}]}]}, 0x50}, 0x1, 0x0, 0x0, 0x4}, 0x20000044)
03:50:53 executing program 3:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:53 executing program 1:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
write$P9_RWALK(r0, &(0x7f0000000040)={0x64, 0x6f, 0x2, {0x7, [{0x4, 0x3}, {0x40, 0x3, 0x5}, {0x82, 0x2, 0x7}, {0x2, 0x2, 0x3}, {0x40, 0x1, 0x1}, {0x10, 0x1}, {0x8, 0x4, 0x3}]}}, 0x64)
openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async)
openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0)
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
03:50:53 executing program 5:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r0, 0x0, 0xcf, 0x0, 0x0) (async)
bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x4, &(0x7f00000000c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x3}, [@ldst={0x1, 0x1, 0x7, 0x1, 0x7, 0xfffffffffffffff0, 0xfffffffffffffffc}]}, &(0x7f0000000100)='GPL\x00', 0x1, 0x1000, &(0x7f0000000140)=""/4096, 0x41000, 0x1, '\x00', 0x0, 0x25, r0, 0x8, &(0x7f0000001140)={0x1, 0x1}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, &(0x7f0000001180)=[{0x4, 0x4, 0xf}, {0x0, 0x2, 0x9, 0x9}, {0x4, 0x3, 0xd, 0xb}, {0x2, 0x5, 0x10, 0xa}, {0x3, 0x3, 0x8, 0xa}], 0x10, 0x7}, 0x90) (async)
r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/protocols\x00')
write$P9_RCREATE(r1, &(0x7f00000012c0)={0x18, 0x73, 0x2, {{0x10, 0x2, 0x5}, 0x5}}, 0x18)
read$qrtrtun(r1, &(0x7f0000000040)=""/85, 0x55)
03:50:53 executing program 0:
syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='net/igmp\x00') (async)
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='net/igmp\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0xee00, 0xee00}}, './file0\x00'})
write$qrtrtun(r1, &(0x7f00000010c0)="6795fee6280b4fbaff66adb7ae2ea140e992ca3b7e29ba01aa730c173e4fed1cc0d2fc92ef28f5a784b13e09139c9f9cf6db35604e926d428baae3d34e3f9577a8f7a2b380f2b333518e4c966640319c8726347ae91bdcd227c0399e3d92f9bff700976b46d748c004390436c7534f4ab9646c4c6276540c62cc8401cde250a51626d5af8d29c054b2e8820f371ac59743e4e02fc9c5dc9910e210b32a1c2f83ac75a2d2d5ccce9bff080b0c0baa8dd3e42fe5d911d7a7be19cd062e44b84ad95cd8bafaf7a31a064f0b6b1b85814fcb9d74e8e18109b0b1b7fadf79eafa2b673d6afd543fbd831dd81a41902171670afbf6", 0xf2)
add_key$user(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000011c0)="1deb6596963ff7f15990b6d13ac44752c5e25a98e79d41946df24992350c2586c5c587d2a7e9828d2379d024cadc9a927f6d93d925750334cf0024a7da501183f51b363d68a12a4eb3ed8be2cce5e2714b7ca32aef9b7e3f5e716500f3a56d36852e77bddf98fba9793f2182826345b7b3ff5ec628fa86fdc08409d0393244da3fa3956bdd229df9e28975895ed0bd61f56580bf17238c8bcf1074de855465d0", 0xa0, 0xfffffffffffffffb)
03:50:53 executing program 2:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25}], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:53 executing program 3:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst={0x5}], 0x0, 0xb}, 0x90)
03:50:53 executing program 0:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/xfrm_stat\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
03:50:53 executing program 1:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
write$qrtrtun(r0, &(0x7f0000000000)="5b5f2744eb1344e37a9bd21da40f735181babb93534b084cfdcd380593d6268115569ca74432ed7d5cb07dbcf8c1921f16f4dd11afdfdcc11211f43f436ff985919cc50ea1de55a1b56e519f5f81c46428181fdc0ee54603f14dfe1773dc59b7fbf105174f3287a41bdb7bce5965efa7a171f721912384213a3503c0e1eb5292eebfa5dd3e153cfbf9beda612c0847ab3125423ac759ed6ebea2a8ea288a", 0x9e)
03:50:53 executing program 0:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/xfrm_stat\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/xfrm_stat\x00') (async)
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000) (async)
03:50:53 executing program 2:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2a}], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:53 executing program 0:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/xfrm_stat\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/xfrm_stat\x00') (async)
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000) (async)
03:50:53 executing program 4:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000012c0)=""/4148, 0x1034)
03:50:53 executing program 2:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48}], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:53 executing program 0:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
r1 = accept4$phonet_pipe(r0, &(0x7f0000000000), &(0x7f0000000040)=0x10, 0x80800)
accept4$phonet_pipe(r1, &(0x7f0000000080), &(0x7f00000010c0)=0x10, 0x80800)
03:50:53 executing program 3:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst={0x5}], 0x0, 0xb}, 0x90)
03:50:53 executing program 5:
r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/protocols\x00')
r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000180)={0x2, 0x4, 0x8, 0x1, 0x80, r0, 0x401, '\x00', 0x0, r0, 0x4, 0x1, 0x3}, 0x48)
bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000000)={r1}, 0x4)
read$qrtrtun(r0, &(0x7f0000000040)=""/85, 0x55)
read$qrtrtun(r0, &(0x7f00000000c0)=""/156, 0x9c)
03:50:53 executing program 1:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000) (async)
write$qrtrtun(r0, &(0x7f0000000000)="5b5f2744eb1344e37a9bd21da40f735181babb93534b084cfdcd380593d6268115569ca74432ed7d5cb07dbcf8c1921f16f4dd11afdfdcc11211f43f436ff985919cc50ea1de55a1b56e519f5f81c46428181fdc0ee54603f14dfe1773dc59b7fbf105174f3287a41bdb7bce5965efa7a171f721912384213a3503c0e1eb5292eebfa5dd3e153cfbf9beda612c0847ab3125423ac759ed6ebea2a8ea288a", 0x9e)
03:50:53 executing program 1:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
write$qrtrtun(r0, &(0x7f0000000000)="5b5f2744eb1344e37a9bd21da40f735181babb93534b084cfdcd380593d6268115569ca74432ed7d5cb07dbcf8c1921f16f4dd11afdfdcc11211f43f436ff985919cc50ea1de55a1b56e519f5f81c46428181fdc0ee54603f14dfe1773dc59b7fbf105174f3287a41bdb7bce5965efa7a171f721912384213a3503c0e1eb5292eebfa5dd3e153cfbf9beda612c0847ab3125423ac759ed6ebea2a8ea288a", 0x9e)
03:50:53 executing program 2:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c}], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:53 executing program 5:
r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/protocols\x00')
r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000180)={0x2, 0x4, 0x8, 0x1, 0x80, r0, 0x401, '\x00', 0x0, r0, 0x4, 0x1, 0x3}, 0x48)
bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000000)={r1}, 0x4)
read$qrtrtun(r0, &(0x7f0000000040)=""/85, 0x55)
read$qrtrtun(r0, &(0x7f00000000c0)=""/156, 0x9c)
syz_open_procfs(0x0, &(0x7f0000000200)='net/protocols\x00') (async)
bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000180)={0x2, 0x4, 0x8, 0x1, 0x80, r0, 0x401, '\x00', 0x0, r0, 0x4, 0x1, 0x3}, 0x48) (async)
bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000000)={r1}, 0x4) (async)
read$qrtrtun(r0, &(0x7f0000000040)=""/85, 0x55) (async)
read$qrtrtun(r0, &(0x7f00000000c0)=""/156, 0x9c) (async)
03:50:53 executing program 3:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst={0x5}], 0x0, 0xb}, 0x90)
03:50:53 executing program 0:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000) (async)
r1 = accept4$phonet_pipe(r0, &(0x7f0000000000), &(0x7f0000000040)=0x10, 0x80800)
accept4$phonet_pipe(r1, &(0x7f0000000080), &(0x7f00000010c0)=0x10, 0x80800)
03:50:53 executing program 2:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:53 executing program 4:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000012c0)=""/4148, 0x1034)
syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00') (async)
read$qrtrtun(r0, &(0x7f00000012c0)=""/4148, 0x1034) (async)
03:50:53 executing program 0:
syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00') (async)
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
r1 = accept4$phonet_pipe(r0, &(0x7f0000000000), &(0x7f0000000040)=0x10, 0x80800)
accept4$phonet_pipe(r1, &(0x7f0000000080), &(0x7f00000010c0)=0x10, 0x80800)
03:50:53 executing program 5:
r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/protocols\x00')
r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000180)={0x2, 0x4, 0x8, 0x1, 0x80, r0, 0x401, '\x00', 0x0, r0, 0x4, 0x1, 0x3}, 0x48)
bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000000)={r1}, 0x4)
read$qrtrtun(r0, &(0x7f0000000040)=""/85, 0x55) (async)
read$qrtrtun(r0, &(0x7f00000000c0)=""/156, 0x9c)
03:50:53 executing program 3:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst={0x5}], &(0x7f0000001340)='GPL\x00'}, 0x90)
03:50:53 executing program 2:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c}], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:53 executing program 1:
r0 = getpid()
r1 = getpid()
kcmp$KCMP_EPOLL_TFD(r1, r0, 0x7, 0xffffffffffffffff, &(0x7f0000001840))
r2 = getpid()
r3 = getpid()
kcmp$KCMP_EPOLL_TFD(r3, r2, 0x7, 0xffffffffffffffff, &(0x7f0000001840))
r4 = syz_open_procfs(r2, &(0x7f0000001280)='smaps\x00')
setsockopt$MRT_DEL_MFC_PROXY(r4, 0x0, 0xd3, &(0x7f0000000080)={@loopback, @multicast2, 0x0, "59d8167d8267bbe9e6e836af2bf832f70db6a062cccfede4ca18b4b9f1e04725", 0xfff, 0x5, 0x8, 0x800}, 0x3c)
r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r5, 0x0, 0xcf, 0x0, 0x0)
bpf$BPF_PROG_QUERY(0x10, &(0x7f00000001c0)={@cgroup=r5, 0x6, 0x0, 0x5, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6, 0x0, &(0x7f0000000100)=[0x0, 0x0, 0x0], &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000180)=[0x0]}, 0x40)
pipe2$watch_queue(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80)
write$P9_RWSTAT(r6, &(0x7f0000000040)={0x7, 0x7f, 0x1}, 0x7)
03:50:53 executing program 3:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='net/igmp\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0xee00, 0xee00}}, './file0\x00'})
write$qrtrtun(r1, &(0x7f00000010c0)="6795fee6280b4fbaff66adb7ae2ea140e992ca3b7e29ba01aa730c173e4fed1cc0d2fc92ef28f5a784b13e09139c9f9cf6db35604e926d428baae3d34e3f9577a8f7a2b380f2b333518e4c966640319c8726347ae91bdcd227c0399e3d92f9bff700976b46d748c004390436c7534f4ab9646c4c6276540c62cc8401cde250a51626d5af8d29c054b2e8820f371ac59743e4e02fc9c5dc9910e210b32a1c2f83ac75a2d2d5ccce9bff080b0c0baa8dd3e42fe5d911d7a7be19cd062e44b84ad95cd8bafaf7a31a064f0b6b1b85814fcb9d74e8e18109b0b1b7fadf79eafa2b673d6afd543fbd831dd81a41902171670afbf6", 0xf2)
add_key$user(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000011c0)="1deb6596963ff7f15990b6d13ac44752c5e25a98e79d41946df24992350c2586c5c587d2a7e9828d2379d024cadc9a927f6d93d925750334cf0024a7da501183f51b363d68a12a4eb3ed8be2cce5e2714b7ca32aef9b7e3f5e716500f3a56d36852e77bddf98fba9793f2182826345b7b3ff5ec628fa86fdc08409d0393244da3fa3956bdd229df9e28975895ed0bd61f56580bf17238c8bcf1074de855465d0", 0xa0, 0xfffffffffffffffb)
03:50:53 executing program 2:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x74}], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:53 executing program 0:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
write$qrtrtun(r0, &(0x7f0000000000)="1043e16db9051b8de48b43f75afdc20b8fd0d94a340c0e2931425762716efa57c25b641c44f7e58f459cca62e56db14a7b4c3584afe575b760032beb2746d1bf4c786f32a5ae7aa99b", 0x49)
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
03:50:53 executing program 5:
r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/protocols\x00')
read$qrtrtun(r0, &(0x7f0000000040)=""/85, 0x55)
read$qrtrtun(r0, &(0x7f00000000c0)=""/156, 0x9c)
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='net/icmp6\x00')
socket$nl_netfilter(0x10, 0x3, 0xc)
bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x16, 0x6, &(0x7f0000000480)=@raw=[@map_fd={0x18, 0x6, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0xbf}, @jmp={0x5, 0x1, 0xc, 0xe8673a85ef619304, 0x9, 0x100, 0x1}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0x4, 0x0, 0x0, 0x0, 0x7}], &(0x7f0000000180)='GPL\x00', 0x8, 0xea, &(0x7f0000000240)=""/234, 0x40f00, 0x9, '\x00', 0x0, 0x24, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r0, 0x6, 0x0, &(0x7f0000000340)=[{0x0, 0x5, 0x8, 0xb}, {0x3, 0x5, 0xf, 0xc}, {0x0, 0x4, 0xf, 0x1}, {0x4, 0x2, 0x7, 0x2}, {0x3, 0x4, 0xe, 0x2}, {0x4, 0x5, 0x7, 0x7}], 0x10, 0x81}, 0x90)
socket$inet6_udp(0xa, 0x2, 0x0)
03:50:53 executing program 1:
r0 = getpid()
getpid() (async)
r1 = getpid()
kcmp$KCMP_EPOLL_TFD(r1, r0, 0x7, 0xffffffffffffffff, &(0x7f0000001840))
getpid() (async)
r2 = getpid()
getpid() (async)
r3 = getpid()
kcmp$KCMP_EPOLL_TFD(r3, r2, 0x7, 0xffffffffffffffff, &(0x7f0000001840))
r4 = syz_open_procfs(r2, &(0x7f0000001280)='smaps\x00')
setsockopt$MRT_DEL_MFC_PROXY(r4, 0x0, 0xd3, &(0x7f0000000080)={@loopback, @multicast2, 0x0, "59d8167d8267bbe9e6e836af2bf832f70db6a062cccfede4ca18b4b9f1e04725", 0xfff, 0x5, 0x8, 0x800}, 0x3c)
syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00') (async)
r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r5, 0x0, 0xcf, 0x0, 0x0)
bpf$BPF_PROG_QUERY(0x10, &(0x7f00000001c0)={@cgroup=r5, 0x6, 0x0, 0x5, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6, 0x0, &(0x7f0000000100)=[0x0, 0x0, 0x0], &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000180)=[0x0]}, 0x40)
pipe2$watch_queue(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80)
write$P9_RWSTAT(r6, &(0x7f0000000040)={0x7, 0x7f, 0x1}, 0x7)
03:50:53 executing program 4:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
read$qrtrtun(r0, &(0x7f00000012c0)=""/4148, 0x1034)
03:50:53 executing program 0:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
write$qrtrtun(r0, &(0x7f0000000000)="1043e16db9051b8de48b43f75afdc20b8fd0d94a340c0e2931425762716efa57c25b641c44f7e58f459cca62e56db14a7b4c3584afe575b760032beb2746d1bf4c786f32a5ae7aa99b", 0x49) (async)
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
03:50:53 executing program 2:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7a}], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:53 executing program 5:
r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/protocols\x00')
read$qrtrtun(r0, &(0x7f0000000040)=""/85, 0x55) (async)
read$qrtrtun(r0, &(0x7f00000000c0)=""/156, 0x9c)
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='net/icmp6\x00')
socket$nl_netfilter(0x10, 0x3, 0xc) (async)
bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x16, 0x6, &(0x7f0000000480)=@raw=[@map_fd={0x18, 0x6, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0xbf}, @jmp={0x5, 0x1, 0xc, 0xe8673a85ef619304, 0x9, 0x100, 0x1}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0x4, 0x0, 0x0, 0x0, 0x7}], &(0x7f0000000180)='GPL\x00', 0x8, 0xea, &(0x7f0000000240)=""/234, 0x40f00, 0x9, '\x00', 0x0, 0x24, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r0, 0x6, 0x0, &(0x7f0000000340)=[{0x0, 0x5, 0x8, 0xb}, {0x3, 0x5, 0xf, 0xc}, {0x0, 0x4, 0xf, 0x1}, {0x4, 0x2, 0x7, 0x2}, {0x3, 0x4, 0xe, 0x2}, {0x4, 0x5, 0x7, 0x7}], 0x10, 0x81}, 0x90) (async)
socket$inet6_udp(0xa, 0x2, 0x0)
03:50:53 executing program 1:
r0 = getpid() (async)
r1 = getpid()
kcmp$KCMP_EPOLL_TFD(r1, r0, 0x7, 0xffffffffffffffff, &(0x7f0000001840))
r2 = getpid()
r3 = getpid()
kcmp$KCMP_EPOLL_TFD(r3, r2, 0x7, 0xffffffffffffffff, &(0x7f0000001840)) (async, rerun: 32)
r4 = syz_open_procfs(r2, &(0x7f0000001280)='smaps\x00') (rerun: 32)
setsockopt$MRT_DEL_MFC_PROXY(r4, 0x0, 0xd3, &(0x7f0000000080)={@loopback, @multicast2, 0x0, "59d8167d8267bbe9e6e836af2bf832f70db6a062cccfede4ca18b4b9f1e04725", 0xfff, 0x5, 0x8, 0x800}, 0x3c)
r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r5, 0x0, 0xcf, 0x0, 0x0) (async)
bpf$BPF_PROG_QUERY(0x10, &(0x7f00000001c0)={@cgroup=r5, 0x6, 0x0, 0x5, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6, 0x0, &(0x7f0000000100)=[0x0, 0x0, 0x0], &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000180)=[0x0]}, 0x40)
pipe2$watch_queue(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80)
write$P9_RWSTAT(r6, &(0x7f0000000040)={0x7, 0x7f, 0x1}, 0x7)
03:50:53 executing program 3:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='net/igmp\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0xee00, 0xee00}}, './file0\x00'})
write$qrtrtun(r1, &(0x7f00000010c0)="6795fee6280b4fbaff66adb7ae2ea140e992ca3b7e29ba01aa730c173e4fed1cc0d2fc92ef28f5a784b13e09139c9f9cf6db35604e926d428baae3d34e3f9577a8f7a2b380f2b333518e4c966640319c8726347ae91bdcd227c0399e3d92f9bff700976b46d748c004390436c7534f4ab9646c4c6276540c62cc8401cde250a51626d5af8d29c054b2e8820f371ac59743e4e02fc9c5dc9910e210b32a1c2f83ac75a2d2d5ccce9bff080b0c0baa8dd3e42fe5d911d7a7be19cd062e44b84ad95cd8bafaf7a31a064f0b6b1b85814fcb9d74e8e18109b0b1b7fadf79eafa2b673d6afd543fbd831dd81a41902171670afbf6", 0xf2)
add_key$user(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000011c0)="1deb6596963ff7f15990b6d13ac44752c5e25a98e79d41946df24992350c2586c5c587d2a7e9828d2379d024cadc9a927f6d93d925750334cf0024a7da501183f51b363d68a12a4eb3ed8be2cce5e2714b7ca32aef9b7e3f5e716500f3a56d36852e77bddf98fba9793f2182826345b7b3ff5ec628fa86fdc08409d0393244da3fa3956bdd229df9e28975895ed0bd61f56580bf17238c8bcf1074de855465d0", 0xa0, 0xfffffffffffffffb)
03:50:53 executing program 4:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000ec0)='net/dev_snmp6\x00')
setsockopt$MRT_ASSERT(r1, 0x0, 0xcf, 0x0, 0x0)
setsockopt$MRT_PIM(r1, 0x0, 0xcf, &(0x7f0000000000)=0x3, 0x4)
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
03:50:53 executing program 2:
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x1, &(0x7f0000001240)=@raw=[@ldst={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d}], &(0x7f0000001340)='GPL\x00', 0xb}, 0x90)
03:50:53 executing program 0:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
write$qrtrtun(r0, &(0x7f0000000000)="1043e16db9051b8de48b43f75afdc20b8fd0d94a340c0e2931425762716efa57c25b641c44f7e58f459cca62e56db14a7b4c3584afe575b760032beb2746d1bf4c786f32a5ae7aa99b", 0x49)
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000) (async)
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
03:50:53 executing program 5:
r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/protocols\x00')
read$qrtrtun(r0, &(0x7f0000000040)=""/85, 0x55) (async)
read$qrtrtun(r0, &(0x7f00000000c0)=""/156, 0x9c) (async, rerun: 64)
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='net/icmp6\x00') (rerun: 64)
socket$nl_netfilter(0x10, 0x3, 0xc)
bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x16, 0x6, &(0x7f0000000480)=@raw=[@map_fd={0x18, 0x6, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0xbf}, @jmp={0x5, 0x1, 0xc, 0xe8673a85ef619304, 0x9, 0x100, 0x1}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0x4, 0x0, 0x0, 0x0, 0x7}], &(0x7f0000000180)='GPL\x00', 0x8, 0xea, &(0x7f0000000240)=""/234, 0x40f00, 0x9, '\x00', 0x0, 0x24, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r0, 0x6, 0x0, &(0x7f0000000340)=[{0x0, 0x5, 0x8, 0xb}, {0x3, 0x5, 0xf, 0xc}, {0x0, 0x4, 0xf, 0x1}, {0x4, 0x2, 0x7, 0x2}, {0x3, 0x4, 0xe, 0x2}, {0x4, 0x5, 0x7, 0x7}], 0x10, 0x81}, 0x90)
socket$inet6_udp(0xa, 0x2, 0x0)
03:50:53 executing program 1:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='smaps\x00')
sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f0000001100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000010c0)={&(0x7f0000001140)=ANY=[@ANYBLOB="440000000104012200000000000000000700000808000340000000070800044000000800000001000400000008000440000000060800044000002c26611d064000010000242bafefccd067050a85fd65ed43f798b82950fb177b66c739245a7b4f2a55930d86455519ae0d1ba66f4a24178eac40c1644c28"], 0x44}, 0x1, 0x0, 0x0, 0x480d0}, 0x20040000)
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
03:50:53 executing program 3:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001280)='net/igmp\x00')
read$qrtrtun(r0, &(0x7f00000000c0)=""/4096, 0x1000)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f0000000000)={{0x1, 0x1, 0x18,