[ OK ] Reached target Multi-User System. [ OK ] Reached target Graphical Interface. Starting Update UTMP about System Runlevel Changes... [ OK ] Started Load/Save RF Kill Switch Status. [ OK ] Started Update UTMP about System Runlevel Changes. Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.0.17' (ECDSA) to the list of known hosts. 2021/08/16 08:01:00 fuzzer started 2021/08/16 08:01:01 dialing manager at 10.128.0.169:42155 2021/08/16 08:01:20 syscalls: 3559 2021/08/16 08:01:20 code coverage: enabled 2021/08/16 08:01:20 comparison tracing: enabled 2021/08/16 08:01:20 extra coverage: enabled 2021/08/16 08:01:20 setuid sandbox: enabled 2021/08/16 08:01:20 namespace sandbox: enabled 2021/08/16 08:01:20 Android sandbox: /sys/fs/selinux/policy does not exist 2021/08/16 08:01:20 fault injection: enabled 2021/08/16 08:01:20 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2021/08/16 08:01:20 net packet injection: enabled 2021/08/16 08:01:20 net device setup: enabled 2021/08/16 08:01:20 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2021/08/16 08:01:20 devlink PCI setup: PCI device 0000:00:10.0 is not available 2021/08/16 08:01:20 USB emulation: enabled 2021/08/16 08:01:20 hci packet injection: enabled 2021/08/16 08:01:20 wifi device emulation: enabled 2021/08/16 08:01:20 802.15.4 emulation: enabled 2021/08/16 08:01:21 fetching corpus: 0, signal 0/0 (executing program) 2021/08/16 08:01:21 fetching corpus: 0, signal 0/0 (executing program) 2021/08/16 08:01:22 starting 6 fuzzer processes 08:01:22 executing program 0: mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='ceph\x00', 0x0, 0x0) 08:01:22 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000000040)="120000001200e7ef007b0000f4afd7030a7c", 0x12, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) recvmmsg(r0, &(0x7f00000020c0), 0x3a4, 0x0, &(0x7f0000000000)={0x77359400}) shutdown(0xffffffffffffffff, 0x0) 08:01:22 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'macvlan1\x00', &(0x7f0000000000)=@ethtool_gfeatures={0x34}}) 08:01:22 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9}, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x22040fb5, &(0x7f0000000080)={0x2, 0x4e23, @empty}, 0x10) dup2(r2, r3) 08:01:23 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r2 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r2, &(0x7f0000000000), 0x10) sendmsg$can_bcm(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r1, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca3f420f0000000000", @ANYRES64=r0, @ANYRES64=0x0, @ANYRES64=r1, @ANYRES64=0x0, @ANYBLOB="6f04cf01ae"], 0x20000600}}, 0x0) 08:01:23 executing program 5: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00000061c0)={0x5, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x100000000, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x8000, 0x0, 0x0, 0x52b4, 0x800, 0x8, 0x4, 0x3, 0x6, 0x6, 0x0, @perf_config_ext={0x2, 0x60}, 0x12, 0x0, 0x0, 0x0, 0x0, 0x1abad1f5, 0x4}, 0x0, 0x6, r0, 0x1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0xe, 0x4, 0x4, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r2, 0x0, 0x0}, 0x20) read(r1, &(0x7f0000001940)=""/232, 0xe8) r3 = syz_open_dev$vcsn(&(0x7f0000000000), 0x4, 0x202) preadv(r0, &(0x7f0000000540)=[{&(0x7f0000005100)=""/186, 0xba}, {&(0x7f00000001c0)=""/17, 0x11}, {&(0x7f0000000380)=""/120, 0x78}, {&(0x7f00000002c0)=""/23, 0x17}, {&(0x7f00000051c0)=""/4096, 0x1000}], 0x5, 0x6, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$TIPC_NL_MON_GET(r5, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={0x0, 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x0) accept$packet(r3, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001600)=0x14) r7 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000001740)=ANY=[@ANYBLOB="c93f3c02ff000000000000009e6693fb2e8ec666d7000000005fbd0f4720bd22ec885fe9fe9d9aa81ac02dfe2f89262e4448c74fd86990fc397d2fab4e1036a60b4bad9b142ffee70656130416137e110f252b6175b527b307d7cc00"/103], 0x0, 0x26}, 0x20) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000001f40)=ANY=[@ANYBLOB="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"/689], &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r7, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001880)={r8, 0xc0, &(0x7f0000001a40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0xb, 0x6, &(0x7f0000001940)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0xb7, &(0x7f000000cf3d)=""/183, 0x40f00, 0xc, '\x00', 0x0, 0x3, r7, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r9}, 0x78) r10 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="1801000000060600000000000000008efe63d5006f00000095", @ANYRESDEC, @ANYRES32=r1], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000300)='lock_acquire\x00', r10}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000016c0)={0x11, 0x10, &(0x7f0000001940)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x1000, &(0x7f0000000600)=""/4096, 0x41100, 0xb, '\x00', r6, 0x7, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x9, 0x3}, 0x8, 0x10, &(0x7f0000001680)={0x3, 0xc, 0xa, 0x6}, 0x10, r9, r10}, 0x78) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x5aa2b, &(0x7f0000000300)={&(0x7f0000001bc0)=@newlink={0x84, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x1288}, [@IFLA_LINKINFO={0x5c, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x4c, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_LINK={0x8, 0x1, r11}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r11}]}, 0x84}}, 0x0) syzkaller login: [ 92.624240][ T6567] chnl_net:caif_netlink_parms(): no params data found [ 92.730723][ T6567] bridge0: port 1(bridge_slave_0) entered blocking state [ 92.738039][ T6567] bridge0: port 1(bridge_slave_0) entered disabled state [ 92.746680][ T6567] device bridge_slave_0 entered promiscuous mode [ 92.755084][ T6567] bridge0: port 2(bridge_slave_1) entered blocking state [ 92.762203][ T6567] bridge0: port 2(bridge_slave_1) entered disabled state [ 92.769646][ T6567] device bridge_slave_1 entered promiscuous mode [ 92.795830][ T6567] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 92.808914][ T6567] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 92.867741][ T6567] team0: Port device team_slave_0 added [ 92.875736][ T6567] team0: Port device team_slave_1 added [ 92.932767][ T6569] chnl_net:caif_netlink_parms(): no params data found [ 92.945652][ T6567] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 92.953992][ T6567] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 92.980551][ T6567] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 92.994463][ T6567] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 93.008014][ T6567] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 93.035718][ T6567] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 93.130884][ T6567] device hsr_slave_0 entered promiscuous mode [ 93.137562][ T6567] device hsr_slave_1 entered promiscuous mode [ 93.190062][ T6569] bridge0: port 1(bridge_slave_0) entered blocking state [ 93.197853][ T6569] bridge0: port 1(bridge_slave_0) entered disabled state [ 93.206203][ T6569] device bridge_slave_0 entered promiscuous mode [ 93.250485][ T6569] bridge0: port 2(bridge_slave_1) entered blocking state [ 93.268365][ T6569] bridge0: port 2(bridge_slave_1) entered disabled state [ 93.283246][ T6569] device bridge_slave_1 entered promiscuous mode [ 93.423564][ T6569] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 93.441688][ T6569] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 93.476975][ T6571] chnl_net:caif_netlink_parms(): no params data found [ 93.621909][ T6569] team0: Port device team_slave_0 added [ 93.666680][ T6569] team0: Port device team_slave_1 added [ 93.678660][ T6573] chnl_net:caif_netlink_parms(): no params data found [ 93.700096][ T6575] chnl_net:caif_netlink_parms(): no params data found [ 93.724188][ T6569] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 93.731264][ T6569] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 93.759081][ T6569] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 93.772282][ T6567] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 93.802436][ T6569] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 93.809400][ T6569] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 93.835744][ T6569] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 93.848057][ T6567] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 93.876967][ T6567] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 93.894510][ T6571] bridge0: port 1(bridge_slave_0) entered blocking state [ 93.901673][ T6571] bridge0: port 1(bridge_slave_0) entered disabled state [ 93.909169][ T6571] device bridge_slave_0 entered promiscuous mode [ 93.919734][ T6571] bridge0: port 2(bridge_slave_1) entered blocking state [ 93.928606][ T6571] bridge0: port 2(bridge_slave_1) entered disabled state [ 93.936650][ T6571] device bridge_slave_1 entered promiscuous mode [ 93.951604][ T6567] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 94.030646][ T6577] chnl_net:caif_netlink_parms(): no params data found [ 94.039859][ T6573] bridge0: port 1(bridge_slave_0) entered blocking state [ 94.047603][ T6573] bridge0: port 1(bridge_slave_0) entered disabled state [ 94.056705][ T6573] device bridge_slave_0 entered promiscuous mode [ 94.085864][ T6569] device hsr_slave_0 entered promiscuous mode [ 94.092513][ T6569] device hsr_slave_1 entered promiscuous mode [ 94.098783][ T6569] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 94.107845][ T6569] Cannot create hsr debugfs directory [ 94.119421][ T6573] bridge0: port 2(bridge_slave_1) entered blocking state [ 94.127643][ T6573] bridge0: port 2(bridge_slave_1) entered disabled state [ 94.135347][ T6573] device bridge_slave_1 entered promiscuous mode [ 94.150485][ T6571] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 94.163016][ T6571] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 94.178340][ T6575] bridge0: port 1(bridge_slave_0) entered blocking state [ 94.185642][ T6575] bridge0: port 1(bridge_slave_0) entered disabled state [ 94.193491][ T6575] device bridge_slave_0 entered promiscuous mode [ 94.238997][ T6575] bridge0: port 2(bridge_slave_1) entered blocking state [ 94.246833][ T6575] bridge0: port 2(bridge_slave_1) entered disabled state [ 94.254989][ T6575] device bridge_slave_1 entered promiscuous mode [ 94.280628][ T6573] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 94.294318][ T6573] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 94.343201][ T6571] team0: Port device team_slave_0 added [ 94.355348][ T6575] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 94.371838][ T6573] team0: Port device team_slave_0 added [ 94.378167][ T6571] team0: Port device team_slave_1 added [ 94.396606][ T6575] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 94.413216][ T6573] team0: Port device team_slave_1 added [ 94.435875][ T6571] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 94.442919][ T6571] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 94.470380][ T6571] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 94.488711][ T6577] bridge0: port 1(bridge_slave_0) entered blocking state [ 94.495891][ T6577] bridge0: port 1(bridge_slave_0) entered disabled state [ 94.503742][ T6577] device bridge_slave_0 entered promiscuous mode [ 94.511425][ T6577] bridge0: port 2(bridge_slave_1) entered blocking state [ 94.518461][ T6577] bridge0: port 2(bridge_slave_1) entered disabled state [ 94.525695][ T3003] Bluetooth: hci0: command 0x0409 tx timeout [ 94.527318][ T6577] device bridge_slave_1 entered promiscuous mode [ 94.546762][ T6571] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 94.553901][ T6571] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 94.581497][ T6571] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 94.600554][ T6575] team0: Port device team_slave_0 added [ 94.625657][ T6573] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 94.633347][ T6573] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 94.659422][ T6573] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 94.670939][ T3021] Bluetooth: hci1: command 0x0409 tx timeout [ 94.679744][ T6575] team0: Port device team_slave_1 added [ 94.687203][ T6577] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 94.703084][ T6573] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 94.710031][ T6573] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 94.737887][ T6573] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 94.779256][ T6577] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 94.799472][ T6571] device hsr_slave_0 entered promiscuous mode [ 94.806474][ T6571] device hsr_slave_1 entered promiscuous mode [ 94.813943][ T6571] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 94.821737][ T6571] Cannot create hsr debugfs directory [ 94.854763][ T6575] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 94.862711][ T6575] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 94.890455][ T6575] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 94.903748][ T6573] device hsr_slave_0 entered promiscuous mode [ 94.910265][ T6573] device hsr_slave_1 entered promiscuous mode [ 94.911046][ T3021] Bluetooth: hci2: command 0x0409 tx timeout [ 94.922522][ T6573] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 94.930066][ T6573] Cannot create hsr debugfs directory [ 94.947798][ T6567] 8021q: adding VLAN 0 to HW filter on device bond0 [ 94.963232][ T6575] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 94.970181][ T6575] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 94.996624][ T6575] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 95.016464][ T6577] team0: Port device team_slave_0 added [ 95.024107][ T6577] team0: Port device team_slave_1 added [ 95.070798][ T1068] Bluetooth: hci3: command 0x0409 tx timeout [ 95.109977][ T6575] device hsr_slave_0 entered promiscuous mode [ 95.117106][ T6575] device hsr_slave_1 entered promiscuous mode [ 95.125263][ T6575] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 95.133108][ T6575] Cannot create hsr debugfs directory [ 95.145417][ T6567] 8021q: adding VLAN 0 to HW filter on device team0 [ 95.153353][ T1068] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 95.161927][ T1068] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 95.177425][ T6577] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 95.184521][ T6577] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 95.210889][ T6577] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 95.223574][ T6577] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 95.230517][ T6577] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 95.256536][ T6577] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 95.273810][ T6569] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 95.291294][ T1195] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 95.299718][ T1195] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 95.309244][ T1195] bridge0: port 1(bridge_slave_0) entered blocking state [ 95.311161][ T3021] Bluetooth: hci4: command 0x0409 tx timeout [ 95.316370][ T1195] bridge0: port 1(bridge_slave_0) entered forwarding state [ 95.342294][ T6569] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 95.373150][ T3003] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 95.381835][ T3003] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 95.390344][ T3003] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 95.390813][ T38] Bluetooth: hci5: command 0x0409 tx timeout [ 95.399641][ T3003] bridge0: port 2(bridge_slave_1) entered blocking state [ 95.411344][ T3003] bridge0: port 2(bridge_slave_1) entered forwarding state [ 95.431511][ T6577] device hsr_slave_0 entered promiscuous mode [ 95.438400][ T6577] device hsr_slave_1 entered promiscuous mode [ 95.445949][ T6577] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 95.453594][ T6577] Cannot create hsr debugfs directory [ 95.466776][ T6569] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 95.496086][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 95.506890][ T6569] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 95.537113][ T8328] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 95.546565][ T8328] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 95.556236][ T8328] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 95.587791][ T8416] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 95.595485][ T8416] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 95.604983][ T8416] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 95.640166][ T1068] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 95.649637][ T1068] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 95.658228][ T1068] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 95.668651][ T1068] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 95.702178][ T6567] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 95.759514][ T1068] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 95.769611][ T1068] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 95.786230][ T6569] 8021q: adding VLAN 0 to HW filter on device bond0 [ 95.793841][ T6571] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 95.808510][ T6567] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 95.827720][ T6569] 8021q: adding VLAN 0 to HW filter on device team0 [ 95.839090][ T6571] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 95.847875][ T6571] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 95.856138][ T2988] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 95.864383][ T2988] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 95.883252][ T6571] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 95.897812][ T1195] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 95.906383][ T1195] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 95.915364][ T1195] bridge0: port 1(bridge_slave_0) entered blocking state [ 95.922431][ T1195] bridge0: port 1(bridge_slave_0) entered forwarding state [ 95.930108][ T1195] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 95.938794][ T1195] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 95.947177][ T1195] bridge0: port 2(bridge_slave_1) entered blocking state [ 95.954265][ T1195] bridge0: port 2(bridge_slave_1) entered forwarding state [ 95.962145][ T1195] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 95.971158][ T1195] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 95.982239][ T2988] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 96.003761][ T2988] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 96.012242][ T2988] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 96.020880][ T2988] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 96.029177][ T2988] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 96.038490][ T2988] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 96.047030][ T2988] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 96.055491][ T2988] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 96.063883][ T2988] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 96.072564][ T2988] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 96.092394][ T6569] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 96.103920][ T6569] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 96.120147][ T8416] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 96.128727][ T8416] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 96.137082][ T8416] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 96.145723][ T8416] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 96.154800][ T8416] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 96.162585][ T8416] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 96.174698][ T6573] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 96.184685][ T6567] device veth0_vlan entered promiscuous mode [ 96.208149][ T6573] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 96.216916][ T6573] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 96.226842][ T6573] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 96.236614][ T8416] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 96.244180][ T8416] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 96.253555][ T6567] device veth1_vlan entered promiscuous mode [ 96.275503][ T6569] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 96.303772][ T6575] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 96.333015][ T6575] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 96.342326][ T6575] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 96.353455][ T6575] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 96.370280][ T6571] 8021q: adding VLAN 0 to HW filter on device bond0 [ 96.391955][ T6567] device veth0_macvtap entered promiscuous mode [ 96.398619][ T8518] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 96.407001][ T8518] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 96.415273][ T8518] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 96.424321][ T8518] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 96.433167][ T8518] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 96.442121][ T8518] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 96.456660][ T6571] 8021q: adding VLAN 0 to HW filter on device team0 [ 96.469597][ T6577] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 96.482867][ T6567] device veth1_macvtap entered promiscuous mode [ 96.492746][ T8518] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 96.501192][ T8518] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 96.508899][ T8518] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 96.518957][ T8518] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 96.531998][ T6577] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 96.555437][ T6569] device veth0_vlan entered promiscuous mode [ 96.564144][ T2988] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 96.573028][ T2988] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 96.581515][ T2988] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 96.589941][ T2988] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 96.598474][ T2988] bridge0: port 1(bridge_slave_0) entered blocking state [ 96.605573][ T2988] bridge0: port 1(bridge_slave_0) entered forwarding state [ 96.614426][ T2988] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 96.622188][ T2988] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 96.629768][ T2988] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 96.637731][ T2988] Bluetooth: hci0: command 0x041b tx timeout [ 96.649276][ T6577] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 96.659629][ T1068] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 96.669761][ T1068] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 96.678514][ T1068] bridge0: port 2(bridge_slave_1) entered blocking state [ 96.685593][ T1068] bridge0: port 2(bridge_slave_1) entered forwarding state [ 96.703427][ T6567] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 96.713944][ T6577] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 96.728287][ T6569] device veth1_vlan entered promiscuous mode [ 96.742536][ T2988] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 96.750335][ T2988] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 96.750942][ T3021] Bluetooth: hci1: command 0x041b tx timeout [ 96.762956][ T2988] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 96.775757][ T6567] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 96.784140][ T2988] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 96.792935][ T2988] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 96.801962][ T2988] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 96.821347][ T6575] 8021q: adding VLAN 0 to HW filter on device bond0 [ 96.839453][ T3021] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 96.847917][ T3021] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 96.856675][ T3021] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 96.867102][ T6573] 8021q: adding VLAN 0 to HW filter on device bond0 [ 96.885501][ T6567] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 96.894504][ T6567] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 96.903503][ T6567] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 96.913191][ T6567] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 96.925222][ T8281] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 96.933329][ T8281] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 96.941271][ T8281] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 96.956315][ T6573] 8021q: adding VLAN 0 to HW filter on device team0 [ 96.973927][ T6575] 8021q: adding VLAN 0 to HW filter on device team0 [ 96.982229][ T8547] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 96.993387][ T8547] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 97.001829][ T8547] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 97.010159][ T8547] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 97.019765][ T8547] bridge0: port 1(bridge_slave_0) entered blocking state [ 97.026863][ T8547] bridge0: port 1(bridge_slave_0) entered forwarding state [ 97.034655][ T8547] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 97.042339][ T8547] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 97.060612][ T8547] Bluetooth: hci2: command 0x041b tx timeout [ 97.069761][ T6569] device veth0_macvtap entered promiscuous mode [ 97.083709][ T6569] device veth1_macvtap entered promiscuous mode [ 97.093500][ T3021] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 97.101421][ T3021] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 97.109818][ T3021] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 97.118740][ T3021] bridge0: port 2(bridge_slave_1) entered blocking state [ 97.125856][ T3021] bridge0: port 2(bridge_slave_1) entered forwarding state [ 97.133778][ T3021] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 97.142544][ T3021] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 97.151165][ T3021] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 97.159467][ T3021] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 97.168323][ T3021] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 97.176221][ T3021] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 97.184954][ T3021] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 97.193539][ T3021] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 97.201834][ T3021] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 97.209874][ T3021] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 97.218459][ T3021] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 97.233101][ T8281] Bluetooth: hci3: command 0x041b tx timeout [ 97.236872][ T6571] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 97.250456][ T6571] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 97.277856][ T8281] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 97.287286][ T8281] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 97.295312][ T8281] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 97.305167][ T8281] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 97.313788][ T8281] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 97.323752][ T8281] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 97.332317][ T8281] bridge0: port 1(bridge_slave_0) entered blocking state [ 97.339452][ T8281] bridge0: port 1(bridge_slave_0) entered forwarding state [ 97.348779][ T8281] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 97.357726][ T8281] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 97.367667][ T8281] bridge0: port 2(bridge_slave_1) entered blocking state [ 97.374747][ T8281] bridge0: port 2(bridge_slave_1) entered forwarding state [ 97.383057][ T8281] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 97.391473][ T8281] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 97.399657][ T8281] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 97.408383][ T8281] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 97.420521][ T38] Bluetooth: hci4: command 0x041b tx timeout [ 97.443716][ T6573] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 97.465894][ T6569] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 97.470490][ T3021] Bluetooth: hci5: command 0x041b tx timeout [ 97.477017][ T6569] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 97.493783][ T6569] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 97.503373][ T8547] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 97.511206][ T8547] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 97.519669][ T8547] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 97.529646][ T8547] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 97.538229][ T8547] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 97.558968][ T6577] 8021q: adding VLAN 0 to HW filter on device bond0 [ 97.589431][ T6569] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 97.590514][ T10] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 97.611555][ T10] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 97.619104][ T6569] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 97.631874][ T6569] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 97.644452][ T6569] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 97.653496][ T6569] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 97.662497][ T6569] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 97.671743][ T6569] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 97.681941][ T2988] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 97.690856][ T2988] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 97.699098][ T2988] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 97.708076][ T2988] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 97.717016][ T2988] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 97.725068][ T2988] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 97.733928][ T2988] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 97.746729][ T6575] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 97.757636][ T6575] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 97.787697][ T6571] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 97.798692][ T2988] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 97.807180][ T2988] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 97.815763][ T2988] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 97.824400][ T2988] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 97.833174][ T2988] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 97.841561][ T2988] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 97.849084][ T2988] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 97.856818][ T2988] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 97.864511][ T2988] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 97.872656][ T2988] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 97.884750][ T6573] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 97.900584][ T38] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 97.901440][ T10] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 97.908225][ T38] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 97.923729][ T10] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 97.949857][ T6577] 8021q: adding VLAN 0 to HW filter on device team0 [ 97.957546][ T8541] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 97.965918][ T8541] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 97.973895][ T8541] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 98.002270][ T6575] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 98.023742][ T8541] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 98.040740][ T8541] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 98.049791][ T8541] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 98.066369][ T8541] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 98.078032][ T8541] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 98.083215][ T8573] ceph: No path or : separator in source [ 98.087505][ T8541] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready 08:01:29 executing program 0: mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='ceph\x00', 0x0, 0x0) [ 98.103195][ T8541] bridge0: port 1(bridge_slave_0) entered blocking state [ 98.110301][ T8541] bridge0: port 1(bridge_slave_0) entered forwarding state [ 98.129907][ T6573] device veth0_vlan entered promiscuous mode 08:01:29 executing program 0: mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='ceph\x00', 0x0, 0x0) [ 98.190159][ T8586] ceph: No path or : separator in source [ 98.196954][ T8518] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 98.207424][ T8518] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 98.230774][ T8518] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 98.239118][ T8518] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 98.253634][ T8518] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 98.262703][ T8518] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 98.273096][ T8518] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready 08:01:29 executing program 0: mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='ceph\x00', 0x0, 0x0) [ 98.282708][ T8592] ceph: No path or : separator in source [ 98.288522][ T8518] bridge0: port 2(bridge_slave_1) entered blocking state [ 98.295615][ T8518] bridge0: port 2(bridge_slave_1) entered forwarding state [ 98.336248][ T6573] device veth1_vlan entered promiscuous mode [ 98.350672][ T10] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 98.351476][ T6571] device veth0_vlan entered promiscuous mode [ 98.358489][ T10] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 08:01:29 executing program 0: mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='ceph\x00', 0x0, 0x0) [ 98.384188][ T8518] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 98.393714][ T8597] ceph: No path or : separator in source [ 98.401060][ T8518] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 98.431116][ T8518] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 98.444893][ T8518] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 98.457405][ T8518] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 98.470099][ T8606] ceph: No path or : separator in source 08:01:29 executing program 0: mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='ceph\x00', 0x0, 0x0) [ 98.478625][ T8518] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 98.500874][ T8518] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 98.509619][ T8518] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 98.540636][ T6571] device veth1_vlan entered promiscuous mode [ 98.573804][ T8518] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 98.587306][ T8518] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 98.587334][ T8611] ceph: No path or : separator in source [ 98.596484][ T8518] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 98.610936][ T8518] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 98.631119][ T8518] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready 08:01:29 executing program 0: mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='ceph\x00', 0x0, 0x0) [ 98.640848][ T8518] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 98.650862][ T8518] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 98.659730][ T8518] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 98.674273][ T3021] Bluetooth: hci0: command 0x040f tx timeout [ 98.675428][ T8518] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 98.689694][ T8518] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 98.710343][ T10] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 98.714915][ T6577] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 98.718427][ T10] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 98.732094][ T6577] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 98.750041][ T6573] device veth0_macvtap entered promiscuous mode [ 98.772882][ T8518] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 98.781959][ T8518] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 98.786716][ T8621] ceph: No path or : separator in source [ 98.790030][ T8518] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 98.803890][ T8518] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 98.812577][ T8518] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 98.830314][ T3021] Bluetooth: hci1: command 0x040f tx timeout 08:01:30 executing program 0: mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='ceph\x00', 0x0, 0x0) [ 98.831269][ T8518] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 98.852954][ T8518] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 98.869409][ T8518] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 98.879071][ T8626] ceph: No path or : separator in source [ 98.888434][ T8518] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 98.922366][ T6573] device veth1_macvtap entered promiscuous mode [ 98.940415][ T6575] device veth0_vlan entered promiscuous mode [ 98.963051][ T8518] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 98.972908][ T8518] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 98.981277][ T8518] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 98.989039][ T8518] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 98.998259][ T8518] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 99.007060][ T8518] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 99.015907][ T8518] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 99.024532][ T8518] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 99.045636][ T6571] device veth0_macvtap entered promiscuous mode [ 99.063959][ T6577] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 99.070528][ T8281] Bluetooth: hci2: command 0x040f tx timeout [ 99.078722][ T6575] device veth1_vlan entered promiscuous mode [ 99.094599][ T6571] device veth1_macvtap entered promiscuous mode [ 99.110065][ C1] hrtimer: interrupt took 31145 ns [ 99.145851][ T6573] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 99.157216][ T6573] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 99.167750][ T6573] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 99.178856][ T6573] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 99.191404][ T6573] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 99.216333][ T1068] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 99.225748][ T1068] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 99.235151][ T1068] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 99.246465][ T6573] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 08:01:30 executing program 0: mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='ceph\x00', 0x0, 0x0) [ 99.257857][ T6573] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 99.275650][ T6573] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 99.292816][ T6573] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 99.310141][ T8281] Bluetooth: hci3: command 0x040f tx timeout [ 99.317705][ T8642] ceph: No path or : separator in source [ 99.318067][ T6573] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 99.353618][ T6571] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 99.364672][ T6571] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 99.376585][ T6571] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 99.389986][ T6571] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 99.402486][ T6571] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 99.414673][ T6571] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 99.429466][ T6571] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 99.440562][ T8328] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 99.449121][ T8328] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 99.461246][ T8328] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 99.469792][ T8328] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 99.471081][ T8547] Bluetooth: hci4: command 0x040f tx timeout [ 99.483267][ T6575] device veth0_macvtap entered promiscuous mode [ 99.493277][ T6573] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 99.502728][ T6573] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 99.512336][ T6573] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 99.521390][ T6573] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 99.537697][ T6571] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 99.548393][ T6571] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 99.550428][ T8547] Bluetooth: hci5: command 0x040f tx timeout [ 99.558660][ T6571] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 99.574902][ T6571] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 99.585011][ T6571] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 99.595586][ T6571] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 99.606740][ T6571] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 99.622627][ T8518] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 99.630947][ T8518] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 99.639391][ T8518] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 99.648725][ T8518] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 99.659503][ T6575] device veth1_macvtap entered promiscuous mode [ 99.684069][ T6571] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 99.693388][ T6571] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 99.702500][ T6571] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 99.711916][ T6571] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 99.721735][ T8518] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 99.731081][ T8518] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 99.739187][ T8518] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 99.748618][ T8518] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 99.766987][ T6575] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 99.779748][ T6575] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 99.790679][ T6575] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 99.801663][ T6575] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 99.811860][ T6575] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 99.823044][ T6575] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 99.833592][ T6575] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 99.844755][ T6575] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 99.856100][ T6575] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 99.874040][ T38] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 99.882852][ T38] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 99.897254][ T6577] device veth0_vlan entered promiscuous mode [ 99.916244][ T8281] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 99.924383][ T8281] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 99.944649][ T6575] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 99.957770][ T6575] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 99.968489][ T6575] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 99.979379][ T6575] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 99.989432][ T6575] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 100.001196][ T6575] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 100.012471][ T6575] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 100.024093][ T6575] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 100.036282][ T6575] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 100.049726][ T1068] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 100.058547][ T1068] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 100.066626][ T1068] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 100.075878][ T1068] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 100.101262][ T6577] device veth1_vlan entered promiscuous mode [ 100.126131][ T6575] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 100.144681][ T6575] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 100.158335][ T6575] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 100.168818][ T6575] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 100.191982][ T149] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 100.199823][ T149] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 100.224452][ T8648] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 100.238137][ T149] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 100.252292][ T149] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 100.258692][ T6577] device veth0_macvtap entered promiscuous mode [ 100.277089][ T8518] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 100.290572][ T8518] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 100.299081][ T8518] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 100.335690][ T8328] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 100.355578][ T149] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 100.367029][ T8] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 100.377576][ T6577] device veth1_macvtap entered promiscuous mode [ 100.381067][ T149] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 100.397421][ T10] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 100.405494][ T8] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 100.417180][ T10] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 100.428856][ T1195] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 100.438348][ T1195] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 100.446659][ T1195] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 100.454927][ T1195] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 100.472743][ T6577] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 100.492187][ T6577] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 100.502978][ T6577] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 100.519480][ T6577] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 100.531907][ T6577] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 100.542845][ T6577] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 100.553477][ T6577] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 100.564832][ T6577] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 100.576384][ T6577] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 100.587855][ T6577] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 100.601441][ T6577] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 100.609389][ T8328] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 100.619178][ T8328] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready 08:01:31 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'macvlan1\x00', &(0x7f0000000000)=@ethtool_gfeatures={0x34}}) [ 100.650910][ T6577] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 100.669184][ T6577] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 100.681082][ T6577] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 100.692316][ T6577] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 100.705991][ T6577] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 100.719603][ T6577] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 100.729940][ T6577] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 100.749931][ T3021] Bluetooth: hci0: command 0x0419 tx timeout [ 100.752556][ T6577] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 100.781255][ T6577] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 100.804089][ T6577] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 100.829583][ T6577] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 100.849412][ T149] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 100.857463][ T8328] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 100.864658][ T149] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 100.877912][ T8328] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 100.896295][ T6577] netdevsim netdevsim5 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 100.910639][ T8648] Bluetooth: hci1: command 0x0419 tx timeout [ 100.911356][ T6577] netdevsim netdevsim5 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 100.930244][ T6577] netdevsim netdevsim5 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 100.939011][ T6577] netdevsim netdevsim5 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 100.955648][ T8547] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 101.117427][ T149] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 101.131914][ T149] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 101.150539][ T8547] Bluetooth: hci2: command 0x0419 tx timeout [ 101.173950][ T8416] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 101.206115][ T149] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 101.239926][ T149] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 101.247383][ T8547] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 101.393643][ T8547] Bluetooth: hci3: command 0x0419 tx timeout [ 101.550247][ T3021] Bluetooth: hci4: command 0x0419 tx timeout [ 101.629807][ T3021] Bluetooth: hci5: command 0x0419 tx timeout 08:01:32 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9}, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x22040fb5, &(0x7f0000000080)={0x2, 0x4e23, @empty}, 0x10) dup2(r2, r3) 08:01:32 executing program 0: mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='ceph\x00', 0x0, 0x0) 08:01:32 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000000040)="120000001200e7ef007b0000f4afd7030a7c", 0x12, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) recvmmsg(r0, &(0x7f00000020c0), 0x3a4, 0x0, &(0x7f0000000000)={0x77359400}) shutdown(0xffffffffffffffff, 0x0) 08:01:32 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'macvlan1\x00', &(0x7f0000000000)=@ethtool_gfeatures={0x34}}) 08:01:32 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r2 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r2, &(0x7f0000000000), 0x10) sendmsg$can_bcm(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r1, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca3f420f0000000000", @ANYRES64=r0, @ANYRES64=0x0, @ANYRES64=r1, @ANYRES64=0x0, @ANYBLOB="6f04cf01ae"], 0x20000600}}, 0x0) 08:01:32 executing program 5: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00000061c0)={0x5, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x100000000, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x8000, 0x0, 0x0, 0x52b4, 0x800, 0x8, 0x4, 0x3, 0x6, 0x6, 0x0, @perf_config_ext={0x2, 0x60}, 0x12, 0x0, 0x0, 0x0, 0x0, 0x1abad1f5, 0x4}, 0x0, 0x6, r0, 0x1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0xe, 0x4, 0x4, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r2, 0x0, 0x0}, 0x20) read(r1, &(0x7f0000001940)=""/232, 0xe8) r3 = syz_open_dev$vcsn(&(0x7f0000000000), 0x4, 0x202) preadv(r0, &(0x7f0000000540)=[{&(0x7f0000005100)=""/186, 0xba}, {&(0x7f00000001c0)=""/17, 0x11}, {&(0x7f0000000380)=""/120, 0x78}, {&(0x7f00000002c0)=""/23, 0x17}, {&(0x7f00000051c0)=""/4096, 0x1000}], 0x5, 0x6, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$TIPC_NL_MON_GET(r5, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={0x0, 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x0) accept$packet(r3, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001600)=0x14) r7 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000001740)=ANY=[@ANYBLOB="c93f3c02ff000000000000009e6693fb2e8ec666d7000000005fbd0f4720bd22ec885fe9fe9d9aa81ac02dfe2f89262e4448c74fd86990fc397d2fab4e1036a60b4bad9b142ffee70656130416137e110f252b6175b527b307d7cc00"/103], 0x0, 0x26}, 0x20) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000001f40)=ANY=[@ANYBLOB="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"/689], &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r7, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001880)={r8, 0xc0, &(0x7f0000001a40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0xb, 0x6, &(0x7f0000001940)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0xb7, &(0x7f000000cf3d)=""/183, 0x40f00, 0xc, '\x00', 0x0, 0x3, r7, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r9}, 0x78) r10 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="1801000000060600000000000000008efe63d5006f00000095", @ANYRESDEC, @ANYRES32=r1], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000300)='lock_acquire\x00', r10}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000016c0)={0x11, 0x10, &(0x7f0000001940)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x1000, &(0x7f0000000600)=""/4096, 0x41100, 0xb, '\x00', r6, 0x7, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x9, 0x3}, 0x8, 0x10, &(0x7f0000001680)={0x3, 0xc, 0xa, 0x6}, 0x10, r9, r10}, 0x78) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x5aa2b, &(0x7f0000000300)={&(0x7f0000001bc0)=@newlink={0x84, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x1288}, [@IFLA_LINKINFO={0x5c, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x4c, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_LINK={0x8, 0x1, r11}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r11}]}, 0x84}}, 0x0) 08:01:33 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r2 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r2, &(0x7f0000000000), 0x10) sendmsg$can_bcm(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r1, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca3f420f0000000000", @ANYRES64=r0, @ANYRES64=0x0, @ANYRES64=r1, @ANYRES64=0x0, @ANYBLOB="6f04cf01ae"], 0x20000600}}, 0x0) 08:01:33 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9}, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x22040fb5, &(0x7f0000000080)={0x2, 0x4e23, @empty}, 0x10) dup2(r2, r3) [ 101.844556][ T8766] ceph: No path or : separator in source 08:01:33 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'macvlan1\x00', &(0x7f0000000000)=@ethtool_gfeatures={0x34}}) 08:01:33 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r2 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r2, &(0x7f0000000000), 0x10) sendmsg$can_bcm(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r1, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca3f420f0000000000", @ANYRES64=r0, @ANYRES64=0x0, @ANYRES64=r1, @ANYRES64=0x0, @ANYBLOB="6f04cf01ae"], 0x20000600}}, 0x0) 08:01:33 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000000040)="120000001200e7ef007b0000f4afd7030a7c", 0x12, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) recvmmsg(r0, &(0x7f00000020c0), 0x3a4, 0x0, &(0x7f0000000000)={0x77359400}) shutdown(0xffffffffffffffff, 0x0) 08:01:33 executing program 5: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00000061c0)={0x5, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x100000000, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x8000, 0x0, 0x0, 0x52b4, 0x800, 0x8, 0x4, 0x3, 0x6, 0x6, 0x0, @perf_config_ext={0x2, 0x60}, 0x12, 0x0, 0x0, 0x0, 0x0, 0x1abad1f5, 0x4}, 0x0, 0x6, r0, 0x1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0xe, 0x4, 0x4, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r2, 0x0, 0x0}, 0x20) read(r1, &(0x7f0000001940)=""/232, 0xe8) r3 = syz_open_dev$vcsn(&(0x7f0000000000), 0x4, 0x202) preadv(r0, &(0x7f0000000540)=[{&(0x7f0000005100)=""/186, 0xba}, {&(0x7f00000001c0)=""/17, 0x11}, {&(0x7f0000000380)=""/120, 0x78}, {&(0x7f00000002c0)=""/23, 0x17}, {&(0x7f00000051c0)=""/4096, 0x1000}], 0x5, 0x6, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$TIPC_NL_MON_GET(r5, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={0x0, 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x0) accept$packet(r3, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001600)=0x14) r7 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000001740)=ANY=[@ANYBLOB="c93f3c02ff000000000000009e6693fb2e8ec666d7000000005fbd0f4720bd22ec885fe9fe9d9aa81ac02dfe2f89262e4448c74fd86990fc397d2fab4e1036a60b4bad9b142ffee70656130416137e110f252b6175b527b307d7cc00"/103], 0x0, 0x26}, 0x20) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000001f40)=ANY=[@ANYBLOB="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"/689], &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r7, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001880)={r8, 0xc0, &(0x7f0000001a40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0xb, 0x6, &(0x7f0000001940)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0xb7, &(0x7f000000cf3d)=""/183, 0x40f00, 0xc, '\x00', 0x0, 0x3, r7, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r9}, 0x78) r10 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="1801000000060600000000000000008efe63d5006f00000095", @ANYRESDEC, @ANYRES32=r1], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000300)='lock_acquire\x00', r10}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000016c0)={0x11, 0x10, &(0x7f0000001940)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x1000, &(0x7f0000000600)=""/4096, 0x41100, 0xb, '\x00', r6, 0x7, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x9, 0x3}, 0x8, 0x10, &(0x7f0000001680)={0x3, 0xc, 0xa, 0x6}, 0x10, r9, r10}, 0x78) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x5aa2b, &(0x7f0000000300)={&(0x7f0000001bc0)=@newlink={0x84, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x1288}, [@IFLA_LINKINFO={0x5c, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x4c, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_LINK={0x8, 0x1, r11}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r11}]}, 0x84}}, 0x0) 08:01:34 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9}, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x22040fb5, &(0x7f0000000080)={0x2, 0x4e23, @empty}, 0x10) dup2(r2, r3) 08:01:34 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9}, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x22040fb5, &(0x7f0000000080)={0x2, 0x4e23, @empty}, 0x10) dup2(r2, r3) 08:01:34 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9}, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x22040fb5, &(0x7f0000000080)={0x2, 0x4e23, @empty}, 0x10) dup2(r2, r3) 08:01:34 executing program 5: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00000061c0)={0x5, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x100000000, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x8000, 0x0, 0x0, 0x52b4, 0x800, 0x8, 0x4, 0x3, 0x6, 0x6, 0x0, @perf_config_ext={0x2, 0x60}, 0x12, 0x0, 0x0, 0x0, 0x0, 0x1abad1f5, 0x4}, 0x0, 0x6, r0, 0x1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0xe, 0x4, 0x4, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r2, 0x0, 0x0}, 0x20) read(r1, &(0x7f0000001940)=""/232, 0xe8) r3 = syz_open_dev$vcsn(&(0x7f0000000000), 0x4, 0x202) preadv(r0, &(0x7f0000000540)=[{&(0x7f0000005100)=""/186, 0xba}, {&(0x7f00000001c0)=""/17, 0x11}, {&(0x7f0000000380)=""/120, 0x78}, {&(0x7f00000002c0)=""/23, 0x17}, {&(0x7f00000051c0)=""/4096, 0x1000}], 0x5, 0x6, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$TIPC_NL_MON_GET(r5, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={0x0, 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x0) accept$packet(r3, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001600)=0x14) r7 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000001740)=ANY=[@ANYBLOB="c93f3c02ff000000000000009e6693fb2e8ec666d7000000005fbd0f4720bd22ec885fe9fe9d9aa81ac02dfe2f89262e4448c74fd86990fc397d2fab4e1036a60b4bad9b142ffee70656130416137e110f252b6175b527b307d7cc00"/103], 0x0, 0x26}, 0x20) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000001f40)=ANY=[@ANYBLOB="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"/689], &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r7, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001880)={r8, 0xc0, &(0x7f0000001a40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0xb, 0x6, &(0x7f0000001940)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0xb7, &(0x7f000000cf3d)=""/183, 0x40f00, 0xc, '\x00', 0x0, 0x3, r7, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r9}, 0x78) r10 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="1801000000060600000000000000008efe63d5006f00000095", @ANYRESDEC, @ANYRES32=r1], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000300)='lock_acquire\x00', r10}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000016c0)={0x11, 0x10, &(0x7f0000001940)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x1000, &(0x7f0000000600)=""/4096, 0x41100, 0xb, '\x00', r6, 0x7, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x9, 0x3}, 0x8, 0x10, &(0x7f0000001680)={0x3, 0xc, 0xa, 0x6}, 0x10, r9, r10}, 0x78) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x5aa2b, &(0x7f0000000300)={&(0x7f0000001bc0)=@newlink={0x84, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x1288}, [@IFLA_LINKINFO={0x5c, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x4c, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_LINK={0x8, 0x1, r11}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r11}]}, 0x84}}, 0x0) 08:01:34 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000000040)="120000001200e7ef007b0000f4afd7030a7c", 0x12, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) recvmmsg(r0, &(0x7f00000020c0), 0x3a4, 0x0, &(0x7f0000000000)={0x77359400}) shutdown(0xffffffffffffffff, 0x0) 08:01:34 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9}, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x22040fb5, &(0x7f0000000080)={0x2, 0x4e23, @empty}, 0x10) dup2(r2, r3) 08:01:34 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9}, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x22040fb5, &(0x7f0000000080)={0x2, 0x4e23, @empty}, 0x10) dup2(r2, r3) 08:01:34 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9}, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x22040fb5, &(0x7f0000000080)={0x2, 0x4e23, @empty}, 0x10) dup2(r2, r3) 08:01:36 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9}, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x22040fb5, &(0x7f0000000080)={0x2, 0x4e23, @empty}, 0x10) dup2(r2, r3) 08:01:36 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9}, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x22040fb5, &(0x7f0000000080)={0x2, 0x4e23, @empty}, 0x10) dup2(r2, r3) 08:01:36 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9}, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x22040fb5, &(0x7f0000000080)={0x2, 0x4e23, @empty}, 0x10) dup2(r2, r3) 08:01:36 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9}, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x22040fb5, &(0x7f0000000080)={0x2, 0x4e23, @empty}, 0x10) dup2(r2, r3) 08:01:36 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9}, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x22040fb5, &(0x7f0000000080)={0x2, 0x4e23, @empty}, 0x10) dup2(r2, r3) 08:01:36 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9}, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x22040fb5, &(0x7f0000000080)={0x2, 0x4e23, @empty}, 0x10) dup2(r2, r3) 08:01:38 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9}, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x22040fb5, &(0x7f0000000080)={0x2, 0x4e23, @empty}, 0x10) dup2(r2, r3) 08:01:38 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9}, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x22040fb5, &(0x7f0000000080)={0x2, 0x4e23, @empty}, 0x10) dup2(r2, r3) 08:01:38 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9}, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x22040fb5, &(0x7f0000000080)={0x2, 0x4e23, @empty}, 0x10) dup2(r2, r3) 08:01:38 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9}, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x22040fb5, &(0x7f0000000080)={0x2, 0x4e23, @empty}, 0x10) dup2(r2, r3) 08:01:38 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9}, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x22040fb5, &(0x7f0000000080)={0x2, 0x4e23, @empty}, 0x10) dup2(r2, r3) 08:01:38 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9}, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x22040fb5, &(0x7f0000000080)={0x2, 0x4e23, @empty}, 0x10) dup2(r2, r3) 08:01:40 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9}, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x22040fb5, &(0x7f0000000080)={0x2, 0x4e23, @empty}, 0x10) dup2(r2, r3) 08:01:40 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9}, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x22040fb5, &(0x7f0000000080)={0x2, 0x4e23, @empty}, 0x10) dup2(r2, r3) 08:01:40 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9}, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x22040fb5, &(0x7f0000000080)={0x2, 0x4e23, @empty}, 0x10) dup2(r2, r3) 08:01:40 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9}, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x22040fb5, &(0x7f0000000080)={0x2, 0x4e23, @empty}, 0x10) dup2(r2, r3) 08:01:40 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9}, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x22040fb5, &(0x7f0000000080)={0x2, 0x4e23, @empty}, 0x10) dup2(r2, r3) 08:01:40 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9}, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x22040fb5, &(0x7f0000000080)={0x2, 0x4e23, @empty}, 0x10) dup2(r2, r3) 08:01:42 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9}, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x22040fb5, &(0x7f0000000080)={0x2, 0x4e23, @empty}, 0x10) dup2(r2, r3) 08:01:42 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9}, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x22040fb5, &(0x7f0000000080)={0x2, 0x4e23, @empty}, 0x10) dup2(r2, r3) 08:01:42 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9}, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x22040fb5, &(0x7f0000000080)={0x2, 0x4e23, @empty}, 0x10) dup2(r2, r3) 08:01:42 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9}, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x22040fb5, &(0x7f0000000080)={0x2, 0x4e23, @empty}, 0x10) dup2(r2, r3) 08:01:42 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9}, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x22040fb5, &(0x7f0000000080)={0x2, 0x4e23, @empty}, 0x10) dup2(r2, r3) 08:01:42 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9}, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x22040fb5, &(0x7f0000000080)={0x2, 0x4e23, @empty}, 0x10) dup2(r2, r3) 08:01:44 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9}, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x22040fb5, &(0x7f0000000080)={0x2, 0x4e23, @empty}, 0x10) dup2(r2, r3) 08:01:44 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9}, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x22040fb5, &(0x7f0000000080)={0x2, 0x4e23, @empty}, 0x10) dup2(r2, r3) 08:01:44 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9}, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x22040fb5, &(0x7f0000000080)={0x2, 0x4e23, @empty}, 0x10) dup2(r2, r3) 08:01:44 executing program 0: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00000061c0)={0x5, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x100000000, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x8000, 0x0, 0x0, 0x52b4, 0x800, 0x8, 0x4, 0x3, 0x6, 0x6, 0x0, @perf_config_ext={0x2, 0x60}, 0x12, 0x0, 0x0, 0x0, 0x0, 0x1abad1f5, 0x4}, 0x0, 0x6, r0, 0x1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0xe, 0x4, 0x4, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r2, 0x0, 0x0}, 0x20) read(r1, &(0x7f0000001940)=""/232, 0xe8) r3 = syz_open_dev$vcsn(&(0x7f0000000000), 0x4, 0x202) preadv(r0, &(0x7f0000000540)=[{&(0x7f0000005100)=""/186, 0xba}, {&(0x7f00000001c0)=""/17, 0x11}, {&(0x7f0000000380)=""/120, 0x78}, {&(0x7f00000002c0)=""/23, 0x17}, {&(0x7f00000051c0)=""/4096, 0x1000}], 0x5, 0x6, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$TIPC_NL_MON_GET(r5, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={0x0, 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x0) accept$packet(r3, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001600)=0x14) r7 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000001740)=ANY=[@ANYBLOB="c93f3c02ff000000000000009e6693fb2e8ec666d7000000005fbd0f4720bd22ec885fe9fe9d9aa81ac02dfe2f89262e4448c74fd86990fc397d2fab4e1036a60b4bad9b142ffee70656130416137e110f252b6175b527b307d7cc00"/103], 0x0, 0x26}, 0x20) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000001f40)=ANY=[@ANYBLOB="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"/689], &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r7, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001880)={r8, 0xc0, &(0x7f0000001a40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0xb, 0x6, &(0x7f0000001940)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0xb7, &(0x7f000000cf3d)=""/183, 0x40f00, 0xc, '\x00', 0x0, 0x3, r7, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r9}, 0x78) r10 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="1801000000060600000000000000008efe63d5006f00000095", @ANYRESDEC, @ANYRES32=r1], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000300)='lock_acquire\x00', r10}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000016c0)={0x11, 0x10, &(0x7f0000001940)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x1000, &(0x7f0000000600)=""/4096, 0x41100, 0xb, '\x00', r6, 0x7, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x9, 0x3}, 0x8, 0x10, &(0x7f0000001680)={0x3, 0xc, 0xa, 0x6}, 0x10, r9, r10}, 0x78) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x5aa2b, &(0x7f0000000300)={&(0x7f0000001bc0)=@newlink={0x84, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x1288}, [@IFLA_LINKINFO={0x5c, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x4c, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_LINK={0x8, 0x1, r11}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r11}]}, 0x84}}, 0x0) 08:01:44 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9}, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x22040fb5, &(0x7f0000000080)={0x2, 0x4e23, @empty}, 0x10) dup2(r2, r3) 08:01:44 executing program 3: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00000061c0)={0x5, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x100000000, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x8000, 0x0, 0x0, 0x52b4, 0x800, 0x8, 0x4, 0x3, 0x6, 0x6, 0x0, @perf_config_ext={0x2, 0x60}, 0x12, 0x0, 0x0, 0x0, 0x0, 0x1abad1f5, 0x4}, 0x0, 0x6, r0, 0x1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0xe, 0x4, 0x4, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r2, 0x0, 0x0}, 0x20) read(r1, &(0x7f0000001940)=""/232, 0xe8) r3 = syz_open_dev$vcsn(&(0x7f0000000000), 0x4, 0x202) preadv(r0, &(0x7f0000000540)=[{&(0x7f0000005100)=""/186, 0xba}, {&(0x7f00000001c0)=""/17, 0x11}, {&(0x7f0000000380)=""/120, 0x78}, {&(0x7f00000002c0)=""/23, 0x17}, {&(0x7f00000051c0)=""/4096, 0x1000}], 0x5, 0x6, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$TIPC_NL_MON_GET(r5, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={0x0, 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x0) accept$packet(r3, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001600)=0x14) r7 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000001740)=ANY=[@ANYBLOB="c93f3c02ff000000000000009e6693fb2e8ec666d7000000005fbd0f4720bd22ec885fe9fe9d9aa81ac02dfe2f89262e4448c74fd86990fc397d2fab4e1036a60b4bad9b142ffee70656130416137e110f252b6175b527b307d7cc00"/103], 0x0, 0x26}, 0x20) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000001f40)=ANY=[@ANYBLOB="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"/689], &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r7, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001880)={r8, 0xc0, &(0x7f0000001a40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0xb, 0x6, &(0x7f0000001940)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0xb7, &(0x7f000000cf3d)=""/183, 0x40f00, 0xc, '\x00', 0x0, 0x3, r7, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r9}, 0x78) r10 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="1801000000060600000000000000008efe63d5006f00000095", @ANYRESDEC, @ANYRES32=r1], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000300)='lock_acquire\x00', r10}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000016c0)={0x11, 0x10, &(0x7f0000001940)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x1000, &(0x7f0000000600)=""/4096, 0x41100, 0xb, '\x00', r6, 0x7, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x9, 0x3}, 0x8, 0x10, &(0x7f0000001680)={0x3, 0xc, 0xa, 0x6}, 0x10, r9, r10}, 0x78) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x5aa2b, &(0x7f0000000300)={&(0x7f0000001bc0)=@newlink={0x84, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x1288}, [@IFLA_LINKINFO={0x5c, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x4c, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_LINK={0x8, 0x1, r11}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r11}]}, 0x84}}, 0x0) 08:01:45 executing program 0: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00000061c0)={0x5, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x100000000, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x8000, 0x0, 0x0, 0x52b4, 0x800, 0x8, 0x4, 0x3, 0x6, 0x6, 0x0, @perf_config_ext={0x2, 0x60}, 0x12, 0x0, 0x0, 0x0, 0x0, 0x1abad1f5, 0x4}, 0x0, 0x6, r0, 0x1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0xe, 0x4, 0x4, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r2, 0x0, 0x0}, 0x20) read(r1, &(0x7f0000001940)=""/232, 0xe8) r3 = syz_open_dev$vcsn(&(0x7f0000000000), 0x4, 0x202) preadv(r0, &(0x7f0000000540)=[{&(0x7f0000005100)=""/186, 0xba}, {&(0x7f00000001c0)=""/17, 0x11}, {&(0x7f0000000380)=""/120, 0x78}, {&(0x7f00000002c0)=""/23, 0x17}, {&(0x7f00000051c0)=""/4096, 0x1000}], 0x5, 0x6, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$TIPC_NL_MON_GET(r5, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={0x0, 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x0) accept$packet(r3, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001600)=0x14) r7 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000001740)=ANY=[@ANYBLOB="c93f3c02ff000000000000009e6693fb2e8ec666d7000000005fbd0f4720bd22ec885fe9fe9d9aa81ac02dfe2f89262e4448c74fd86990fc397d2fab4e1036a60b4bad9b142ffee70656130416137e110f252b6175b527b307d7cc00"/103], 0x0, 0x26}, 0x20) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000001f40)=ANY=[@ANYBLOB="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"/689], &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r7, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001880)={r8, 0xc0, &(0x7f0000001a40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0xb, 0x6, &(0x7f0000001940)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0xb7, &(0x7f000000cf3d)=""/183, 0x40f00, 0xc, '\x00', 0x0, 0x3, r7, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r9}, 0x78) r10 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="1801000000060600000000000000008efe63d5006f00000095", @ANYRESDEC, @ANYRES32=r1], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000300)='lock_acquire\x00', r10}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000016c0)={0x11, 0x10, &(0x7f0000001940)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x1000, &(0x7f0000000600)=""/4096, 0x41100, 0xb, '\x00', r6, 0x7, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x9, 0x3}, 0x8, 0x10, &(0x7f0000001680)={0x3, 0xc, 0xa, 0x6}, 0x10, r9, r10}, 0x78) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x5aa2b, &(0x7f0000000300)={&(0x7f0000001bc0)=@newlink={0x84, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x1288}, [@IFLA_LINKINFO={0x5c, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x4c, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_LINK={0x8, 0x1, r11}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r11}]}, 0x84}}, 0x0) 08:01:45 executing program 3: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00000061c0)={0x5, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x100000000, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x8000, 0x0, 0x0, 0x52b4, 0x800, 0x8, 0x4, 0x3, 0x6, 0x6, 0x0, @perf_config_ext={0x2, 0x60}, 0x12, 0x0, 0x0, 0x0, 0x0, 0x1abad1f5, 0x4}, 0x0, 0x6, r0, 0x1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0xe, 0x4, 0x4, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r2, 0x0, 0x0}, 0x20) read(r1, &(0x7f0000001940)=""/232, 0xe8) r3 = syz_open_dev$vcsn(&(0x7f0000000000), 0x4, 0x202) preadv(r0, &(0x7f0000000540)=[{&(0x7f0000005100)=""/186, 0xba}, {&(0x7f00000001c0)=""/17, 0x11}, {&(0x7f0000000380)=""/120, 0x78}, {&(0x7f00000002c0)=""/23, 0x17}, {&(0x7f00000051c0)=""/4096, 0x1000}], 0x5, 0x6, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$TIPC_NL_MON_GET(r5, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={0x0, 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x0) accept$packet(r3, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001600)=0x14) r7 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000001740)=ANY=[@ANYBLOB="c93f3c02ff000000000000009e6693fb2e8ec666d7000000005fbd0f4720bd22ec885fe9fe9d9aa81ac02dfe2f89262e4448c74fd86990fc397d2fab4e1036a60b4bad9b142ffee70656130416137e110f252b6175b527b307d7cc00"/103], 0x0, 0x26}, 0x20) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000001f40)=ANY=[@ANYBLOB="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"/689], &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r7, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001880)={r8, 0xc0, &(0x7f0000001a40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0xb, 0x6, &(0x7f0000001940)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0xb7, &(0x7f000000cf3d)=""/183, 0x40f00, 0xc, '\x00', 0x0, 0x3, r7, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r9}, 0x78) r10 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="1801000000060600000000000000008efe63d5006f00000095", @ANYRESDEC, @ANYRES32=r1], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000300)='lock_acquire\x00', r10}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000016c0)={0x11, 0x10, &(0x7f0000001940)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x1000, &(0x7f0000000600)=""/4096, 0x41100, 0xb, '\x00', r6, 0x7, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x9, 0x3}, 0x8, 0x10, &(0x7f0000001680)={0x3, 0xc, 0xa, 0x6}, 0x10, r9, r10}, 0x78) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x5aa2b, &(0x7f0000000300)={&(0x7f0000001bc0)=@newlink={0x84, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x1288}, [@IFLA_LINKINFO={0x5c, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x4c, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_LINK={0x8, 0x1, r11}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r11}]}, 0x84}}, 0x0) 08:01:45 executing program 0: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00000061c0)={0x5, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x100000000, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x8000, 0x0, 0x0, 0x52b4, 0x800, 0x8, 0x4, 0x3, 0x6, 0x6, 0x0, @perf_config_ext={0x2, 0x60}, 0x12, 0x0, 0x0, 0x0, 0x0, 0x1abad1f5, 0x4}, 0x0, 0x6, r0, 0x1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0xe, 0x4, 0x4, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r2, 0x0, 0x0}, 0x20) read(r1, &(0x7f0000001940)=""/232, 0xe8) r3 = syz_open_dev$vcsn(&(0x7f0000000000), 0x4, 0x202) preadv(r0, &(0x7f0000000540)=[{&(0x7f0000005100)=""/186, 0xba}, {&(0x7f00000001c0)=""/17, 0x11}, {&(0x7f0000000380)=""/120, 0x78}, {&(0x7f00000002c0)=""/23, 0x17}, {&(0x7f00000051c0)=""/4096, 0x1000}], 0x5, 0x6, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$TIPC_NL_MON_GET(r5, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={0x0, 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x0) accept$packet(r3, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001600)=0x14) r7 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000001740)=ANY=[@ANYBLOB="c93f3c02ff000000000000009e6693fb2e8ec666d7000000005fbd0f4720bd22ec885fe9fe9d9aa81ac02dfe2f89262e4448c74fd86990fc397d2fab4e1036a60b4bad9b142ffee70656130416137e110f252b6175b527b307d7cc00"/103], 0x0, 0x26}, 0x20) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000001f40)=ANY=[@ANYBLOB="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"/689], &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r7, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001880)={r8, 0xc0, &(0x7f0000001a40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0xb, 0x6, &(0x7f0000001940)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0xb7, &(0x7f000000cf3d)=""/183, 0x40f00, 0xc, '\x00', 0x0, 0x3, r7, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r9}, 0x78) r10 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="1801000000060600000000000000008efe63d5006f00000095", @ANYRESDEC, @ANYRES32=r1], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000300)='lock_acquire\x00', r10}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000016c0)={0x11, 0x10, &(0x7f0000001940)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x1000, &(0x7f0000000600)=""/4096, 0x41100, 0xb, '\x00', r6, 0x7, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x9, 0x3}, 0x8, 0x10, &(0x7f0000001680)={0x3, 0xc, 0xa, 0x6}, 0x10, r9, r10}, 0x78) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x5aa2b, &(0x7f0000000300)={&(0x7f0000001bc0)=@newlink={0x84, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x1288}, [@IFLA_LINKINFO={0x5c, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x4c, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_LINK={0x8, 0x1, r11}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r11}]}, 0x84}}, 0x0) 08:01:45 executing program 3: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00000061c0)={0x5, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x100000000, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x8000, 0x0, 0x0, 0x52b4, 0x800, 0x8, 0x4, 0x3, 0x6, 0x6, 0x0, @perf_config_ext={0x2, 0x60}, 0x12, 0x0, 0x0, 0x0, 0x0, 0x1abad1f5, 0x4}, 0x0, 0x6, r0, 0x1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0xe, 0x4, 0x4, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r2, 0x0, 0x0}, 0x20) read(r1, &(0x7f0000001940)=""/232, 0xe8) r3 = syz_open_dev$vcsn(&(0x7f0000000000), 0x4, 0x202) preadv(r0, &(0x7f0000000540)=[{&(0x7f0000005100)=""/186, 0xba}, {&(0x7f00000001c0)=""/17, 0x11}, {&(0x7f0000000380)=""/120, 0x78}, {&(0x7f00000002c0)=""/23, 0x17}, {&(0x7f00000051c0)=""/4096, 0x1000}], 0x5, 0x6, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$TIPC_NL_MON_GET(r5, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={0x0, 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x0) accept$packet(r3, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001600)=0x14) r7 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000001740)=ANY=[@ANYBLOB="c93f3c02ff000000000000009e6693fb2e8ec666d7000000005fbd0f4720bd22ec885fe9fe9d9aa81ac02dfe2f89262e4448c74fd86990fc397d2fab4e1036a60b4bad9b142ffee70656130416137e110f252b6175b527b307d7cc00"/103], 0x0, 0x26}, 0x20) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000001f40)=ANY=[@ANYBLOB="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"/689], &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r7, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001880)={r8, 0xc0, &(0x7f0000001a40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0xb, 0x6, &(0x7f0000001940)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0xb7, &(0x7f000000cf3d)=""/183, 0x40f00, 0xc, '\x00', 0x0, 0x3, r7, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r9}, 0x78) r10 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="1801000000060600000000000000008efe63d5006f00000095", @ANYRESDEC, @ANYRES32=r1], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000300)='lock_acquire\x00', r10}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000016c0)={0x11, 0x10, &(0x7f0000001940)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x1000, &(0x7f0000000600)=""/4096, 0x41100, 0xb, '\x00', r6, 0x7, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x9, 0x3}, 0x8, 0x10, &(0x7f0000001680)={0x3, 0xc, 0xa, 0x6}, 0x10, r9, r10}, 0x78) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x5aa2b, &(0x7f0000000300)={&(0x7f0000001bc0)=@newlink={0x84, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x1288}, [@IFLA_LINKINFO={0x5c, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x4c, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_LINK={0x8, 0x1, r11}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r11}]}, 0x84}}, 0x0) 08:01:45 executing program 0: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00000061c0)={0x5, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x100000000, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x8000, 0x0, 0x0, 0x52b4, 0x800, 0x8, 0x4, 0x3, 0x6, 0x6, 0x0, @perf_config_ext={0x2, 0x60}, 0x12, 0x0, 0x0, 0x0, 0x0, 0x1abad1f5, 0x4}, 0x0, 0x6, r0, 0x1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0xe, 0x4, 0x4, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r2, 0x0, 0x0}, 0x20) read(r1, &(0x7f0000001940)=""/232, 0xe8) r3 = syz_open_dev$vcsn(&(0x7f0000000000), 0x4, 0x202) preadv(r0, &(0x7f0000000540)=[{&(0x7f0000005100)=""/186, 0xba}, {&(0x7f00000001c0)=""/17, 0x11}, {&(0x7f0000000380)=""/120, 0x78}, {&(0x7f00000002c0)=""/23, 0x17}, {&(0x7f00000051c0)=""/4096, 0x1000}], 0x5, 0x6, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$TIPC_NL_MON_GET(r5, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={0x0, 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x0) accept$packet(r3, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001600)=0x14) r7 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000001740)=ANY=[@ANYBLOB="c93f3c02ff000000000000009e6693fb2e8ec666d7000000005fbd0f4720bd22ec885fe9fe9d9aa81ac02dfe2f89262e4448c74fd86990fc397d2fab4e1036a60b4bad9b142ffee70656130416137e110f252b6175b527b307d7cc00"/103], 0x0, 0x26}, 0x20) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000001f40)=ANY=[@ANYBLOB="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"/689], &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r7, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001880)={r8, 0xc0, &(0x7f0000001a40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0xb, 0x6, &(0x7f0000001940)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0xb7, &(0x7f000000cf3d)=""/183, 0x40f00, 0xc, '\x00', 0x0, 0x3, r7, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r9}, 0x78) r10 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="1801000000060600000000000000008efe63d5006f00000095", @ANYRESDEC, @ANYRES32=r1], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000300)='lock_acquire\x00', r10}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000016c0)={0x11, 0x10, &(0x7f0000001940)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x1000, &(0x7f0000000600)=""/4096, 0x41100, 0xb, '\x00', r6, 0x7, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x9, 0x3}, 0x8, 0x10, &(0x7f0000001680)={0x3, 0xc, 0xa, 0x6}, 0x10, r9, r10}, 0x78) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x5aa2b, &(0x7f0000000300)={&(0x7f0000001bc0)=@newlink={0x84, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x1288}, [@IFLA_LINKINFO={0x5c, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x4c, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_LINK={0x8, 0x1, r11}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r11}]}, 0x84}}, 0x0) 08:01:46 executing program 3: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00000061c0)={0x5, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x100000000, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x8000, 0x0, 0x0, 0x52b4, 0x800, 0x8, 0x4, 0x3, 0x6, 0x6, 0x0, @perf_config_ext={0x2, 0x60}, 0x12, 0x0, 0x0, 0x0, 0x0, 0x1abad1f5, 0x4}, 0x0, 0x6, r0, 0x1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0xe, 0x4, 0x4, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r2, 0x0, 0x0}, 0x20) read(r1, &(0x7f0000001940)=""/232, 0xe8) r3 = syz_open_dev$vcsn(&(0x7f0000000000), 0x4, 0x202) preadv(r0, &(0x7f0000000540)=[{&(0x7f0000005100)=""/186, 0xba}, {&(0x7f00000001c0)=""/17, 0x11}, {&(0x7f0000000380)=""/120, 0x78}, {&(0x7f00000002c0)=""/23, 0x17}, {&(0x7f00000051c0)=""/4096, 0x1000}], 0x5, 0x6, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$TIPC_NL_MON_GET(r5, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={0x0, 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x0) accept$packet(r3, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001600)=0x14) r7 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000001740)=ANY=[@ANYBLOB="c93f3c02ff000000000000009e6693fb2e8ec666d7000000005fbd0f4720bd22ec885fe9fe9d9aa81ac02dfe2f89262e4448c74fd86990fc397d2fab4e1036a60b4bad9b142ffee70656130416137e110f252b6175b527b307d7cc00"/103], 0x0, 0x26}, 0x20) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000001f40)=ANY=[@ANYBLOB="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"/689], &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r7, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001880)={r8, 0xc0, &(0x7f0000001a40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0xb, 0x6, &(0x7f0000001940)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0xb7, &(0x7f000000cf3d)=""/183, 0x40f00, 0xc, '\x00', 0x0, 0x3, r7, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r9}, 0x78) r10 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="1801000000060600000000000000008efe63d5006f00000095", @ANYRESDEC, @ANYRES32=r1], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000300)='lock_acquire\x00', r10}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000016c0)={0x11, 0x10, &(0x7f0000001940)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x1000, &(0x7f0000000600)=""/4096, 0x41100, 0xb, '\x00', r6, 0x7, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x9, 0x3}, 0x8, 0x10, &(0x7f0000001680)={0x3, 0xc, 0xa, 0x6}, 0x10, r9, r10}, 0x78) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x5aa2b, &(0x7f0000000300)={&(0x7f0000001bc0)=@newlink={0x84, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x1288}, [@IFLA_LINKINFO={0x5c, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x4c, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_LINK={0x8, 0x1, r11}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r11}]}, 0x84}}, 0x0) 08:01:46 executing program 5: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00000061c0)={0x5, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x100000000, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x8000, 0x0, 0x0, 0x52b4, 0x800, 0x8, 0x4, 0x3, 0x6, 0x6, 0x0, @perf_config_ext={0x2, 0x60}, 0x12, 0x0, 0x0, 0x0, 0x0, 0x1abad1f5, 0x4}, 0x0, 0x6, r0, 0x1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0xe, 0x4, 0x4, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r2, 0x0, 0x0}, 0x20) read(r1, &(0x7f0000001940)=""/232, 0xe8) r3 = syz_open_dev$vcsn(&(0x7f0000000000), 0x4, 0x202) preadv(r0, &(0x7f0000000540)=[{&(0x7f0000005100)=""/186, 0xba}, {&(0x7f00000001c0)=""/17, 0x11}, {&(0x7f0000000380)=""/120, 0x78}, {&(0x7f00000002c0)=""/23, 0x17}, {&(0x7f00000051c0)=""/4096, 0x1000}], 0x5, 0x6, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$TIPC_NL_MON_GET(r5, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={0x0, 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x0) accept$packet(r3, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001600)=0x14) r7 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000001740)=ANY=[@ANYBLOB="c93f3c02ff000000000000009e6693fb2e8ec666d7000000005fbd0f4720bd22ec885fe9fe9d9aa81ac02dfe2f89262e4448c74fd86990fc397d2fab4e1036a60b4bad9b142ffee70656130416137e110f252b6175b527b307d7cc00"/103], 0x0, 0x26}, 0x20) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000001f40)=ANY=[@ANYBLOB="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"/689], &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r7, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001880)={r8, 0xc0, &(0x7f0000001a40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0xb, 0x6, &(0x7f0000001940)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0xb7, &(0x7f000000cf3d)=""/183, 0x40f00, 0xc, '\x00', 0x0, 0x3, r7, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r9}, 0x78) r10 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="1801000000060600000000000000008efe63d5006f00000095", @ANYRESDEC, @ANYRES32=r1], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000300)='lock_acquire\x00', r10}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000016c0)={0x11, 0x10, &(0x7f0000001940)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x1000, &(0x7f0000000600)=""/4096, 0x41100, 0xb, '\x00', r6, 0x7, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x9, 0x3}, 0x8, 0x10, &(0x7f0000001680)={0x3, 0xc, 0xa, 0x6}, 0x10, r9, r10}, 0x78) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x5aa2b, &(0x7f0000000300)={&(0x7f0000001bc0)=@newlink={0x84, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x1288}, [@IFLA_LINKINFO={0x5c, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x4c, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_LINK={0x8, 0x1, r11}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r11}]}, 0x84}}, 0x0) 08:01:46 executing program 0: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00000061c0)={0x5, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x100000000, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x8000, 0x0, 0x0, 0x52b4, 0x800, 0x8, 0x4, 0x3, 0x6, 0x6, 0x0, @perf_config_ext={0x2, 0x60}, 0x12, 0x0, 0x0, 0x0, 0x0, 0x1abad1f5, 0x4}, 0x0, 0x6, r0, 0x1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0xe, 0x4, 0x4, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r2, 0x0, 0x0}, 0x20) read(r1, &(0x7f0000001940)=""/232, 0xe8) r3 = syz_open_dev$vcsn(&(0x7f0000000000), 0x4, 0x202) preadv(r0, &(0x7f0000000540)=[{&(0x7f0000005100)=""/186, 0xba}, {&(0x7f00000001c0)=""/17, 0x11}, {&(0x7f0000000380)=""/120, 0x78}, {&(0x7f00000002c0)=""/23, 0x17}, {&(0x7f00000051c0)=""/4096, 0x1000}], 0x5, 0x6, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$TIPC_NL_MON_GET(r5, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={0x0, 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x0) accept$packet(r3, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001600)=0x14) r7 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000001740)=ANY=[@ANYBLOB="c93f3c02ff000000000000009e6693fb2e8ec666d7000000005fbd0f4720bd22ec885fe9fe9d9aa81ac02dfe2f89262e4448c74fd86990fc397d2fab4e1036a60b4bad9b142ffee70656130416137e110f252b6175b527b307d7cc00"/103], 0x0, 0x26}, 0x20) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000001f40)=ANY=[@ANYBLOB="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"/689], &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r7, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001880)={r8, 0xc0, &(0x7f0000001a40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0xb, 0x6, &(0x7f0000001940)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0xb7, &(0x7f000000cf3d)=""/183, 0x40f00, 0xc, '\x00', 0x0, 0x3, r7, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r9}, 0x78) r10 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="1801000000060600000000000000008efe63d5006f00000095", @ANYRESDEC, @ANYRES32=r1], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000300)='lock_acquire\x00', r10}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000016c0)={0x11, 0x10, &(0x7f0000001940)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x1000, &(0x7f0000000600)=""/4096, 0x41100, 0xb, '\x00', r6, 0x7, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x9, 0x3}, 0x8, 0x10, &(0x7f0000001680)={0x3, 0xc, 0xa, 0x6}, 0x10, r9, r10}, 0x78) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x5aa2b, &(0x7f0000000300)={&(0x7f0000001bc0)=@newlink={0x84, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x1288}, [@IFLA_LINKINFO={0x5c, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x4c, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_LINK={0x8, 0x1, r11}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r11}]}, 0x84}}, 0x0) 08:01:46 executing program 2: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00000061c0)={0x5, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x100000000, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x8000, 0x0, 0x0, 0x52b4, 0x800, 0x8, 0x4, 0x3, 0x6, 0x6, 0x0, @perf_config_ext={0x2, 0x60}, 0x12, 0x0, 0x0, 0x0, 0x0, 0x1abad1f5, 0x4}, 0x0, 0x6, r0, 0x1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0xe, 0x4, 0x4, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r2, 0x0, 0x0}, 0x20) read(r1, &(0x7f0000001940)=""/232, 0xe8) r3 = syz_open_dev$vcsn(&(0x7f0000000000), 0x4, 0x202) preadv(r0, &(0x7f0000000540)=[{&(0x7f0000005100)=""/186, 0xba}, {&(0x7f00000001c0)=""/17, 0x11}, {&(0x7f0000000380)=""/120, 0x78}, {&(0x7f00000002c0)=""/23, 0x17}, {&(0x7f00000051c0)=""/4096, 0x1000}], 0x5, 0x6, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$TIPC_NL_MON_GET(r5, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={0x0, 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x0) accept$packet(r3, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001600)=0x14) r7 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000001740)=ANY=[@ANYBLOB="c93f3c02ff000000000000009e6693fb2e8ec666d7000000005fbd0f4720bd22ec885fe9fe9d9aa81ac02dfe2f89262e4448c74fd86990fc397d2fab4e1036a60b4bad9b142ffee70656130416137e110f252b6175b527b307d7cc00"/103], 0x0, 0x26}, 0x20) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000001f40)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000007999d02ff278039a60e2a885a593f9d4827ea4d48e0c802b77d89caec400002613f462acb4244fbcf91581f2b7810000006122cafe62f383212a831799084db50ae56d6cfdad88ea2ab02a5c186b4b2cb6d799b0b3d49e885db0591987b5e976dad1579a28b9f1ce17471d54fd6aee916d44c7871b58c442b15d40f29f59364ed2c75006b54db592ceaef87d14ed838968be2a16c78f3fea81c1bf0dd2c9d9be4b3aa26c1f60e65ae10c07f2db982187c47acf606e44ec66f11f0dd84c0f82bd4e60efe44ffb31fde79015ad50c96d94f60c40735bfad14717e7e7c1709c5dfb4c95a732113f189993d797c11dfa134e93f8c3fa3de94c12ede7990a3f9b82af05c45984e247c59b355c6694675f14736f506e6c19182d2ca5c01cee5443b987a67e7224a062b9505ad9452f90ea1d3406bf4469f800cc12182c23277d73c153c550d9600fe035a2a357c273163a599cb43cf6309e48928ee9eeced9ef5f634cb4dc39bfa69962324f31de23bfccff731bf552c7839f2594a5f7c2fdd45b4219c73e8bcbab144c0d8d2119948fdb0931bc0abbb19498027300df06802b90385b7693935cc681f70000000000b381b66237d90683f0880b2ca0e6bffb565bb5c712ba6411b0f5484340f71023e9a99b8b32999565fd871c004db3d000527f36d146fd41e7cdc6feb105d95818fa77a17fc79dfcdb9fe6dbe81155e75a802d2422b1f2d5695c00854f0efbc22aa018773e683715b626fdd4e0637bc80bb1c1e201524a0cc55f54a1b962aa651211b8a1728bfb6ecfde0681ee5b42514c7c64fde01329798b103fa2562fe21e26d74459875149977025707e1a793cc31db78aa3a9b57c177102b1ccc66653848e54e30d755bbf663eb5099dcdbc3432033a7280497502f9e69f86557f16a37992ec4a00"/689], &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r7, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001880)={r8, 0xc0, &(0x7f0000001a40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0xb, 0x6, &(0x7f0000001940)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0xb7, &(0x7f000000cf3d)=""/183, 0x40f00, 0xc, '\x00', 0x0, 0x3, r7, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r9}, 0x78) r10 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="1801000000060600000000000000008efe63d5006f00000095", @ANYRESDEC, @ANYRES32=r1], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000300)='lock_acquire\x00', r10}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000016c0)={0x11, 0x10, &(0x7f0000001940)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x1000, &(0x7f0000000600)=""/4096, 0x41100, 0xb, '\x00', r6, 0x7, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x9, 0x3}, 0x8, 0x10, &(0x7f0000001680)={0x3, 0xc, 0xa, 0x6}, 0x10, r9, r10}, 0x78) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x5aa2b, &(0x7f0000000300)={&(0x7f0000001bc0)=@newlink={0x84, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x1288}, [@IFLA_LINKINFO={0x5c, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x4c, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_LINK={0x8, 0x1, r11}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r11}]}, 0x84}}, 0x0) 08:01:46 executing program 3: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00000061c0)={0x5, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x100000000, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x8000, 0x0, 0x0, 0x52b4, 0x800, 0x8, 0x4, 0x3, 0x6, 0x6, 0x0, @perf_config_ext={0x2, 0x60}, 0x12, 0x0, 0x0, 0x0, 0x0, 0x1abad1f5, 0x4}, 0x0, 0x6, r0, 0x1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0xe, 0x4, 0x4, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r2, 0x0, 0x0}, 0x20) read(r1, &(0x7f0000001940)=""/232, 0xe8) r3 = syz_open_dev$vcsn(&(0x7f0000000000), 0x4, 0x202) preadv(r0, &(0x7f0000000540)=[{&(0x7f0000005100)=""/186, 0xba}, {&(0x7f00000001c0)=""/17, 0x11}, {&(0x7f0000000380)=""/120, 0x78}, {&(0x7f00000002c0)=""/23, 0x17}, {&(0x7f00000051c0)=""/4096, 0x1000}], 0x5, 0x6, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$TIPC_NL_MON_GET(r5, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={0x0, 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x0) accept$packet(r3, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001600)=0x14) r7 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000001740)=ANY=[@ANYBLOB="c93f3c02ff000000000000009e6693fb2e8ec666d7000000005fbd0f4720bd22ec885fe9fe9d9aa81ac02dfe2f89262e4448c74fd86990fc397d2fab4e1036a60b4bad9b142ffee70656130416137e110f252b6175b527b307d7cc00"/103], 0x0, 0x26}, 0x20) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000001f40)=ANY=[@ANYBLOB="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"/689], &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r7, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001880)={r8, 0xc0, &(0x7f0000001a40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0xb, 0x6, &(0x7f0000001940)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0xb7, &(0x7f000000cf3d)=""/183, 0x40f00, 0xc, '\x00', 0x0, 0x3, r7, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r9}, 0x78) r10 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="1801000000060600000000000000008efe63d5006f00000095", @ANYRESDEC, @ANYRES32=r1], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000300)='lock_acquire\x00', r10}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000016c0)={0x11, 0x10, &(0x7f0000001940)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x1000, &(0x7f0000000600)=""/4096, 0x41100, 0xb, '\x00', r6, 0x7, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x9, 0x3}, 0x8, 0x10, &(0x7f0000001680)={0x3, 0xc, 0xa, 0x6}, 0x10, r9, r10}, 0x78) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x5aa2b, &(0x7f0000000300)={&(0x7f0000001bc0)=@newlink={0x84, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x1288}, [@IFLA_LINKINFO={0x5c, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x4c, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_LINK={0x8, 0x1, r11}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r11}]}, 0x84}}, 0x0) 08:01:46 executing program 4: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00000061c0)={0x5, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x100000000, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x8000, 0x0, 0x0, 0x52b4, 0x800, 0x8, 0x4, 0x3, 0x6, 0x6, 0x0, @perf_config_ext={0x2, 0x60}, 0x12, 0x0, 0x0, 0x0, 0x0, 0x1abad1f5, 0x4}, 0x0, 0x6, r0, 0x1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0xe, 0x4, 0x4, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r2, 0x0, 0x0}, 0x20) read(r1, &(0x7f0000001940)=""/232, 0xe8) r3 = syz_open_dev$vcsn(&(0x7f0000000000), 0x4, 0x202) preadv(r0, &(0x7f0000000540)=[{&(0x7f0000005100)=""/186, 0xba}, {&(0x7f00000001c0)=""/17, 0x11}, {&(0x7f0000000380)=""/120, 0x78}, {&(0x7f00000002c0)=""/23, 0x17}, {&(0x7f00000051c0)=""/4096, 0x1000}], 0x5, 0x6, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$TIPC_NL_MON_GET(r5, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={0x0, 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x0) accept$packet(r3, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001600)=0x14) r7 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000001740)=ANY=[@ANYBLOB="c93f3c02ff000000000000009e6693fb2e8ec666d7000000005fbd0f4720bd22ec885fe9fe9d9aa81ac02dfe2f89262e4448c74fd86990fc397d2fab4e1036a60b4bad9b142ffee70656130416137e110f252b6175b527b307d7cc00"/103], 0x0, 0x26}, 0x20) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000001f40)=ANY=[@ANYBLOB="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"/689], &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r7, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001880)={r8, 0xc0, &(0x7f0000001a40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0xb, 0x6, &(0x7f0000001940)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0xb7, &(0x7f000000cf3d)=""/183, 0x40f00, 0xc, '\x00', 0x0, 0x3, r7, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r9}, 0x78) r10 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="1801000000060600000000000000008efe63d5006f00000095", @ANYRESDEC, @ANYRES32=r1], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000300)='lock_acquire\x00', r10}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000016c0)={0x11, 0x10, &(0x7f0000001940)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x1000, &(0x7f0000000600)=""/4096, 0x41100, 0xb, '\x00', r6, 0x7, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x9, 0x3}, 0x8, 0x10, &(0x7f0000001680)={0x3, 0xc, 0xa, 0x6}, 0x10, r9, r10}, 0x78) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x5aa2b, &(0x7f0000000300)={&(0x7f0000001bc0)=@newlink={0x84, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x1288}, [@IFLA_LINKINFO={0x5c, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x4c, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_LINK={0x8, 0x1, r11}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r11}]}, 0x84}}, 0x0) 08:01:46 executing program 1: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00000061c0)={0x5, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x100000000, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x8000, 0x0, 0x0, 0x52b4, 0x800, 0x8, 0x4, 0x3, 0x6, 0x6, 0x0, @perf_config_ext={0x2, 0x60}, 0x12, 0x0, 0x0, 0x0, 0x0, 0x1abad1f5, 0x4}, 0x0, 0x6, r0, 0x1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0xe, 0x4, 0x4, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r2, 0x0, 0x0}, 0x20) read(r1, &(0x7f0000001940)=""/232, 0xe8) r3 = syz_open_dev$vcsn(&(0x7f0000000000), 0x4, 0x202) preadv(r0, &(0x7f0000000540)=[{&(0x7f0000005100)=""/186, 0xba}, {&(0x7f00000001c0)=""/17, 0x11}, {&(0x7f0000000380)=""/120, 0x78}, {&(0x7f00000002c0)=""/23, 0x17}, {&(0x7f00000051c0)=""/4096, 0x1000}], 0x5, 0x6, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$TIPC_NL_MON_GET(r5, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={0x0, 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x0) accept$packet(r3, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001600)=0x14) r7 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000001740)=ANY=[@ANYBLOB="c93f3c02ff000000000000009e6693fb2e8ec666d7000000005fbd0f4720bd22ec885fe9fe9d9aa81ac02dfe2f89262e4448c74fd86990fc397d2fab4e1036a60b4bad9b142ffee70656130416137e110f252b6175b527b307d7cc00"/103], 0x0, 0x26}, 0x20) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000001f40)=ANY=[@ANYBLOB="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"/689], &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r7, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001880)={r8, 0xc0, &(0x7f0000001a40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0xb, 0x6, &(0x7f0000001940)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0xb7, &(0x7f000000cf3d)=""/183, 0x40f00, 0xc, '\x00', 0x0, 0x3, r7, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r9}, 0x78) r10 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="1801000000060600000000000000008efe63d5006f00000095", @ANYRESDEC, @ANYRES32=r1], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000300)='lock_acquire\x00', r10}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000016c0)={0x11, 0x10, &(0x7f0000001940)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x1000, &(0x7f0000000600)=""/4096, 0x41100, 0xb, '\x00', r6, 0x7, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x9, 0x3}, 0x8, 0x10, &(0x7f0000001680)={0x3, 0xc, 0xa, 0x6}, 0x10, r9, r10}, 0x78) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x5aa2b, &(0x7f0000000300)={&(0x7f0000001bc0)=@newlink={0x84, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x1288}, [@IFLA_LINKINFO={0x5c, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x4c, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_LINK={0x8, 0x1, r11}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r11}]}, 0x84}}, 0x0) 08:01:46 executing program 5: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00000061c0)={0x5, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x100000000, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x8000, 0x0, 0x0, 0x52b4, 0x800, 0x8, 0x4, 0x3, 0x6, 0x6, 0x0, @perf_config_ext={0x2, 0x60}, 0x12, 0x0, 0x0, 0x0, 0x0, 0x1abad1f5, 0x4}, 0x0, 0x6, r0, 0x1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0xe, 0x4, 0x4, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r2, 0x0, 0x0}, 0x20) read(r1, &(0x7f0000001940)=""/232, 0xe8) r3 = syz_open_dev$vcsn(&(0x7f0000000000), 0x4, 0x202) preadv(r0, &(0x7f0000000540)=[{&(0x7f0000005100)=""/186, 0xba}, {&(0x7f00000001c0)=""/17, 0x11}, {&(0x7f0000000380)=""/120, 0x78}, {&(0x7f00000002c0)=""/23, 0x17}, {&(0x7f00000051c0)=""/4096, 0x1000}], 0x5, 0x6, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$TIPC_NL_MON_GET(r5, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={0x0, 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x0) accept$packet(r3, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001600)=0x14) r7 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000001740)=ANY=[@ANYBLOB="c93f3c02ff000000000000009e6693fb2e8ec666d7000000005fbd0f4720bd22ec885fe9fe9d9aa81ac02dfe2f89262e4448c74fd86990fc397d2fab4e1036a60b4bad9b142ffee70656130416137e110f252b6175b527b307d7cc00"/103], 0x0, 0x26}, 0x20) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000001f40)=ANY=[@ANYBLOB="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"/689], &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r7, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001880)={r8, 0xc0, &(0x7f0000001a40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0xb, 0x6, &(0x7f0000001940)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0xb7, &(0x7f000000cf3d)=""/183, 0x40f00, 0xc, '\x00', 0x0, 0x3, r7, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r9}, 0x78) r10 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="1801000000060600000000000000008efe63d5006f00000095", @ANYRESDEC, @ANYRES32=r1], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000300)='lock_acquire\x00', r10}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000016c0)={0x11, 0x10, &(0x7f0000001940)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x1000, &(0x7f0000000600)=""/4096, 0x41100, 0xb, '\x00', r6, 0x7, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x9, 0x3}, 0x8, 0x10, &(0x7f0000001680)={0x3, 0xc, 0xa, 0x6}, 0x10, r9, r10}, 0x78) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x5aa2b, &(0x7f0000000300)={&(0x7f0000001bc0)=@newlink={0x84, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x1288}, [@IFLA_LINKINFO={0x5c, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x4c, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_LINK={0x8, 0x1, r11}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r11}]}, 0x84}}, 0x0) 08:01:46 executing program 0: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00000061c0)={0x5, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x100000000, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x8000, 0x0, 0x0, 0x52b4, 0x800, 0x8, 0x4, 0x3, 0x6, 0x6, 0x0, @perf_config_ext={0x2, 0x60}, 0x12, 0x0, 0x0, 0x0, 0x0, 0x1abad1f5, 0x4}, 0x0, 0x6, r0, 0x1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0xe, 0x4, 0x4, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r2, 0x0, 0x0}, 0x20) read(r1, &(0x7f0000001940)=""/232, 0xe8) r3 = syz_open_dev$vcsn(&(0x7f0000000000), 0x4, 0x202) preadv(r0, &(0x7f0000000540)=[{&(0x7f0000005100)=""/186, 0xba}, {&(0x7f00000001c0)=""/17, 0x11}, {&(0x7f0000000380)=""/120, 0x78}, {&(0x7f00000002c0)=""/23, 0x17}, {&(0x7f00000051c0)=""/4096, 0x1000}], 0x5, 0x6, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$TIPC_NL_MON_GET(r5, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={0x0, 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x0) accept$packet(r3, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001600)=0x14) r7 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000001740)=ANY=[@ANYBLOB="c93f3c02ff000000000000009e6693fb2e8ec666d7000000005fbd0f4720bd22ec885fe9fe9d9aa81ac02dfe2f89262e4448c74fd86990fc397d2fab4e1036a60b4bad9b142ffee70656130416137e110f252b6175b527b307d7cc00"/103], 0x0, 0x26}, 0x20) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000001f40)=ANY=[@ANYBLOB="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"/689], &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r7, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001880)={r8, 0xc0, &(0x7f0000001a40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0xb, 0x6, &(0x7f0000001940)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0xb7, &(0x7f000000cf3d)=""/183, 0x40f00, 0xc, '\x00', 0x0, 0x3, r7, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r9}, 0x78) r10 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="1801000000060600000000000000008efe63d5006f00000095", @ANYRESDEC, @ANYRES32=r1], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000300)='lock_acquire\x00', r10}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000016c0)={0x11, 0x10, &(0x7f0000001940)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x1000, &(0x7f0000000600)=""/4096, 0x41100, 0xb, '\x00', r6, 0x7, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x9, 0x3}, 0x8, 0x10, &(0x7f0000001680)={0x3, 0xc, 0xa, 0x6}, 0x10, r9, r10}, 0x78) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x5aa2b, &(0x7f0000000300)={&(0x7f0000001bc0)=@newlink={0x84, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x1288}, [@IFLA_LINKINFO={0x5c, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x4c, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_LINK={0x8, 0x1, r11}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r11}]}, 0x84}}, 0x0) 08:01:46 executing program 2: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00000061c0)={0x5, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x100000000, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x8000, 0x0, 0x0, 0x52b4, 0x800, 0x8, 0x4, 0x3, 0x6, 0x6, 0x0, @perf_config_ext={0x2, 0x60}, 0x12, 0x0, 0x0, 0x0, 0x0, 0x1abad1f5, 0x4}, 0x0, 0x6, r0, 0x1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0xe, 0x4, 0x4, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r2, 0x0, 0x0}, 0x20) read(r1, &(0x7f0000001940)=""/232, 0xe8) r3 = syz_open_dev$vcsn(&(0x7f0000000000), 0x4, 0x202) preadv(r0, &(0x7f0000000540)=[{&(0x7f0000005100)=""/186, 0xba}, {&(0x7f00000001c0)=""/17, 0x11}, {&(0x7f0000000380)=""/120, 0x78}, {&(0x7f00000002c0)=""/23, 0x17}, {&(0x7f00000051c0)=""/4096, 0x1000}], 0x5, 0x6, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$TIPC_NL_MON_GET(r5, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={0x0, 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x0) accept$packet(r3, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001600)=0x14) r7 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000001740)=ANY=[@ANYBLOB="c93f3c02ff000000000000009e6693fb2e8ec666d7000000005fbd0f4720bd22ec885fe9fe9d9aa81ac02dfe2f89262e4448c74fd86990fc397d2fab4e1036a60b4bad9b142ffee70656130416137e110f252b6175b527b307d7cc00"/103], 0x0, 0x26}, 0x20) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000001f40)=ANY=[@ANYBLOB="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"/689], &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r7, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001880)={r8, 0xc0, &(0x7f0000001a40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0xb, 0x6, &(0x7f0000001940)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0xb7, &(0x7f000000cf3d)=""/183, 0x40f00, 0xc, '\x00', 0x0, 0x3, r7, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r9}, 0x78) r10 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="1801000000060600000000000000008efe63d5006f00000095", @ANYRESDEC, @ANYRES32=r1], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000300)='lock_acquire\x00', r10}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000016c0)={0x11, 0x10, &(0x7f0000001940)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x1000, &(0x7f0000000600)=""/4096, 0x41100, 0xb, '\x00', r6, 0x7, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x9, 0x3}, 0x8, 0x10, &(0x7f0000001680)={0x3, 0xc, 0xa, 0x6}, 0x10, r9, r10}, 0x78) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x5aa2b, &(0x7f0000000300)={&(0x7f0000001bc0)=@newlink={0x84, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x1288}, [@IFLA_LINKINFO={0x5c, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x4c, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_LINK={0x8, 0x1, r11}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r11}]}, 0x84}}, 0x0) 08:01:47 executing program 3: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00000061c0)={0x5, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x100000000, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x8000, 0x0, 0x0, 0x52b4, 0x800, 0x8, 0x4, 0x3, 0x6, 0x6, 0x0, @perf_config_ext={0x2, 0x60}, 0x12, 0x0, 0x0, 0x0, 0x0, 0x1abad1f5, 0x4}, 0x0, 0x6, r0, 0x1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0xe, 0x4, 0x4, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r2, 0x0, 0x0}, 0x20) read(r1, &(0x7f0000001940)=""/232, 0xe8) r3 = syz_open_dev$vcsn(&(0x7f0000000000), 0x4, 0x202) preadv(r0, &(0x7f0000000540)=[{&(0x7f0000005100)=""/186, 0xba}, {&(0x7f00000001c0)=""/17, 0x11}, {&(0x7f0000000380)=""/120, 0x78}, {&(0x7f00000002c0)=""/23, 0x17}, {&(0x7f00000051c0)=""/4096, 0x1000}], 0x5, 0x6, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$TIPC_NL_MON_GET(r5, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={0x0, 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x0) accept$packet(r3, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001600)=0x14) r7 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000001740)=ANY=[@ANYBLOB="c93f3c02ff000000000000009e6693fb2e8ec666d7000000005fbd0f4720bd22ec885fe9fe9d9aa81ac02dfe2f89262e4448c74fd86990fc397d2fab4e1036a60b4bad9b142ffee70656130416137e110f252b6175b527b307d7cc00"/103], 0x0, 0x26}, 0x20) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000001f40)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000007999d02ff278039a60e2a885a593f9d4827ea4d48e0c802b77d89caec400002613f462acb4244fbcf91581f2b7810000006122cafe62f383212a831799084db50ae56d6cfdad88ea2ab02a5c186b4b2cb6d799b0b3d49e885db0591987b5e976dad1579a28b9f1ce17471d54fd6aee916d44c7871b58c442b15d40f29f59364ed2c75006b54db592ceaef87d14ed838968be2a16c78f3fea81c1bf0dd2c9d9be4b3aa26c1f60e65ae10c07f2db982187c47acf606e44ec66f11f0dd84c0f82bd4e60efe44ffb31fde79015ad50c96d94f60c40735bfad14717e7e7c1709c5dfb4c95a732113f189993d797c11dfa134e93f8c3fa3de94c12ede7990a3f9b82af05c45984e247c59b355c6694675f14736f506e6c19182d2ca5c01cee5443b987a67e7224a062b9505ad9452f90ea1d3406bf4469f800cc12182c23277d73c153c550d9600fe035a2a357c273163a599cb43cf6309e48928ee9eeced9ef5f634cb4dc39bfa69962324f31de23bfccff731bf552c7839f2594a5f7c2fdd45b4219c73e8bcbab144c0d8d2119948fdb0931bc0abbb19498027300df06802b90385b7693935cc681f70000000000b381b66237d90683f0880b2ca0e6bffb565bb5c712ba6411b0f5484340f71023e9a99b8b32999565fd871c004db3d000527f36d146fd41e7cdc6feb105d95818fa77a17fc79dfcdb9fe6dbe81155e75a802d2422b1f2d5695c00854f0efbc22aa018773e683715b626fdd4e0637bc80bb1c1e201524a0cc55f54a1b962aa651211b8a1728bfb6ecfde0681ee5b42514c7c64fde01329798b103fa2562fe21e26d74459875149977025707e1a793cc31db78aa3a9b57c177102b1ccc66653848e54e30d755bbf663eb5099dcdbc3432033a7280497502f9e69f86557f16a37992ec4a00"/689], &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r7, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001880)={r8, 0xc0, &(0x7f0000001a40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0xb, 0x6, &(0x7f0000001940)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0xb7, &(0x7f000000cf3d)=""/183, 0x40f00, 0xc, '\x00', 0x0, 0x3, r7, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r9}, 0x78) r10 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="1801000000060600000000000000008efe63d5006f00000095", @ANYRESDEC, @ANYRES32=r1], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000300)='lock_acquire\x00', r10}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000016c0)={0x11, 0x10, &(0x7f0000001940)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x1000, &(0x7f0000000600)=""/4096, 0x41100, 0xb, '\x00', r6, 0x7, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x9, 0x3}, 0x8, 0x10, &(0x7f0000001680)={0x3, 0xc, 0xa, 0x6}, 0x10, r9, r10}, 0x78) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x5aa2b, &(0x7f0000000300)={&(0x7f0000001bc0)=@newlink={0x84, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x1288}, [@IFLA_LINKINFO={0x5c, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x4c, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_LINK={0x8, 0x1, r11}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r11}]}, 0x84}}, 0x0) 08:01:47 executing program 4: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00000061c0)={0x5, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x100000000, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x8000, 0x0, 0x0, 0x52b4, 0x800, 0x8, 0x4, 0x3, 0x6, 0x6, 0x0, @perf_config_ext={0x2, 0x60}, 0x12, 0x0, 0x0, 0x0, 0x0, 0x1abad1f5, 0x4}, 0x0, 0x6, r0, 0x1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0xe, 0x4, 0x4, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r2, 0x0, 0x0}, 0x20) read(r1, &(0x7f0000001940)=""/232, 0xe8) r3 = syz_open_dev$vcsn(&(0x7f0000000000), 0x4, 0x202) preadv(r0, &(0x7f0000000540)=[{&(0x7f0000005100)=""/186, 0xba}, {&(0x7f00000001c0)=""/17, 0x11}, {&(0x7f0000000380)=""/120, 0x78}, {&(0x7f00000002c0)=""/23, 0x17}, {&(0x7f00000051c0)=""/4096, 0x1000}], 0x5, 0x6, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$TIPC_NL_MON_GET(r5, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={0x0, 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x0) accept$packet(r3, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001600)=0x14) r7 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000001740)=ANY=[@ANYBLOB="c93f3c02ff000000000000009e6693fb2e8ec666d7000000005fbd0f4720bd22ec885fe9fe9d9aa81ac02dfe2f89262e4448c74fd86990fc397d2fab4e1036a60b4bad9b142ffee70656130416137e110f252b6175b527b307d7cc00"/103], 0x0, 0x26}, 0x20) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000001f40)=ANY=[@ANYBLOB="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"/689], &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r7, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001880)={r8, 0xc0, &(0x7f0000001a40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0xb, 0x6, &(0x7f0000001940)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0xb7, &(0x7f000000cf3d)=""/183, 0x40f00, 0xc, '\x00', 0x0, 0x3, r7, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r9}, 0x78) r10 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="1801000000060600000000000000008efe63d5006f00000095", @ANYRESDEC, @ANYRES32=r1], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000300)='lock_acquire\x00', r10}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000016c0)={0x11, 0x10, &(0x7f0000001940)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x1000, &(0x7f0000000600)=""/4096, 0x41100, 0xb, '\x00', r6, 0x7, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x9, 0x3}, 0x8, 0x10, &(0x7f0000001680)={0x3, 0xc, 0xa, 0x6}, 0x10, r9, r10}, 0x78) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x5aa2b, &(0x7f0000000300)={&(0x7f0000001bc0)=@newlink={0x84, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x1288}, [@IFLA_LINKINFO={0x5c, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x4c, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_LINK={0x8, 0x1, r11}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r11}]}, 0x84}}, 0x0) 08:01:47 executing program 1: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00000061c0)={0x5, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x100000000, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x8000, 0x0, 0x0, 0x52b4, 0x800, 0x8, 0x4, 0x3, 0x6, 0x6, 0x0, @perf_config_ext={0x2, 0x60}, 0x12, 0x0, 0x0, 0x0, 0x0, 0x1abad1f5, 0x4}, 0x0, 0x6, r0, 0x1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0xe, 0x4, 0x4, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r2, 0x0, 0x0}, 0x20) read(r1, &(0x7f0000001940)=""/232, 0xe8) r3 = syz_open_dev$vcsn(&(0x7f0000000000), 0x4, 0x202) preadv(r0, &(0x7f0000000540)=[{&(0x7f0000005100)=""/186, 0xba}, {&(0x7f00000001c0)=""/17, 0x11}, {&(0x7f0000000380)=""/120, 0x78}, {&(0x7f00000002c0)=""/23, 0x17}, {&(0x7f00000051c0)=""/4096, 0x1000}], 0x5, 0x6, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$TIPC_NL_MON_GET(r5, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={0x0, 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x0) accept$packet(r3, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001600)=0x14) r7 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000001740)=ANY=[@ANYBLOB="c93f3c02ff000000000000009e6693fb2e8ec666d7000000005fbd0f4720bd22ec885fe9fe9d9aa81ac02dfe2f89262e4448c74fd86990fc397d2fab4e1036a60b4bad9b142ffee70656130416137e110f252b6175b527b307d7cc00"/103], 0x0, 0x26}, 0x20) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000001f40)=ANY=[@ANYBLOB="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"/689], &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r7, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001880)={r8, 0xc0, &(0x7f0000001a40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0xb, 0x6, &(0x7f0000001940)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0xb7, &(0x7f000000cf3d)=""/183, 0x40f00, 0xc, '\x00', 0x0, 0x3, r7, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r9}, 0x78) r10 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="1801000000060600000000000000008efe63d5006f00000095", @ANYRESDEC, @ANYRES32=r1], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000300)='lock_acquire\x00', r10}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000016c0)={0x11, 0x10, &(0x7f0000001940)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x1000, &(0x7f0000000600)=""/4096, 0x41100, 0xb, '\x00', r6, 0x7, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x9, 0x3}, 0x8, 0x10, &(0x7f0000001680)={0x3, 0xc, 0xa, 0x6}, 0x10, r9, r10}, 0x78) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x5aa2b, &(0x7f0000000300)={&(0x7f0000001bc0)=@newlink={0x84, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x1288}, [@IFLA_LINKINFO={0x5c, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x4c, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_LINK={0x8, 0x1, r11}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r11}]}, 0x84}}, 0x0) 08:01:47 executing program 5: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00000061c0)={0x5, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x100000000, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x8000, 0x0, 0x0, 0x52b4, 0x800, 0x8, 0x4, 0x3, 0x6, 0x6, 0x0, @perf_config_ext={0x2, 0x60}, 0x12, 0x0, 0x0, 0x0, 0x0, 0x1abad1f5, 0x4}, 0x0, 0x6, r0, 0x1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0xe, 0x4, 0x4, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r2, 0x0, 0x0}, 0x20) read(r1, &(0x7f0000001940)=""/232, 0xe8) r3 = syz_open_dev$vcsn(&(0x7f0000000000), 0x4, 0x202) preadv(r0, &(0x7f0000000540)=[{&(0x7f0000005100)=""/186, 0xba}, {&(0x7f00000001c0)=""/17, 0x11}, {&(0x7f0000000380)=""/120, 0x78}, {&(0x7f00000002c0)=""/23, 0x17}, {&(0x7f00000051c0)=""/4096, 0x1000}], 0x5, 0x6, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$TIPC_NL_MON_GET(r5, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={0x0, 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x0) accept$packet(r3, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001600)=0x14) r7 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000001740)=ANY=[@ANYBLOB="c93f3c02ff000000000000009e6693fb2e8ec666d7000000005fbd0f4720bd22ec885fe9fe9d9aa81ac02dfe2f89262e4448c74fd86990fc397d2fab4e1036a60b4bad9b142ffee70656130416137e110f252b6175b527b307d7cc00"/103], 0x0, 0x26}, 0x20) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000001f40)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000007999d02ff278039a60e2a885a593f9d4827ea4d48e0c802b77d89caec400002613f462acb4244fbcf91581f2b7810000006122cafe62f383212a831799084db50ae56d6cfdad88ea2ab02a5c186b4b2cb6d799b0b3d49e885db0591987b5e976dad1579a28b9f1ce17471d54fd6aee916d44c7871b58c442b15d40f29f59364ed2c75006b54db592ceaef87d14ed838968be2a16c78f3fea81c1bf0dd2c9d9be4b3aa26c1f60e65ae10c07f2db982187c47acf606e44ec66f11f0dd84c0f82bd4e60efe44ffb31fde79015ad50c96d94f60c40735bfad14717e7e7c1709c5dfb4c95a732113f189993d797c11dfa134e93f8c3fa3de94c12ede7990a3f9b82af05c45984e247c59b355c6694675f14736f506e6c19182d2ca5c01cee5443b987a67e7224a062b9505ad9452f90ea1d3406bf4469f800cc12182c23277d73c153c550d9600fe035a2a357c273163a599cb43cf6309e48928ee9eeced9ef5f634cb4dc39bfa69962324f31de23bfccff731bf552c7839f2594a5f7c2fdd45b4219c73e8bcbab144c0d8d2119948fdb0931bc0abbb19498027300df06802b90385b7693935cc681f70000000000b381b66237d90683f0880b2ca0e6bffb565bb5c712ba6411b0f5484340f71023e9a99b8b32999565fd871c004db3d000527f36d146fd41e7cdc6feb105d95818fa77a17fc79dfcdb9fe6dbe81155e75a802d2422b1f2d5695c00854f0efbc22aa018773e683715b626fdd4e0637bc80bb1c1e201524a0cc55f54a1b962aa651211b8a1728bfb6ecfde0681ee5b42514c7c64fde01329798b103fa2562fe21e26d74459875149977025707e1a793cc31db78aa3a9b57c177102b1ccc66653848e54e30d755bbf663eb5099dcdbc3432033a7280497502f9e69f86557f16a37992ec4a00"/689], &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r7, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001880)={r8, 0xc0, &(0x7f0000001a40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0xb, 0x6, &(0x7f0000001940)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0xb7, &(0x7f000000cf3d)=""/183, 0x40f00, 0xc, '\x00', 0x0, 0x3, r7, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r9}, 0x78) r10 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="1801000000060600000000000000008efe63d5006f00000095", @ANYRESDEC, @ANYRES32=r1], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000300)='lock_acquire\x00', r10}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000016c0)={0x11, 0x10, &(0x7f0000001940)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x1000, &(0x7f0000000600)=""/4096, 0x41100, 0xb, '\x00', r6, 0x7, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x9, 0x3}, 0x8, 0x10, &(0x7f0000001680)={0x3, 0xc, 0xa, 0x6}, 0x10, r9, r10}, 0x78) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x5aa2b, &(0x7f0000000300)={&(0x7f0000001bc0)=@newlink={0x84, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x1288}, [@IFLA_LINKINFO={0x5c, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x4c, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_LINK={0x8, 0x1, r11}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r11}]}, 0x84}}, 0x0) 08:01:47 executing program 2: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00000061c0)={0x5, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x100000000, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x8000, 0x0, 0x0, 0x52b4, 0x800, 0x8, 0x4, 0x3, 0x6, 0x6, 0x0, @perf_config_ext={0x2, 0x60}, 0x12, 0x0, 0x0, 0x0, 0x0, 0x1abad1f5, 0x4}, 0x0, 0x6, r0, 0x1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0xe, 0x4, 0x4, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r2, 0x0, 0x0}, 0x20) read(r1, &(0x7f0000001940)=""/232, 0xe8) r3 = syz_open_dev$vcsn(&(0x7f0000000000), 0x4, 0x202) preadv(r0, &(0x7f0000000540)=[{&(0x7f0000005100)=""/186, 0xba}, {&(0x7f00000001c0)=""/17, 0x11}, {&(0x7f0000000380)=""/120, 0x78}, {&(0x7f00000002c0)=""/23, 0x17}, {&(0x7f00000051c0)=""/4096, 0x1000}], 0x5, 0x6, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$TIPC_NL_MON_GET(r5, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={0x0, 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x0) accept$packet(r3, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001600)=0x14) r7 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000001740)=ANY=[@ANYBLOB="c93f3c02ff000000000000009e6693fb2e8ec666d7000000005fbd0f4720bd22ec885fe9fe9d9aa81ac02dfe2f89262e4448c74fd86990fc397d2fab4e1036a60b4bad9b142ffee70656130416137e110f252b6175b527b307d7cc00"/103], 0x0, 0x26}, 0x20) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000001f40)=ANY=[@ANYBLOB="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"/689], &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r7, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001880)={r8, 0xc0, &(0x7f0000001a40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0xb, 0x6, &(0x7f0000001940)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0xb7, &(0x7f000000cf3d)=""/183, 0x40f00, 0xc, '\x00', 0x0, 0x3, r7, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r9}, 0x78) r10 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="1801000000060600000000000000008efe63d5006f00000095", @ANYRESDEC, @ANYRES32=r1], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000300)='lock_acquire\x00', r10}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000016c0)={0x11, 0x10, &(0x7f0000001940)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x1000, &(0x7f0000000600)=""/4096, 0x41100, 0xb, '\x00', r6, 0x7, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x9, 0x3}, 0x8, 0x10, &(0x7f0000001680)={0x3, 0xc, 0xa, 0x6}, 0x10, r9, r10}, 0x78) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x5aa2b, &(0x7f0000000300)={&(0x7f0000001bc0)=@newlink={0x84, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x1288}, [@IFLA_LINKINFO={0x5c, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x4c, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_LINK={0x8, 0x1, r11}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r11}]}, 0x84}}, 0x0) 08:01:47 executing program 0: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00000061c0)={0x5, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x100000000, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x8000, 0x0, 0x0, 0x52b4, 0x800, 0x8, 0x4, 0x3, 0x6, 0x6, 0x0, @perf_config_ext={0x2, 0x60}, 0x12, 0x0, 0x0, 0x0, 0x0, 0x1abad1f5, 0x4}, 0x0, 0x6, r0, 0x1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0xe, 0x4, 0x4, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r2, 0x0, 0x0}, 0x20) read(r1, &(0x7f0000001940)=""/232, 0xe8) r3 = syz_open_dev$vcsn(&(0x7f0000000000), 0x4, 0x202) preadv(r0, &(0x7f0000000540)=[{&(0x7f0000005100)=""/186, 0xba}, {&(0x7f00000001c0)=""/17, 0x11}, {&(0x7f0000000380)=""/120, 0x78}, {&(0x7f00000002c0)=""/23, 0x17}, {&(0x7f00000051c0)=""/4096, 0x1000}], 0x5, 0x6, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$TIPC_NL_MON_GET(r5, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={0x0, 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x0) accept$packet(r3, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001600)=0x14) r7 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000001740)=ANY=[@ANYBLOB="c93f3c02ff000000000000009e6693fb2e8ec666d7000000005fbd0f4720bd22ec885fe9fe9d9aa81ac02dfe2f89262e4448c74fd86990fc397d2fab4e1036a60b4bad9b142ffee70656130416137e110f252b6175b527b307d7cc00"/103], 0x0, 0x26}, 0x20) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000001f40)=ANY=[@ANYBLOB="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"/689], &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r7, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001880)={r8, 0xc0, &(0x7f0000001a40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0xb, 0x6, &(0x7f0000001940)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0xb7, &(0x7f000000cf3d)=""/183, 0x40f00, 0xc, '\x00', 0x0, 0x3, r7, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r9}, 0x78) r10 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="1801000000060600000000000000008efe63d5006f00000095", @ANYRESDEC, @ANYRES32=r1], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000300)='lock_acquire\x00', r10}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000016c0)={0x11, 0x10, &(0x7f0000001940)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x1000, &(0x7f0000000600)=""/4096, 0x41100, 0xb, '\x00', r6, 0x7, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x9, 0x3}, 0x8, 0x10, &(0x7f0000001680)={0x3, 0xc, 0xa, 0x6}, 0x10, r9, r10}, 0x78) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x5aa2b, &(0x7f0000000300)={&(0x7f0000001bc0)=@newlink={0x84, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x1288}, [@IFLA_LINKINFO={0x5c, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x4c, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_LINK={0x8, 0x1, r11}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r11}]}, 0x84}}, 0x0) 08:01:47 executing program 1: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00000061c0)={0x5, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x100000000, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x8000, 0x0, 0x0, 0x52b4, 0x800, 0x8, 0x4, 0x3, 0x6, 0x6, 0x0, @perf_config_ext={0x2, 0x60}, 0x12, 0x0, 0x0, 0x0, 0x0, 0x1abad1f5, 0x4}, 0x0, 0x6, r0, 0x1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0xe, 0x4, 0x4, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r2, 0x0, 0x0}, 0x20) read(r1, &(0x7f0000001940)=""/232, 0xe8) r3 = syz_open_dev$vcsn(&(0x7f0000000000), 0x4, 0x202) preadv(r0, &(0x7f0000000540)=[{&(0x7f0000005100)=""/186, 0xba}, {&(0x7f00000001c0)=""/17, 0x11}, {&(0x7f0000000380)=""/120, 0x78}, {&(0x7f00000002c0)=""/23, 0x17}, {&(0x7f00000051c0)=""/4096, 0x1000}], 0x5, 0x6, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$TIPC_NL_MON_GET(r5, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={0x0, 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x0) accept$packet(r3, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001600)=0x14) r7 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000001740)=ANY=[@ANYBLOB="c93f3c02ff000000000000009e6693fb2e8ec666d7000000005fbd0f4720bd22ec885fe9fe9d9aa81ac02dfe2f89262e4448c74fd86990fc397d2fab4e1036a60b4bad9b142ffee70656130416137e110f252b6175b527b307d7cc00"/103], 0x0, 0x26}, 0x20) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000001f40)=ANY=[@ANYBLOB="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"/689], &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r7, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001880)={r8, 0xc0, &(0x7f0000001a40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0xb, 0x6, &(0x7f0000001940)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0xb7, &(0x7f000000cf3d)=""/183, 0x40f00, 0xc, '\x00', 0x0, 0x3, r7, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r9}, 0x78) r10 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="1801000000060600000000000000008efe63d5006f00000095", @ANYRESDEC, @ANYRES32=r1], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000300)='lock_acquire\x00', r10}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000016c0)={0x11, 0x10, &(0x7f0000001940)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x1000, &(0x7f0000000600)=""/4096, 0x41100, 0xb, '\x00', r6, 0x7, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x9, 0x3}, 0x8, 0x10, &(0x7f0000001680)={0x3, 0xc, 0xa, 0x6}, 0x10, r9, r10}, 0x78) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x5aa2b, &(0x7f0000000300)={&(0x7f0000001bc0)=@newlink={0x84, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x1288}, [@IFLA_LINKINFO={0x5c, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x4c, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_LINK={0x8, 0x1, r11}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r11}]}, 0x84}}, 0x0) 08:01:47 executing program 3: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00000061c0)={0x5, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x100000000, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x8000, 0x0, 0x0, 0x52b4, 0x800, 0x8, 0x4, 0x3, 0x6, 0x6, 0x0, @perf_config_ext={0x2, 0x60}, 0x12, 0x0, 0x0, 0x0, 0x0, 0x1abad1f5, 0x4}, 0x0, 0x6, r0, 0x1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0xe, 0x4, 0x4, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r2, 0x0, 0x0}, 0x20) read(r1, &(0x7f0000001940)=""/232, 0xe8) r3 = syz_open_dev$vcsn(&(0x7f0000000000), 0x4, 0x202) preadv(r0, &(0x7f0000000540)=[{&(0x7f0000005100)=""/186, 0xba}, {&(0x7f00000001c0)=""/17, 0x11}, {&(0x7f0000000380)=""/120, 0x78}, {&(0x7f00000002c0)=""/23, 0x17}, {&(0x7f00000051c0)=""/4096, 0x1000}], 0x5, 0x6, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$TIPC_NL_MON_GET(r5, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={0x0, 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x0) accept$packet(r3, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001600)=0x14) r7 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000001740)=ANY=[@ANYBLOB="c93f3c02ff000000000000009e6693fb2e8ec666d7000000005fbd0f4720bd22ec885fe9fe9d9aa81ac02dfe2f89262e4448c74fd86990fc397d2fab4e1036a60b4bad9b142ffee70656130416137e110f252b6175b527b307d7cc00"/103], 0x0, 0x26}, 0x20) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000001f40)=ANY=[@ANYBLOB="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"/689], &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r7, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001880)={r8, 0xc0, &(0x7f0000001a40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0xb, 0x6, &(0x7f0000001940)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0xb7, &(0x7f000000cf3d)=""/183, 0x40f00, 0xc, '\x00', 0x0, 0x3, r7, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r9}, 0x78) r10 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="1801000000060600000000000000008efe63d5006f00000095", @ANYRESDEC, @ANYRES32=r1], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000300)='lock_acquire\x00', r10}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000016c0)={0x11, 0x10, &(0x7f0000001940)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x1000, &(0x7f0000000600)=""/4096, 0x41100, 0xb, '\x00', r6, 0x7, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x9, 0x3}, 0x8, 0x10, &(0x7f0000001680)={0x3, 0xc, 0xa, 0x6}, 0x10, r9, r10}, 0x78) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x5aa2b, &(0x7f0000000300)={&(0x7f0000001bc0)=@newlink={0x84, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x1288}, [@IFLA_LINKINFO={0x5c, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x4c, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_LINK={0x8, 0x1, r11}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r11}]}, 0x84}}, 0x0) 08:01:47 executing program 5: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00000061c0)={0x5, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x100000000, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x8000, 0x0, 0x0, 0x52b4, 0x800, 0x8, 0x4, 0x3, 0x6, 0x6, 0x0, @perf_config_ext={0x2, 0x60}, 0x12, 0x0, 0x0, 0x0, 0x0, 0x1abad1f5, 0x4}, 0x0, 0x6, r0, 0x1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0xe, 0x4, 0x4, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r2, 0x0, 0x0}, 0x20) read(r1, &(0x7f0000001940)=""/232, 0xe8) r3 = syz_open_dev$vcsn(&(0x7f0000000000), 0x4, 0x202) preadv(r0, &(0x7f0000000540)=[{&(0x7f0000005100)=""/186, 0xba}, {&(0x7f00000001c0)=""/17, 0x11}, {&(0x7f0000000380)=""/120, 0x78}, {&(0x7f00000002c0)=""/23, 0x17}, {&(0x7f00000051c0)=""/4096, 0x1000}], 0x5, 0x6, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$TIPC_NL_MON_GET(r5, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={0x0, 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x0) accept$packet(r3, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001600)=0x14) r7 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000001740)=ANY=[@ANYBLOB="c93f3c02ff000000000000009e6693fb2e8ec666d7000000005fbd0f4720bd22ec885fe9fe9d9aa81ac02dfe2f89262e4448c74fd86990fc397d2fab4e1036a60b4bad9b142ffee70656130416137e110f252b6175b527b307d7cc00"/103], 0x0, 0x26}, 0x20) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000001f40)=ANY=[@ANYBLOB="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"/689], &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r7, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001880)={r8, 0xc0, &(0x7f0000001a40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0xb, 0x6, &(0x7f0000001940)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0xb7, &(0x7f000000cf3d)=""/183, 0x40f00, 0xc, '\x00', 0x0, 0x3, r7, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r9}, 0x78) r10 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="1801000000060600000000000000008efe63d5006f00000095", @ANYRESDEC, @ANYRES32=r1], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000300)='lock_acquire\x00', r10}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000016c0)={0x11, 0x10, &(0x7f0000001940)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x1000, &(0x7f0000000600)=""/4096, 0x41100, 0xb, '\x00', r6, 0x7, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x9, 0x3}, 0x8, 0x10, &(0x7f0000001680)={0x3, 0xc, 0xa, 0x6}, 0x10, r9, r10}, 0x78) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x5aa2b, &(0x7f0000000300)={&(0x7f0000001bc0)=@newlink={0x84, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x1288}, [@IFLA_LINKINFO={0x5c, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x4c, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_LINK={0x8, 0x1, r11}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r11}]}, 0x84}}, 0x0) 08:01:47 executing program 4: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00000061c0)={0x5, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x100000000, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x8000, 0x0, 0x0, 0x52b4, 0x800, 0x8, 0x4, 0x3, 0x6, 0x6, 0x0, @perf_config_ext={0x2, 0x60}, 0x12, 0x0, 0x0, 0x0, 0x0, 0x1abad1f5, 0x4}, 0x0, 0x6, r0, 0x1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0xe, 0x4, 0x4, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r2, 0x0, 0x0}, 0x20) read(r1, &(0x7f0000001940)=""/232, 0xe8) r3 = syz_open_dev$vcsn(&(0x7f0000000000), 0x4, 0x202) preadv(r0, &(0x7f0000000540)=[{&(0x7f0000005100)=""/186, 0xba}, {&(0x7f00000001c0)=""/17, 0x11}, {&(0x7f0000000380)=""/120, 0x78}, {&(0x7f00000002c0)=""/23, 0x17}, {&(0x7f00000051c0)=""/4096, 0x1000}], 0x5, 0x6, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$TIPC_NL_MON_GET(r5, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={0x0, 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x0) accept$packet(r3, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001600)=0x14) r7 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000001740)=ANY=[@ANYBLOB="c93f3c02ff000000000000009e6693fb2e8ec666d7000000005fbd0f4720bd22ec885fe9fe9d9aa81ac02dfe2f89262e4448c74fd86990fc397d2fab4e1036a60b4bad9b142ffee70656130416137e110f252b6175b527b307d7cc00"/103], 0x0, 0x26}, 0x20) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000001f40)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000007999d02ff278039a60e2a885a593f9d4827ea4d48e0c802b77d89caec400002613f462acb4244fbcf91581f2b7810000006122cafe62f383212a831799084db50ae56d6cfdad88ea2ab02a5c186b4b2cb6d799b0b3d49e885db0591987b5e976dad1579a28b9f1ce17471d54fd6aee916d44c7871b58c442b15d40f29f59364ed2c75006b54db592ceaef87d14ed838968be2a16c78f3fea81c1bf0dd2c9d9be4b3aa26c1f60e65ae10c07f2db982187c47acf606e44ec66f11f0dd84c0f82bd4e60efe44ffb31fde79015ad50c96d94f60c40735bfad14717e7e7c1709c5dfb4c95a732113f189993d797c11dfa134e93f8c3fa3de94c12ede7990a3f9b82af05c45984e247c59b355c6694675f14736f506e6c19182d2ca5c01cee5443b987a67e7224a062b9505ad9452f90ea1d3406bf4469f800cc12182c23277d73c153c550d9600fe035a2a357c273163a599cb43cf6309e48928ee9eeced9ef5f634cb4dc39bfa69962324f31de23bfccff731bf552c7839f2594a5f7c2fdd45b4219c73e8bcbab144c0d8d2119948fdb0931bc0abbb19498027300df06802b90385b7693935cc681f70000000000b381b66237d90683f0880b2ca0e6bffb565bb5c712ba6411b0f5484340f71023e9a99b8b32999565fd871c004db3d000527f36d146fd41e7cdc6feb105d95818fa77a17fc79dfcdb9fe6dbe81155e75a802d2422b1f2d5695c00854f0efbc22aa018773e683715b626fdd4e0637bc80bb1c1e201524a0cc55f54a1b962aa651211b8a1728bfb6ecfde0681ee5b42514c7c64fde01329798b103fa2562fe21e26d74459875149977025707e1a793cc31db78aa3a9b57c177102b1ccc66653848e54e30d755bbf663eb5099dcdbc3432033a7280497502f9e69f86557f16a37992ec4a00"/689], &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r7, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001880)={r8, 0xc0, &(0x7f0000001a40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0xb, 0x6, &(0x7f0000001940)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0xb7, &(0x7f000000cf3d)=""/183, 0x40f00, 0xc, '\x00', 0x0, 0x3, r7, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r9}, 0x78) r10 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="1801000000060600000000000000008efe63d5006f00000095", @ANYRESDEC, @ANYRES32=r1], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000300)='lock_acquire\x00', r10}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000016c0)={0x11, 0x10, &(0x7f0000001940)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x1000, &(0x7f0000000600)=""/4096, 0x41100, 0xb, '\x00', r6, 0x7, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x9, 0x3}, 0x8, 0x10, &(0x7f0000001680)={0x3, 0xc, 0xa, 0x6}, 0x10, r9, r10}, 0x78) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x5aa2b, &(0x7f0000000300)={&(0x7f0000001bc0)=@newlink={0x84, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x1288}, [@IFLA_LINKINFO={0x5c, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x4c, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_LINK={0x8, 0x1, r11}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r11}]}, 0x84}}, 0x0) 08:01:47 executing program 2: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00000061c0)={0x5, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x100000000, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x8000, 0x0, 0x0, 0x52b4, 0x800, 0x8, 0x4, 0x3, 0x6, 0x6, 0x0, @perf_config_ext={0x2, 0x60}, 0x12, 0x0, 0x0, 0x0, 0x0, 0x1abad1f5, 0x4}, 0x0, 0x6, r0, 0x1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0xe, 0x4, 0x4, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r2, 0x0, 0x0}, 0x20) read(r1, &(0x7f0000001940)=""/232, 0xe8) r3 = syz_open_dev$vcsn(&(0x7f0000000000), 0x4, 0x202) preadv(r0, &(0x7f0000000540)=[{&(0x7f0000005100)=""/186, 0xba}, {&(0x7f00000001c0)=""/17, 0x11}, {&(0x7f0000000380)=""/120, 0x78}, {&(0x7f00000002c0)=""/23, 0x17}, {&(0x7f00000051c0)=""/4096, 0x1000}], 0x5, 0x6, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$TIPC_NL_MON_GET(r5, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={0x0, 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x0) accept$packet(r3, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001600)=0x14) r7 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000001740)=ANY=[@ANYBLOB="c93f3c02ff000000000000009e6693fb2e8ec666d7000000005fbd0f4720bd22ec885fe9fe9d9aa81ac02dfe2f89262e4448c74fd86990fc397d2fab4e1036a60b4bad9b142ffee70656130416137e110f252b6175b527b307d7cc00"/103], 0x0, 0x26}, 0x20) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000001f40)=ANY=[@ANYBLOB="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"/689], &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r7, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001880)={r8, 0xc0, &(0x7f0000001a40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0xb, 0x6, &(0x7f0000001940)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0xb7, &(0x7f000000cf3d)=""/183, 0x40f00, 0xc, '\x00', 0x0, 0x3, r7, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r9}, 0x78) r10 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="1801000000060600000000000000008efe63d5006f00000095", @ANYRESDEC, @ANYRES32=r1], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000300)='lock_acquire\x00', r10}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000016c0)={0x11, 0x10, &(0x7f0000001940)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x1000, &(0x7f0000000600)=""/4096, 0x41100, 0xb, '\x00', r6, 0x7, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x9, 0x3}, 0x8, 0x10, &(0x7f0000001680)={0x3, 0xc, 0xa, 0x6}, 0x10, r9, r10}, 0x78) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x5aa2b, &(0x7f0000000300)={&(0x7f0000001bc0)=@newlink={0x84, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x1288}, [@IFLA_LINKINFO={0x5c, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x4c, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_LINK={0x8, 0x1, r11}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r11}]}, 0x84}}, 0x0) 08:01:47 executing program 5: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00000061c0)={0x5, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x100000000, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x8000, 0x0, 0x0, 0x52b4, 0x800, 0x8, 0x4, 0x3, 0x6, 0x6, 0x0, @perf_config_ext={0x2, 0x60}, 0x12, 0x0, 0x0, 0x0, 0x0, 0x1abad1f5, 0x4}, 0x0, 0x6, r0, 0x1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0xe, 0x4, 0x4, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r2, 0x0, 0x0}, 0x20) read(r1, &(0x7f0000001940)=""/232, 0xe8) r3 = syz_open_dev$vcsn(&(0x7f0000000000), 0x4, 0x202) preadv(r0, &(0x7f0000000540)=[{&(0x7f0000005100)=""/186, 0xba}, {&(0x7f00000001c0)=""/17, 0x11}, {&(0x7f0000000380)=""/120, 0x78}, {&(0x7f00000002c0)=""/23, 0x17}, {&(0x7f00000051c0)=""/4096, 0x1000}], 0x5, 0x6, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$TIPC_NL_MON_GET(r5, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={0x0, 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x0) accept$packet(r3, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001600)=0x14) r7 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000001740)=ANY=[@ANYBLOB="c93f3c02ff000000000000009e6693fb2e8ec666d7000000005fbd0f4720bd22ec885fe9fe9d9aa81ac02dfe2f89262e4448c74fd86990fc397d2fab4e1036a60b4bad9b142ffee70656130416137e110f252b6175b527b307d7cc00"/103], 0x0, 0x26}, 0x20) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000001f40)=ANY=[@ANYBLOB="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"/689], &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r7, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001880)={r8, 0xc0, &(0x7f0000001a40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0xb, 0x6, &(0x7f0000001940)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0xb7, &(0x7f000000cf3d)=""/183, 0x40f00, 0xc, '\x00', 0x0, 0x3, r7, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r9}, 0x78) r10 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="1801000000060600000000000000008efe63d5006f00000095", @ANYRESDEC, @ANYRES32=r1], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000300)='lock_acquire\x00', r10}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000016c0)={0x11, 0x10, &(0x7f0000001940)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x1000, &(0x7f0000000600)=""/4096, 0x41100, 0xb, '\x00', r6, 0x7, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x9, 0x3}, 0x8, 0x10, &(0x7f0000001680)={0x3, 0xc, 0xa, 0x6}, 0x10, r9, r10}, 0x78) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x5aa2b, &(0x7f0000000300)={&(0x7f0000001bc0)=@newlink={0x84, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x1288}, [@IFLA_LINKINFO={0x5c, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x4c, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_LINK={0x8, 0x1, r11}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r11}]}, 0x84}}, 0x0) 08:01:47 executing program 0: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00000061c0)={0x5, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x100000000, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x8000, 0x0, 0x0, 0x52b4, 0x800, 0x8, 0x4, 0x3, 0x6, 0x6, 0x0, @perf_config_ext={0x2, 0x60}, 0x12, 0x0, 0x0, 0x0, 0x0, 0x1abad1f5, 0x4}, 0x0, 0x6, r0, 0x1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0xe, 0x4, 0x4, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r2, 0x0, 0x0}, 0x20) read(r1, &(0x7f0000001940)=""/232, 0xe8) r3 = syz_open_dev$vcsn(&(0x7f0000000000), 0x4, 0x202) preadv(r0, &(0x7f0000000540)=[{&(0x7f0000005100)=""/186, 0xba}, {&(0x7f00000001c0)=""/17, 0x11}, {&(0x7f0000000380)=""/120, 0x78}, {&(0x7f00000002c0)=""/23, 0x17}, {&(0x7f00000051c0)=""/4096, 0x1000}], 0x5, 0x6, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$TIPC_NL_MON_GET(r5, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={0x0, 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x0) accept$packet(r3, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001600)=0x14) r7 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000001740)=ANY=[@ANYBLOB="c93f3c02ff000000000000009e6693fb2e8ec666d7000000005fbd0f4720bd22ec885fe9fe9d9aa81ac02dfe2f89262e4448c74fd86990fc397d2fab4e1036a60b4bad9b142ffee70656130416137e110f252b6175b527b307d7cc00"/103], 0x0, 0x26}, 0x20) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000001f40)=ANY=[@ANYBLOB="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"/689], &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r7, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001880)={r8, 0xc0, &(0x7f0000001a40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0xb, 0x6, &(0x7f0000001940)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0xb7, &(0x7f000000cf3d)=""/183, 0x40f00, 0xc, '\x00', 0x0, 0x3, r7, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r9}, 0x78) r10 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="1801000000060600000000000000008efe63d5006f00000095", @ANYRESDEC, @ANYRES32=r1], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000300)='lock_acquire\x00', r10}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000016c0)={0x11, 0x10, &(0x7f0000001940)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x1000, &(0x7f0000000600)=""/4096, 0x41100, 0xb, '\x00', r6, 0x7, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x9, 0x3}, 0x8, 0x10, &(0x7f0000001680)={0x3, 0xc, 0xa, 0x6}, 0x10, r9, r10}, 0x78) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x5aa2b, &(0x7f0000000300)={&(0x7f0000001bc0)=@newlink={0x84, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x1288}, [@IFLA_LINKINFO={0x5c, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x4c, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_LINK={0x8, 0x1, r11}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r11}]}, 0x84}}, 0x0) 08:01:47 executing program 2: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00000061c0)={0x5, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x100000000, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x8000, 0x0, 0x0, 0x52b4, 0x800, 0x8, 0x4, 0x3, 0x6, 0x6, 0x0, @perf_config_ext={0x2, 0x60}, 0x12, 0x0, 0x0, 0x0, 0x0, 0x1abad1f5, 0x4}, 0x0, 0x6, r0, 0x1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0xe, 0x4, 0x4, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r2, 0x0, 0x0}, 0x20) read(r1, &(0x7f0000001940)=""/232, 0xe8) r3 = syz_open_dev$vcsn(&(0x7f0000000000), 0x4, 0x202) preadv(r0, &(0x7f0000000540)=[{&(0x7f0000005100)=""/186, 0xba}, {&(0x7f00000001c0)=""/17, 0x11}, {&(0x7f0000000380)=""/120, 0x78}, {&(0x7f00000002c0)=""/23, 0x17}, {&(0x7f00000051c0)=""/4096, 0x1000}], 0x5, 0x6, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$TIPC_NL_MON_GET(r5, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={0x0, 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x0) accept$packet(r3, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001600)=0x14) r7 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000001740)=ANY=[@ANYBLOB="c93f3c02ff000000000000009e6693fb2e8ec666d7000000005fbd0f4720bd22ec885fe9fe9d9aa81ac02dfe2f89262e4448c74fd86990fc397d2fab4e1036a60b4bad9b142ffee70656130416137e110f252b6175b527b307d7cc00"/103], 0x0, 0x26}, 0x20) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000001f40)=ANY=[@ANYBLOB="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"/689], &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r7, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001880)={r8, 0xc0, &(0x7f0000001a40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0xb, 0x6, &(0x7f0000001940)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0xb7, &(0x7f000000cf3d)=""/183, 0x40f00, 0xc, '\x00', 0x0, 0x3, r7, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r9}, 0x78) r10 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="1801000000060600000000000000008efe63d5006f00000095", @ANYRESDEC, @ANYRES32=r1], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000300)='lock_acquire\x00', r10}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000016c0)={0x11, 0x10, &(0x7f0000001940)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x1000, &(0x7f0000000600)=""/4096, 0x41100, 0xb, '\x00', r6, 0x7, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x9, 0x3}, 0x8, 0x10, &(0x7f0000001680)={0x3, 0xc, 0xa, 0x6}, 0x10, r9, r10}, 0x78) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x5aa2b, &(0x7f0000000300)={&(0x7f0000001bc0)=@newlink={0x84, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x1288}, [@IFLA_LINKINFO={0x5c, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x4c, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_LINK={0x8, 0x1, r11}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r11}]}, 0x84}}, 0x0) 08:01:47 executing program 3: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00000061c0)={0x5, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x100000000, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x8000, 0x0, 0x0, 0x52b4, 0x800, 0x8, 0x4, 0x3, 0x6, 0x6, 0x0, @perf_config_ext={0x2, 0x60}, 0x12, 0x0, 0x0, 0x0, 0x0, 0x1abad1f5, 0x4}, 0x0, 0x6, r0, 0x1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0xe, 0x4, 0x4, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r2, 0x0, 0x0}, 0x20) read(r1, &(0x7f0000001940)=""/232, 0xe8) r3 = syz_open_dev$vcsn(&(0x7f0000000000), 0x4, 0x202) preadv(r0, &(0x7f0000000540)=[{&(0x7f0000005100)=""/186, 0xba}, {&(0x7f00000001c0)=""/17, 0x11}, {&(0x7f0000000380)=""/120, 0x78}, {&(0x7f00000002c0)=""/23, 0x17}, {&(0x7f00000051c0)=""/4096, 0x1000}], 0x5, 0x6, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$TIPC_NL_MON_GET(r5, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={0x0, 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x0) accept$packet(r3, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001600)=0x14) r7 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000001740)=ANY=[@ANYBLOB="c93f3c02ff000000000000009e6693fb2e8ec666d7000000005fbd0f4720bd22ec885fe9fe9d9aa81ac02dfe2f89262e4448c74fd86990fc397d2fab4e1036a60b4bad9b142ffee70656130416137e110f252b6175b527b307d7cc00"/103], 0x0, 0x26}, 0x20) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000001f40)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000007999d02ff278039a60e2a885a593f9d4827ea4d48e0c802b77d89caec400002613f462acb4244fbcf91581f2b7810000006122cafe62f383212a831799084db50ae56d6cfdad88ea2ab02a5c186b4b2cb6d799b0b3d49e885db0591987b5e976dad1579a28b9f1ce17471d54fd6aee916d44c7871b58c442b15d40f29f59364ed2c75006b54db592ceaef87d14ed838968be2a16c78f3fea81c1bf0dd2c9d9be4b3aa26c1f60e65ae10c07f2db982187c47acf606e44ec66f11f0dd84c0f82bd4e60efe44ffb31fde79015ad50c96d94f60c40735bfad14717e7e7c1709c5dfb4c95a732113f189993d797c11dfa134e93f8c3fa3de94c12ede7990a3f9b82af05c45984e247c59b355c6694675f14736f506e6c19182d2ca5c01cee5443b987a67e7224a062b9505ad9452f90ea1d3406bf4469f800cc12182c23277d73c153c550d9600fe035a2a357c273163a599cb43cf6309e48928ee9eeced9ef5f634cb4dc39bfa69962324f31de23bfccff731bf552c7839f2594a5f7c2fdd45b4219c73e8bcbab144c0d8d2119948fdb0931bc0abbb19498027300df06802b90385b7693935cc681f70000000000b381b66237d90683f0880b2ca0e6bffb565bb5c712ba6411b0f5484340f71023e9a99b8b32999565fd871c004db3d000527f36d146fd41e7cdc6feb105d95818fa77a17fc79dfcdb9fe6dbe81155e75a802d2422b1f2d5695c00854f0efbc22aa018773e683715b626fdd4e0637bc80bb1c1e201524a0cc55f54a1b962aa651211b8a1728bfb6ecfde0681ee5b42514c7c64fde01329798b103fa2562fe21e26d74459875149977025707e1a793cc31db78aa3a9b57c177102b1ccc66653848e54e30d755bbf663eb5099dcdbc3432033a7280497502f9e69f86557f16a37992ec4a00"/689], &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r7, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001880)={r8, 0xc0, &(0x7f0000001a40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0xb, 0x6, &(0x7f0000001940)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0xb7, &(0x7f000000cf3d)=""/183, 0x40f00, 0xc, '\x00', 0x0, 0x3, r7, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r9}, 0x78) r10 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="1801000000060600000000000000008efe63d5006f00000095", @ANYRESDEC, @ANYRES32=r1], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000300)='lock_acquire\x00', r10}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000016c0)={0x11, 0x10, &(0x7f0000001940)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x1000, &(0x7f0000000600)=""/4096, 0x41100, 0xb, '\x00', r6, 0x7, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x9, 0x3}, 0x8, 0x10, &(0x7f0000001680)={0x3, 0xc, 0xa, 0x6}, 0x10, r9, r10}, 0x78) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x5aa2b, &(0x7f0000000300)={&(0x7f0000001bc0)=@newlink={0x84, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x1288}, [@IFLA_LINKINFO={0x5c, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x4c, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_LINK={0x8, 0x1, r11}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r11}]}, 0x84}}, 0x0) 08:01:47 executing program 1: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00000061c0)={0x5, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x100000000, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x8000, 0x0, 0x0, 0x52b4, 0x800, 0x8, 0x4, 0x3, 0x6, 0x6, 0x0, @perf_config_ext={0x2, 0x60}, 0x12, 0x0, 0x0, 0x0, 0x0, 0x1abad1f5, 0x4}, 0x0, 0x6, r0, 0x1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0xe, 0x4, 0x4, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r2, 0x0, 0x0}, 0x20) read(r1, &(0x7f0000001940)=""/232, 0xe8) r3 = syz_open_dev$vcsn(&(0x7f0000000000), 0x4, 0x202) preadv(r0, &(0x7f0000000540)=[{&(0x7f0000005100)=""/186, 0xba}, {&(0x7f00000001c0)=""/17, 0x11}, {&(0x7f0000000380)=""/120, 0x78}, {&(0x7f00000002c0)=""/23, 0x17}, {&(0x7f00000051c0)=""/4096, 0x1000}], 0x5, 0x6, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$TIPC_NL_MON_GET(r5, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={0x0, 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x0) accept$packet(r3, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001600)=0x14) r7 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000001740)=ANY=[@ANYBLOB="c93f3c02ff000000000000009e6693fb2e8ec666d7000000005fbd0f4720bd22ec885fe9fe9d9aa81ac02dfe2f89262e4448c74fd86990fc397d2fab4e1036a60b4bad9b142ffee70656130416137e110f252b6175b527b307d7cc00"/103], 0x0, 0x26}, 0x20) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000001f40)=ANY=[@ANYBLOB="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"/689], &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r7, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001880)={r8, 0xc0, &(0x7f0000001a40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0xb, 0x6, &(0x7f0000001940)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0xb7, &(0x7f000000cf3d)=""/183, 0x40f00, 0xc, '\x00', 0x0, 0x3, r7, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r9}, 0x78) r10 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="1801000000060600000000000000008efe63d5006f00000095", @ANYRESDEC, @ANYRES32=r1], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000300)='lock_acquire\x00', r10}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000016c0)={0x11, 0x10, &(0x7f0000001940)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x1000, &(0x7f0000000600)=""/4096, 0x41100, 0xb, '\x00', r6, 0x7, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x9, 0x3}, 0x8, 0x10, &(0x7f0000001680)={0x3, 0xc, 0xa, 0x6}, 0x10, r9, r10}, 0x78) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x5aa2b, &(0x7f0000000300)={&(0x7f0000001bc0)=@newlink={0x84, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x1288}, [@IFLA_LINKINFO={0x5c, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x4c, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_LINK={0x8, 0x1, r11}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r11}]}, 0x84}}, 0x0) 08:01:47 executing program 4: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00000061c0)={0x5, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x100000000, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x8000, 0x0, 0x0, 0x52b4, 0x800, 0x8, 0x4, 0x3, 0x6, 0x6, 0x0, @perf_config_ext={0x2, 0x60}, 0x12, 0x0, 0x0, 0x0, 0x0, 0x1abad1f5, 0x4}, 0x0, 0x6, r0, 0x1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0xe, 0x4, 0x4, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r2, 0x0, 0x0}, 0x20) read(r1, &(0x7f0000001940)=""/232, 0xe8) r3 = syz_open_dev$vcsn(&(0x7f0000000000), 0x4, 0x202) preadv(r0, &(0x7f0000000540)=[{&(0x7f0000005100)=""/186, 0xba}, {&(0x7f00000001c0)=""/17, 0x11}, {&(0x7f0000000380)=""/120, 0x78}, {&(0x7f00000002c0)=""/23, 0x17}, {&(0x7f00000051c0)=""/4096, 0x1000}], 0x5, 0x6, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$TIPC_NL_MON_GET(r5, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={0x0, 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x0) accept$packet(r3, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001600)=0x14) r7 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000001740)=ANY=[@ANYBLOB="c93f3c02ff000000000000009e6693fb2e8ec666d7000000005fbd0f4720bd22ec885fe9fe9d9aa81ac02dfe2f89262e4448c74fd86990fc397d2fab4e1036a60b4bad9b142ffee70656130416137e110f252b6175b527b307d7cc00"/103], 0x0, 0x26}, 0x20) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000001f40)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000007999d02ff278039a60e2a885a593f9d4827ea4d48e0c802b77d89caec400002613f462acb4244fbcf91581f2b7810000006122cafe62f383212a831799084db50ae56d6cfdad88ea2ab02a5c186b4b2cb6d799b0b3d49e885db0591987b5e976dad1579a28b9f1ce17471d54fd6aee916d44c7871b58c442b15d40f29f59364ed2c75006b54db592ceaef87d14ed838968be2a16c78f3fea81c1bf0dd2c9d9be4b3aa26c1f60e65ae10c07f2db982187c47acf606e44ec66f11f0dd84c0f82bd4e60efe44ffb31fde79015ad50c96d94f60c40735bfad14717e7e7c1709c5dfb4c95a732113f189993d797c11dfa134e93f8c3fa3de94c12ede7990a3f9b82af05c45984e247c59b355c6694675f14736f506e6c19182d2ca5c01cee5443b987a67e7224a062b9505ad9452f90ea1d3406bf4469f800cc12182c23277d73c153c550d9600fe035a2a357c273163a599cb43cf6309e48928ee9eeced9ef5f634cb4dc39bfa69962324f31de23bfccff731bf552c7839f2594a5f7c2fdd45b4219c73e8bcbab144c0d8d2119948fdb0931bc0abbb19498027300df06802b90385b7693935cc681f70000000000b381b66237d90683f0880b2ca0e6bffb565bb5c712ba6411b0f5484340f71023e9a99b8b32999565fd871c004db3d000527f36d146fd41e7cdc6feb105d95818fa77a17fc79dfcdb9fe6dbe81155e75a802d2422b1f2d5695c00854f0efbc22aa018773e683715b626fdd4e0637bc80bb1c1e201524a0cc55f54a1b962aa651211b8a1728bfb6ecfde0681ee5b42514c7c64fde01329798b103fa2562fe21e26d74459875149977025707e1a793cc31db78aa3a9b57c177102b1ccc66653848e54e30d755bbf663eb5099dcdbc3432033a7280497502f9e69f86557f16a37992ec4a00"/689], &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r7, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001880)={r8, 0xc0, &(0x7f0000001a40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0xb, 0x6, &(0x7f0000001940)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0xb7, &(0x7f000000cf3d)=""/183, 0x40f00, 0xc, '\x00', 0x0, 0x3, r7, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r9}, 0x78) r10 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="1801000000060600000000000000008efe63d5006f00000095", @ANYRESDEC, @ANYRES32=r1], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000300)='lock_acquire\x00', r10}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000016c0)={0x11, 0x10, &(0x7f0000001940)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x1000, &(0x7f0000000600)=""/4096, 0x41100, 0xb, '\x00', r6, 0x7, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x9, 0x3}, 0x8, 0x10, &(0x7f0000001680)={0x3, 0xc, 0xa, 0x6}, 0x10, r9, r10}, 0x78) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x5aa2b, &(0x7f0000000300)={&(0x7f0000001bc0)=@newlink={0x84, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x1288}, [@IFLA_LINKINFO={0x5c, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x4c, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_LINK={0x8, 0x1, r11}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r11}]}, 0x84}}, 0x0) 08:01:48 executing program 0: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00000061c0)={0x5, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x100000000, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x8000, 0x0, 0x0, 0x52b4, 0x800, 0x8, 0x4, 0x3, 0x6, 0x6, 0x0, @perf_config_ext={0x2, 0x60}, 0x12, 0x0, 0x0, 0x0, 0x0, 0x1abad1f5, 0x4}, 0x0, 0x6, r0, 0x1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0xe, 0x4, 0x4, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r2, 0x0, 0x0}, 0x20) read(r1, &(0x7f0000001940)=""/232, 0xe8) r3 = syz_open_dev$vcsn(&(0x7f0000000000), 0x4, 0x202) preadv(r0, &(0x7f0000000540)=[{&(0x7f0000005100)=""/186, 0xba}, {&(0x7f00000001c0)=""/17, 0x11}, {&(0x7f0000000380)=""/120, 0x78}, {&(0x7f00000002c0)=""/23, 0x17}, {&(0x7f00000051c0)=""/4096, 0x1000}], 0x5, 0x6, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$TIPC_NL_MON_GET(r5, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={0x0, 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x0) accept$packet(r3, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001600)=0x14) r7 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000001740)=ANY=[@ANYBLOB="c93f3c02ff000000000000009e6693fb2e8ec666d7000000005fbd0f4720bd22ec885fe9fe9d9aa81ac02dfe2f89262e4448c74fd86990fc397d2fab4e1036a60b4bad9b142ffee70656130416137e110f252b6175b527b307d7cc00"/103], 0x0, 0x26}, 0x20) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000001f40)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000007999d02ff278039a60e2a885a593f9d4827ea4d48e0c802b77d89caec400002613f462acb4244fbcf91581f2b7810000006122cafe62f383212a831799084db50ae56d6cfdad88ea2ab02a5c186b4b2cb6d799b0b3d49e885db0591987b5e976dad1579a28b9f1ce17471d54fd6aee916d44c7871b58c442b15d40f29f59364ed2c75006b54db592ceaef87d14ed838968be2a16c78f3fea81c1bf0dd2c9d9be4b3aa26c1f60e65ae10c07f2db982187c47acf606e44ec66f11f0dd84c0f82bd4e60efe44ffb31fde79015ad50c96d94f60c40735bfad14717e7e7c1709c5dfb4c95a732113f189993d797c11dfa134e93f8c3fa3de94c12ede7990a3f9b82af05c45984e247c59b355c6694675f14736f506e6c19182d2ca5c01cee5443b987a67e7224a062b9505ad9452f90ea1d3406bf4469f800cc12182c23277d73c153c550d9600fe035a2a357c273163a599cb43cf6309e48928ee9eeced9ef5f634cb4dc39bfa69962324f31de23bfccff731bf552c7839f2594a5f7c2fdd45b4219c73e8bcbab144c0d8d2119948fdb0931bc0abbb19498027300df06802b90385b7693935cc681f70000000000b381b66237d90683f0880b2ca0e6bffb565bb5c712ba6411b0f5484340f71023e9a99b8b32999565fd871c004db3d000527f36d146fd41e7cdc6feb105d95818fa77a17fc79dfcdb9fe6dbe81155e75a802d2422b1f2d5695c00854f0efbc22aa018773e683715b626fdd4e0637bc80bb1c1e201524a0cc55f54a1b962aa651211b8a1728bfb6ecfde0681ee5b42514c7c64fde01329798b103fa2562fe21e26d74459875149977025707e1a793cc31db78aa3a9b57c177102b1ccc66653848e54e30d755bbf663eb5099dcdbc3432033a7280497502f9e69f86557f16a37992ec4a00"/689], &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r7, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001880)={r8, 0xc0, &(0x7f0000001a40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0xb, 0x6, &(0x7f0000001940)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0xb7, &(0x7f000000cf3d)=""/183, 0x40f00, 0xc, '\x00', 0x0, 0x3, r7, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r9}, 0x78) r10 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="1801000000060600000000000000008efe63d5006f00000095", @ANYRESDEC, @ANYRES32=r1], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000300)='lock_acquire\x00', r10}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000016c0)={0x11, 0x10, &(0x7f0000001940)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x1000, &(0x7f0000000600)=""/4096, 0x41100, 0xb, '\x00', r6, 0x7, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x9, 0x3}, 0x8, 0x10, &(0x7f0000001680)={0x3, 0xc, 0xa, 0x6}, 0x10, r9, r10}, 0x78) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x5aa2b, &(0x7f0000000300)={&(0x7f0000001bc0)=@newlink={0x84, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x1288}, [@IFLA_LINKINFO={0x5c, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x4c, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_LINK={0x8, 0x1, r11}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r11}]}, 0x84}}, 0x0) 08:01:48 executing program 5: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00000061c0)={0x5, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x100000000, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x8000, 0x0, 0x0, 0x52b4, 0x800, 0x8, 0x4, 0x3, 0x6, 0x6, 0x0, @perf_config_ext={0x2, 0x60}, 0x12, 0x0, 0x0, 0x0, 0x0, 0x1abad1f5, 0x4}, 0x0, 0x6, r0, 0x1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0xe, 0x4, 0x4, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r2, 0x0, 0x0}, 0x20) read(r1, &(0x7f0000001940)=""/232, 0xe8) r3 = syz_open_dev$vcsn(&(0x7f0000000000), 0x4, 0x202) preadv(r0, &(0x7f0000000540)=[{&(0x7f0000005100)=""/186, 0xba}, {&(0x7f00000001c0)=""/17, 0x11}, {&(0x7f0000000380)=""/120, 0x78}, {&(0x7f00000002c0)=""/23, 0x17}, {&(0x7f00000051c0)=""/4096, 0x1000}], 0x5, 0x6, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$TIPC_NL_MON_GET(r5, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={0x0, 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x0) accept$packet(r3, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001600)=0x14) r7 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000001740)=ANY=[@ANYBLOB="c93f3c02ff000000000000009e6693fb2e8ec666d7000000005fbd0f4720bd22ec885fe9fe9d9aa81ac02dfe2f89262e4448c74fd86990fc397d2fab4e1036a60b4bad9b142ffee70656130416137e110f252b6175b527b307d7cc00"/103], 0x0, 0x26}, 0x20) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000001f40)=ANY=[@ANYBLOB="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"/689], &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r7, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001880)={r8, 0xc0, &(0x7f0000001a40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0xb, 0x6, &(0x7f0000001940)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0xb7, &(0x7f000000cf3d)=""/183, 0x40f00, 0xc, '\x00', 0x0, 0x3, r7, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r9}, 0x78) r10 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="1801000000060600000000000000008efe63d5006f00000095", @ANYRESDEC, @ANYRES32=r1], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000300)='lock_acquire\x00', r10}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000016c0)={0x11, 0x10, &(0x7f0000001940)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x1000, &(0x7f0000000600)=""/4096, 0x41100, 0xb, '\x00', r6, 0x7, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x9, 0x3}, 0x8, 0x10, &(0x7f0000001680)={0x3, 0xc, 0xa, 0x6}, 0x10, r9, r10}, 0x78) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x5aa2b, &(0x7f0000000300)={&(0x7f0000001bc0)=@newlink={0x84, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x1288}, [@IFLA_LINKINFO={0x5c, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x4c, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_LINK={0x8, 0x1, r11}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r11}]}, 0x84}}, 0x0) 08:01:48 executing program 3: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00000061c0)={0x5, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x100000000, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x8000, 0x0, 0x0, 0x52b4, 0x800, 0x8, 0x4, 0x3, 0x6, 0x6, 0x0, @perf_config_ext={0x2, 0x60}, 0x12, 0x0, 0x0, 0x0, 0x0, 0x1abad1f5, 0x4}, 0x0, 0x6, r0, 0x1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0xe, 0x4, 0x4, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r2, 0x0, 0x0}, 0x20) read(r1, &(0x7f0000001940)=""/232, 0xe8) r3 = syz_open_dev$vcsn(&(0x7f0000000000), 0x4, 0x202) preadv(r0, &(0x7f0000000540)=[{&(0x7f0000005100)=""/186, 0xba}, {&(0x7f00000001c0)=""/17, 0x11}, {&(0x7f0000000380)=""/120, 0x78}, {&(0x7f00000002c0)=""/23, 0x17}, {&(0x7f00000051c0)=""/4096, 0x1000}], 0x5, 0x6, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$TIPC_NL_MON_GET(r5, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={0x0, 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x0) accept$packet(r3, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001600)=0x14) r7 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000001740)=ANY=[@ANYBLOB="c93f3c02ff000000000000009e6693fb2e8ec666d7000000005fbd0f4720bd22ec885fe9fe9d9aa81ac02dfe2f89262e4448c74fd86990fc397d2fab4e1036a60b4bad9b142ffee70656130416137e110f252b6175b527b307d7cc00"/103], 0x0, 0x26}, 0x20) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000001f40)=ANY=[@ANYBLOB="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"/689], &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r7, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001880)={r8, 0xc0, &(0x7f0000001a40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0xb, 0x6, &(0x7f0000001940)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0xb7, &(0x7f000000cf3d)=""/183, 0x40f00, 0xc, '\x00', 0x0, 0x3, r7, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r9}, 0x78) r10 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="1801000000060600000000000000008efe63d5006f00000095", @ANYRESDEC, @ANYRES32=r1], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000300)='lock_acquire\x00', r10}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000016c0)={0x11, 0x10, &(0x7f0000001940)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x1000, &(0x7f0000000600)=""/4096, 0x41100, 0xb, '\x00', r6, 0x7, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x9, 0x3}, 0x8, 0x10, &(0x7f0000001680)={0x3, 0xc, 0xa, 0x6}, 0x10, r9, r10}, 0x78) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x5aa2b, &(0x7f0000000300)={&(0x7f0000001bc0)=@newlink={0x84, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x1288}, [@IFLA_LINKINFO={0x5c, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x4c, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_LINK={0x8, 0x1, r11}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r11}]}, 0x84}}, 0x0) 08:01:48 executing program 2: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00000061c0)={0x5, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x100000000, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x8000, 0x0, 0x0, 0x52b4, 0x800, 0x8, 0x4, 0x3, 0x6, 0x6, 0x0, @perf_config_ext={0x2, 0x60}, 0x12, 0x0, 0x0, 0x0, 0x0, 0x1abad1f5, 0x4}, 0x0, 0x6, r0, 0x1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0xe, 0x4, 0x4, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r2, 0x0, 0x0}, 0x20) read(r1, &(0x7f0000001940)=""/232, 0xe8) r3 = syz_open_dev$vcsn(&(0x7f0000000000), 0x4, 0x202) preadv(r0, &(0x7f0000000540)=[{&(0x7f0000005100)=""/186, 0xba}, {&(0x7f00000001c0)=""/17, 0x11}, {&(0x7f0000000380)=""/120, 0x78}, {&(0x7f00000002c0)=""/23, 0x17}, {&(0x7f00000051c0)=""/4096, 0x1000}], 0x5, 0x6, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$TIPC_NL_MON_GET(r5, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={0x0, 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x0) accept$packet(r3, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001600)=0x14) r7 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000001740)=ANY=[@ANYBLOB="c93f3c02ff000000000000009e6693fb2e8ec666d7000000005fbd0f4720bd22ec885fe9fe9d9aa81ac02dfe2f89262e4448c74fd86990fc397d2fab4e1036a60b4bad9b142ffee70656130416137e110f252b6175b527b307d7cc00"/103], 0x0, 0x26}, 0x20) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000001f40)=ANY=[@ANYBLOB="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"/689], &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r7, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001880)={r8, 0xc0, &(0x7f0000001a40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0xb, 0x6, &(0x7f0000001940)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0xb7, &(0x7f000000cf3d)=""/183, 0x40f00, 0xc, '\x00', 0x0, 0x3, r7, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r9}, 0x78) r10 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="1801000000060600000000000000008efe63d5006f00000095", @ANYRESDEC, @ANYRES32=r1], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000300)='lock_acquire\x00', r10}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000016c0)={0x11, 0x10, &(0x7f0000001940)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x1000, &(0x7f0000000600)=""/4096, 0x41100, 0xb, '\x00', r6, 0x7, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x9, 0x3}, 0x8, 0x10, &(0x7f0000001680)={0x3, 0xc, 0xa, 0x6}, 0x10, r9, r10}, 0x78) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x5aa2b, &(0x7f0000000300)={&(0x7f0000001bc0)=@newlink={0x84, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x1288}, [@IFLA_LINKINFO={0x5c, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x4c, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_LINK={0x8, 0x1, r11}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r11}]}, 0x84}}, 0x0) 08:01:48 executing program 1: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00000061c0)={0x5, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x100000000, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x8000, 0x0, 0x0, 0x52b4, 0x800, 0x8, 0x4, 0x3, 0x6, 0x6, 0x0, @perf_config_ext={0x2, 0x60}, 0x12, 0x0, 0x0, 0x0, 0x0, 0x1abad1f5, 0x4}, 0x0, 0x6, r0, 0x1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0xe, 0x4, 0x4, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r2, 0x0, 0x0}, 0x20) read(r1, &(0x7f0000001940)=""/232, 0xe8) r3 = syz_open_dev$vcsn(&(0x7f0000000000), 0x4, 0x202) preadv(r0, &(0x7f0000000540)=[{&(0x7f0000005100)=""/186, 0xba}, {&(0x7f00000001c0)=""/17, 0x11}, {&(0x7f0000000380)=""/120, 0x78}, {&(0x7f00000002c0)=""/23, 0x17}, {&(0x7f00000051c0)=""/4096, 0x1000}], 0x5, 0x6, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$TIPC_NL_MON_GET(r5, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={0x0, 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x0) accept$packet(r3, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001600)=0x14) r7 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000001740)=ANY=[@ANYBLOB="c93f3c02ff000000000000009e6693fb2e8ec666d7000000005fbd0f4720bd22ec885fe9fe9d9aa81ac02dfe2f89262e4448c74fd86990fc397d2fab4e1036a60b4bad9b142ffee70656130416137e110f252b6175b527b307d7cc00"/103], 0x0, 0x26}, 0x20) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000001f40)=ANY=[@ANYBLOB="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"/689], &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r7, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001880)={r8, 0xc0, &(0x7f0000001a40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0xb, 0x6, &(0x7f0000001940)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0xb7, &(0x7f000000cf3d)=""/183, 0x40f00, 0xc, '\x00', 0x0, 0x3, r7, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r9}, 0x78) r10 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="1801000000060600000000000000008efe63d5006f00000095", @ANYRESDEC, @ANYRES32=r1], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000300)='lock_acquire\x00', r10}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000016c0)={0x11, 0x10, &(0x7f0000001940)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x1000, &(0x7f0000000600)=""/4096, 0x41100, 0xb, '\x00', r6, 0x7, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x9, 0x3}, 0x8, 0x10, &(0x7f0000001680)={0x3, 0xc, 0xa, 0x6}, 0x10, r9, r10}, 0x78) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x5aa2b, &(0x7f0000000300)={&(0x7f0000001bc0)=@newlink={0x84, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x1288}, [@IFLA_LINKINFO={0x5c, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x4c, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_LINK={0x8, 0x1, r11}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r11}]}, 0x84}}, 0x0) 08:01:48 executing program 4: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00000061c0)={0x5, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x100000000, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x8000, 0x0, 0x0, 0x52b4, 0x800, 0x8, 0x4, 0x3, 0x6, 0x6, 0x0, @perf_config_ext={0x2, 0x60}, 0x12, 0x0, 0x0, 0x0, 0x0, 0x1abad1f5, 0x4}, 0x0, 0x6, r0, 0x1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0xe, 0x4, 0x4, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r2, 0x0, 0x0}, 0x20) read(r1, &(0x7f0000001940)=""/232, 0xe8) r3 = syz_open_dev$vcsn(&(0x7f0000000000), 0x4, 0x202) preadv(r0, &(0x7f0000000540)=[{&(0x7f0000005100)=""/186, 0xba}, {&(0x7f00000001c0)=""/17, 0x11}, {&(0x7f0000000380)=""/120, 0x78}, {&(0x7f00000002c0)=""/23, 0x17}, {&(0x7f00000051c0)=""/4096, 0x1000}], 0x5, 0x6, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$TIPC_NL_MON_GET(r5, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={0x0, 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x0) accept$packet(r3, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001600)=0x14) r7 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000001740)=ANY=[@ANYBLOB="c93f3c02ff000000000000009e6693fb2e8ec666d7000000005fbd0f4720bd22ec885fe9fe9d9aa81ac02dfe2f89262e4448c74fd86990fc397d2fab4e1036a60b4bad9b142ffee70656130416137e110f252b6175b527b307d7cc00"/103], 0x0, 0x26}, 0x20) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000001f40)=ANY=[@ANYBLOB="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"/689], &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r7, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001880)={r8, 0xc0, &(0x7f0000001a40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0xb, 0x6, &(0x7f0000001940)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0xb7, &(0x7f000000cf3d)=""/183, 0x40f00, 0xc, '\x00', 0x0, 0x3, r7, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r9}, 0x78) r10 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="1801000000060600000000000000008efe63d5006f00000095", @ANYRESDEC, @ANYRES32=r1], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000300)='lock_acquire\x00', r10}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000016c0)={0x11, 0x10, &(0x7f0000001940)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x1000, &(0x7f0000000600)=""/4096, 0x41100, 0xb, '\x00', r6, 0x7, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x9, 0x3}, 0x8, 0x10, &(0x7f0000001680)={0x3, 0xc, 0xa, 0x6}, 0x10, r9, r10}, 0x78) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x5aa2b, &(0x7f0000000300)={&(0x7f0000001bc0)=@newlink={0x84, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x1288}, [@IFLA_LINKINFO={0x5c, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x4c, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_LINK={0x8, 0x1, r11}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r11}]}, 0x84}}, 0x0) 08:01:48 executing program 0: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00000061c0)={0x5, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x100000000, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x8000, 0x0, 0x0, 0x52b4, 0x800, 0x8, 0x4, 0x3, 0x6, 0x6, 0x0, @perf_config_ext={0x2, 0x60}, 0x12, 0x0, 0x0, 0x0, 0x0, 0x1abad1f5, 0x4}, 0x0, 0x6, r0, 0x1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0xe, 0x4, 0x4, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r2, 0x0, 0x0}, 0x20) read(r1, &(0x7f0000001940)=""/232, 0xe8) r3 = syz_open_dev$vcsn(&(0x7f0000000000), 0x4, 0x202) preadv(r0, &(0x7f0000000540)=[{&(0x7f0000005100)=""/186, 0xba}, {&(0x7f00000001c0)=""/17, 0x11}, {&(0x7f0000000380)=""/120, 0x78}, {&(0x7f00000002c0)=""/23, 0x17}, {&(0x7f00000051c0)=""/4096, 0x1000}], 0x5, 0x6, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$TIPC_NL_MON_GET(r5, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={0x0, 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x0) accept$packet(r3, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001600)=0x14) r7 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000001740)=ANY=[@ANYBLOB="c93f3c02ff000000000000009e6693fb2e8ec666d7000000005fbd0f4720bd22ec885fe9fe9d9aa81ac02dfe2f89262e4448c74fd86990fc397d2fab4e1036a60b4bad9b142ffee70656130416137e110f252b6175b527b307d7cc00"/103], 0x0, 0x26}, 0x20) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000001f40)=ANY=[@ANYBLOB="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"/689], &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r7, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001880)={r8, 0xc0, &(0x7f0000001a40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0xb, 0x6, &(0x7f0000001940)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0xb7, &(0x7f000000cf3d)=""/183, 0x40f00, 0xc, '\x00', 0x0, 0x3, r7, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r9}, 0x78) r10 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="1801000000060600000000000000008efe63d5006f00000095", @ANYRESDEC, @ANYRES32=r1], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000300)='lock_acquire\x00', r10}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000016c0)={0x11, 0x10, &(0x7f0000001940)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x1000, &(0x7f0000000600)=""/4096, 0x41100, 0xb, '\x00', r6, 0x7, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x9, 0x3}, 0x8, 0x10, &(0x7f0000001680)={0x3, 0xc, 0xa, 0x6}, 0x10, r9, r10}, 0x78) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x5aa2b, &(0x7f0000000300)={&(0x7f0000001bc0)=@newlink={0x84, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x1288}, [@IFLA_LINKINFO={0x5c, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x4c, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_LINK={0x8, 0x1, r11}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r11}]}, 0x84}}, 0x0) 08:01:48 executing program 3: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00000061c0)={0x5, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x100000000, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x8000, 0x0, 0x0, 0x52b4, 0x800, 0x8, 0x4, 0x3, 0x6, 0x6, 0x0, @perf_config_ext={0x2, 0x60}, 0x12, 0x0, 0x0, 0x0, 0x0, 0x1abad1f5, 0x4}, 0x0, 0x6, r0, 0x1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0xe, 0x4, 0x4, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r2, 0x0, 0x0}, 0x20) read(r1, &(0x7f0000001940)=""/232, 0xe8) r3 = syz_open_dev$vcsn(&(0x7f0000000000), 0x4, 0x202) preadv(r0, &(0x7f0000000540)=[{&(0x7f0000005100)=""/186, 0xba}, {&(0x7f00000001c0)=""/17, 0x11}, {&(0x7f0000000380)=""/120, 0x78}, {&(0x7f00000002c0)=""/23, 0x17}, {&(0x7f00000051c0)=""/4096, 0x1000}], 0x5, 0x6, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$TIPC_NL_MON_GET(r5, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={0x0, 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x0) accept$packet(r3, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001600)=0x14) r7 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000001740)=ANY=[@ANYBLOB="c93f3c02ff000000000000009e6693fb2e8ec666d7000000005fbd0f4720bd22ec885fe9fe9d9aa81ac02dfe2f89262e4448c74fd86990fc397d2fab4e1036a60b4bad9b142ffee70656130416137e110f252b6175b527b307d7cc00"/103], 0x0, 0x26}, 0x20) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000001f40)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000007999d02ff278039a60e2a885a593f9d4827ea4d48e0c802b77d89caec400002613f462acb4244fbcf91581f2b7810000006122cafe62f383212a831799084db50ae56d6cfdad88ea2ab02a5c186b4b2cb6d799b0b3d49e885db0591987b5e976dad1579a28b9f1ce17471d54fd6aee916d44c7871b58c442b15d40f29f59364ed2c75006b54db592ceaef87d14ed838968be2a16c78f3fea81c1bf0dd2c9d9be4b3aa26c1f60e65ae10c07f2db982187c47acf606e44ec66f11f0dd84c0f82bd4e60efe44ffb31fde79015ad50c96d94f60c40735bfad14717e7e7c1709c5dfb4c95a732113f189993d797c11dfa134e93f8c3fa3de94c12ede7990a3f9b82af05c45984e247c59b355c6694675f14736f506e6c19182d2ca5c01cee5443b987a67e7224a062b9505ad9452f90ea1d3406bf4469f800cc12182c23277d73c153c550d9600fe035a2a357c273163a599cb43cf6309e48928ee9eeced9ef5f634cb4dc39bfa69962324f31de23bfccff731bf552c7839f2594a5f7c2fdd45b4219c73e8bcbab144c0d8d2119948fdb0931bc0abbb19498027300df06802b90385b7693935cc681f70000000000b381b66237d90683f0880b2ca0e6bffb565bb5c712ba6411b0f5484340f71023e9a99b8b32999565fd871c004db3d000527f36d146fd41e7cdc6feb105d95818fa77a17fc79dfcdb9fe6dbe81155e75a802d2422b1f2d5695c00854f0efbc22aa018773e683715b626fdd4e0637bc80bb1c1e201524a0cc55f54a1b962aa651211b8a1728bfb6ecfde0681ee5b42514c7c64fde01329798b103fa2562fe21e26d74459875149977025707e1a793cc31db78aa3a9b57c177102b1ccc66653848e54e30d755bbf663eb5099dcdbc3432033a7280497502f9e69f86557f16a37992ec4a00"/689], &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r7, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001880)={r8, 0xc0, &(0x7f0000001a40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0xb, 0x6, &(0x7f0000001940)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0xb7, &(0x7f000000cf3d)=""/183, 0x40f00, 0xc, '\x00', 0x0, 0x3, r7, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r9}, 0x78) r10 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="1801000000060600000000000000008efe63d5006f00000095", @ANYRESDEC, @ANYRES32=r1], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000300)='lock_acquire\x00', r10}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000016c0)={0x11, 0x10, &(0x7f0000001940)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x1000, &(0x7f0000000600)=""/4096, 0x41100, 0xb, '\x00', r6, 0x7, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x9, 0x3}, 0x8, 0x10, &(0x7f0000001680)={0x3, 0xc, 0xa, 0x6}, 0x10, r9, r10}, 0x78) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x5aa2b, &(0x7f0000000300)={&(0x7f0000001bc0)=@newlink={0x84, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x1288}, [@IFLA_LINKINFO={0x5c, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x4c, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_LINK={0x8, 0x1, r11}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r11}]}, 0x84}}, 0x0) 08:01:48 executing program 4: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00000061c0)={0x5, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x100000000, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x8000, 0x0, 0x0, 0x52b4, 0x800, 0x8, 0x4, 0x3, 0x6, 0x6, 0x0, @perf_config_ext={0x2, 0x60}, 0x12, 0x0, 0x0, 0x0, 0x0, 0x1abad1f5, 0x4}, 0x0, 0x6, r0, 0x1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0xe, 0x4, 0x4, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r2, 0x0, 0x0}, 0x20) read(r1, &(0x7f0000001940)=""/232, 0xe8) r3 = syz_open_dev$vcsn(&(0x7f0000000000), 0x4, 0x202) preadv(r0, &(0x7f0000000540)=[{&(0x7f0000005100)=""/186, 0xba}, {&(0x7f00000001c0)=""/17, 0x11}, {&(0x7f0000000380)=""/120, 0x78}, {&(0x7f00000002c0)=""/23, 0x17}, {&(0x7f00000051c0)=""/4096, 0x1000}], 0x5, 0x6, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$TIPC_NL_MON_GET(r5, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={0x0, 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x0) accept$packet(r3, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001600)=0x14) r7 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000001740)=ANY=[@ANYBLOB="c93f3c02ff000000000000009e6693fb2e8ec666d7000000005fbd0f4720bd22ec885fe9fe9d9aa81ac02dfe2f89262e4448c74fd86990fc397d2fab4e1036a60b4bad9b142ffee70656130416137e110f252b6175b527b307d7cc00"/103], 0x0, 0x26}, 0x20) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000001f40)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000007999d02ff278039a60e2a885a593f9d4827ea4d48e0c802b77d89caec400002613f462acb4244fbcf91581f2b7810000006122cafe62f383212a831799084db50ae56d6cfdad88ea2ab02a5c186b4b2cb6d799b0b3d49e885db0591987b5e976dad1579a28b9f1ce17471d54fd6aee916d44c7871b58c442b15d40f29f59364ed2c75006b54db592ceaef87d14ed838968be2a16c78f3fea81c1bf0dd2c9d9be4b3aa26c1f60e65ae10c07f2db982187c47acf606e44ec66f11f0dd84c0f82bd4e60efe44ffb31fde79015ad50c96d94f60c40735bfad14717e7e7c1709c5dfb4c95a732113f189993d797c11dfa134e93f8c3fa3de94c12ede7990a3f9b82af05c45984e247c59b355c6694675f14736f506e6c19182d2ca5c01cee5443b987a67e7224a062b9505ad9452f90ea1d3406bf4469f800cc12182c23277d73c153c550d9600fe035a2a357c273163a599cb43cf6309e48928ee9eeced9ef5f634cb4dc39bfa69962324f31de23bfccff731bf552c7839f2594a5f7c2fdd45b4219c73e8bcbab144c0d8d2119948fdb0931bc0abbb19498027300df06802b90385b7693935cc681f70000000000b381b66237d90683f0880b2ca0e6bffb565bb5c712ba6411b0f5484340f71023e9a99b8b32999565fd871c004db3d000527f36d146fd41e7cdc6feb105d95818fa77a17fc79dfcdb9fe6dbe81155e75a802d2422b1f2d5695c00854f0efbc22aa018773e683715b626fdd4e0637bc80bb1c1e201524a0cc55f54a1b962aa651211b8a1728bfb6ecfde0681ee5b42514c7c64fde01329798b103fa2562fe21e26d74459875149977025707e1a793cc31db78aa3a9b57c177102b1ccc66653848e54e30d755bbf663eb5099dcdbc3432033a7280497502f9e69f86557f16a37992ec4a00"/689], &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r7, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001880)={r8, 0xc0, &(0x7f0000001a40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0xb, 0x6, &(0x7f0000001940)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0xb7, &(0x7f000000cf3d)=""/183, 0x40f00, 0xc, '\x00', 0x0, 0x3, r7, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r9}, 0x78) r10 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="1801000000060600000000000000008efe63d5006f00000095", @ANYRESDEC, @ANYRES32=r1], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000300)='lock_acquire\x00', r10}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000016c0)={0x11, 0x10, &(0x7f0000001940)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x1000, &(0x7f0000000600)=""/4096, 0x41100, 0xb, '\x00', r6, 0x7, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x9, 0x3}, 0x8, 0x10, &(0x7f0000001680)={0x3, 0xc, 0xa, 0x6}, 0x10, r9, r10}, 0x78) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x5aa2b, &(0x7f0000000300)={&(0x7f0000001bc0)=@newlink={0x84, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x1288}, [@IFLA_LINKINFO={0x5c, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x4c, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_LINK={0x8, 0x1, r11}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r11}]}, 0x84}}, 0x0) 08:01:48 executing program 5: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00000061c0)={0x5, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x100000000, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x8000, 0x0, 0x0, 0x52b4, 0x800, 0x8, 0x4, 0x3, 0x6, 0x6, 0x0, @perf_config_ext={0x2, 0x60}, 0x12, 0x0, 0x0, 0x0, 0x0, 0x1abad1f5, 0x4}, 0x0, 0x6, r0, 0x1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0xe, 0x4, 0x4, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r2, 0x0, 0x0}, 0x20) read(r1, &(0x7f0000001940)=""/232, 0xe8) r3 = syz_open_dev$vcsn(&(0x7f0000000000), 0x4, 0x202) preadv(r0, &(0x7f0000000540)=[{&(0x7f0000005100)=""/186, 0xba}, {&(0x7f00000001c0)=""/17, 0x11}, {&(0x7f0000000380)=""/120, 0x78}, {&(0x7f00000002c0)=""/23, 0x17}, {&(0x7f00000051c0)=""/4096, 0x1000}], 0x5, 0x6, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$TIPC_NL_MON_GET(r5, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={0x0, 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x0) accept$packet(r3, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001600)=0x14) r7 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000001740)=ANY=[@ANYBLOB="c93f3c02ff000000000000009e6693fb2e8ec666d7000000005fbd0f4720bd22ec885fe9fe9d9aa81ac02dfe2f89262e4448c74fd86990fc397d2fab4e1036a60b4bad9b142ffee70656130416137e110f252b6175b527b307d7cc00"/103], 0x0, 0x26}, 0x20) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000001f40)=ANY=[@ANYBLOB="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"/689], &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r7, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001880)={r8, 0xc0, &(0x7f0000001a40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0xb, 0x6, &(0x7f0000001940)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0xb7, &(0x7f000000cf3d)=""/183, 0x40f00, 0xc, '\x00', 0x0, 0x3, r7, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r9}, 0x78) r10 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="1801000000060600000000000000008efe63d5006f00000095", @ANYRESDEC, @ANYRES32=r1], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000300)='lock_acquire\x00', r10}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000016c0)={0x11, 0x10, &(0x7f0000001940)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x1000, &(0x7f0000000600)=""/4096, 0x41100, 0xb, '\x00', r6, 0x7, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x9, 0x3}, 0x8, 0x10, &(0x7f0000001680)={0x3, 0xc, 0xa, 0x6}, 0x10, r9, r10}, 0x78) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x5aa2b, &(0x7f0000000300)={&(0x7f0000001bc0)=@newlink={0x84, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x1288}, [@IFLA_LINKINFO={0x5c, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x4c, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_LINK={0x8, 0x1, r11}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r11}]}, 0x84}}, 0x0) 08:01:48 executing program 2: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00000061c0)={0x5, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x100000000, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x8000, 0x0, 0x0, 0x52b4, 0x800, 0x8, 0x4, 0x3, 0x6, 0x6, 0x0, @perf_config_ext={0x2, 0x60}, 0x12, 0x0, 0x0, 0x0, 0x0, 0x1abad1f5, 0x4}, 0x0, 0x6, r0, 0x1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0xe, 0x4, 0x4, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r2, 0x0, 0x0}, 0x20) read(r1, &(0x7f0000001940)=""/232, 0xe8) r3 = syz_open_dev$vcsn(&(0x7f0000000000), 0x4, 0x202) preadv(r0, &(0x7f0000000540)=[{&(0x7f0000005100)=""/186, 0xba}, {&(0x7f00000001c0)=""/17, 0x11}, {&(0x7f0000000380)=""/120, 0x78}, {&(0x7f00000002c0)=""/23, 0x17}, {&(0x7f00000051c0)=""/4096, 0x1000}], 0x5, 0x6, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$TIPC_NL_MON_GET(r5, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={0x0, 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x0) accept$packet(r3, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001600)=0x14) r7 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000001740)=ANY=[@ANYBLOB="c93f3c02ff000000000000009e6693fb2e8ec666d7000000005fbd0f4720bd22ec885fe9fe9d9aa81ac02dfe2f89262e4448c74fd86990fc397d2fab4e1036a60b4bad9b142ffee70656130416137e110f252b6175b527b307d7cc00"/103], 0x0, 0x26}, 0x20) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000001f40)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000007999d02ff278039a60e2a885a593f9d4827ea4d48e0c802b77d89caec400002613f462acb4244fbcf91581f2b7810000006122cafe62f383212a831799084db50ae56d6cfdad88ea2ab02a5c186b4b2cb6d799b0b3d49e885db0591987b5e976dad1579a28b9f1ce17471d54fd6aee916d44c7871b58c442b15d40f29f59364ed2c75006b54db592ceaef87d14ed838968be2a16c78f3fea81c1bf0dd2c9d9be4b3aa26c1f60e65ae10c07f2db982187c47acf606e44ec66f11f0dd84c0f82bd4e60efe44ffb31fde79015ad50c96d94f60c40735bfad14717e7e7c1709c5dfb4c95a732113f189993d797c11dfa134e93f8c3fa3de94c12ede7990a3f9b82af05c45984e247c59b355c6694675f14736f506e6c19182d2ca5c01cee5443b987a67e7224a062b9505ad9452f90ea1d3406bf4469f800cc12182c23277d73c153c550d9600fe035a2a357c273163a599cb43cf6309e48928ee9eeced9ef5f634cb4dc39bfa69962324f31de23bfccff731bf552c7839f2594a5f7c2fdd45b4219c73e8bcbab144c0d8d2119948fdb0931bc0abbb19498027300df06802b90385b7693935cc681f70000000000b381b66237d90683f0880b2ca0e6bffb565bb5c712ba6411b0f5484340f71023e9a99b8b32999565fd871c004db3d000527f36d146fd41e7cdc6feb105d95818fa77a17fc79dfcdb9fe6dbe81155e75a802d2422b1f2d5695c00854f0efbc22aa018773e683715b626fdd4e0637bc80bb1c1e201524a0cc55f54a1b962aa651211b8a1728bfb6ecfde0681ee5b42514c7c64fde01329798b103fa2562fe21e26d74459875149977025707e1a793cc31db78aa3a9b57c177102b1ccc66653848e54e30d755bbf663eb5099dcdbc3432033a7280497502f9e69f86557f16a37992ec4a00"/689], &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r7, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001880)={r8, 0xc0, &(0x7f0000001a40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0xb, 0x6, &(0x7f0000001940)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0xb7, &(0x7f000000cf3d)=""/183, 0x40f00, 0xc, '\x00', 0x0, 0x3, r7, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r9}, 0x78) r10 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="1801000000060600000000000000008efe63d5006f00000095", @ANYRESDEC, @ANYRES32=r1], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000300)='lock_acquire\x00', r10}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000016c0)={0x11, 0x10, &(0x7f0000001940)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x1000, &(0x7f0000000600)=""/4096, 0x41100, 0xb, '\x00', r6, 0x7, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x9, 0x3}, 0x8, 0x10, &(0x7f0000001680)={0x3, 0xc, 0xa, 0x6}, 0x10, r9, r10}, 0x78) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x5aa2b, &(0x7f0000000300)={&(0x7f0000001bc0)=@newlink={0x84, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x1288}, [@IFLA_LINKINFO={0x5c, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x4c, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_LINK={0x8, 0x1, r11}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r11}]}, 0x84}}, 0x0) 08:01:48 executing program 1: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00000061c0)={0x5, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x100000000, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x8000, 0x0, 0x0, 0x52b4, 0x800, 0x8, 0x4, 0x3, 0x6, 0x6, 0x0, @perf_config_ext={0x2, 0x60}, 0x12, 0x0, 0x0, 0x0, 0x0, 0x1abad1f5, 0x4}, 0x0, 0x6, r0, 0x1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0xe, 0x4, 0x4, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r2, 0x0, 0x0}, 0x20) read(r1, &(0x7f0000001940)=""/232, 0xe8) r3 = syz_open_dev$vcsn(&(0x7f0000000000), 0x4, 0x202) preadv(r0, &(0x7f0000000540)=[{&(0x7f0000005100)=""/186, 0xba}, {&(0x7f00000001c0)=""/17, 0x11}, {&(0x7f0000000380)=""/120, 0x78}, {&(0x7f00000002c0)=""/23, 0x17}, {&(0x7f00000051c0)=""/4096, 0x1000}], 0x5, 0x6, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$TIPC_NL_MON_GET(r5, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={0x0, 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x0) accept$packet(r3, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001600)=0x14) r7 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000001740)=ANY=[@ANYBLOB="c93f3c02ff000000000000009e6693fb2e8ec666d7000000005fbd0f4720bd22ec885fe9fe9d9aa81ac02dfe2f89262e4448c74fd86990fc397d2fab4e1036a60b4bad9b142ffee70656130416137e110f252b6175b527b307d7cc00"/103], 0x0, 0x26}, 0x20) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000001f40)=ANY=[@ANYBLOB="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"/689], &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r7, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001880)={r8, 0xc0, &(0x7f0000001a40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0xb, 0x6, &(0x7f0000001940)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0xb7, &(0x7f000000cf3d)=""/183, 0x40f00, 0xc, '\x00', 0x0, 0x3, r7, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r9}, 0x78) r10 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="1801000000060600000000000000008efe63d5006f00000095", @ANYRESDEC, @ANYRES32=r1], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000300)='lock_acquire\x00', r10}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000016c0)={0x11, 0x10, &(0x7f0000001940)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x1000, &(0x7f0000000600)=""/4096, 0x41100, 0xb, '\x00', r6, 0x7, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x9, 0x3}, 0x8, 0x10, &(0x7f0000001680)={0x3, 0xc, 0xa, 0x6}, 0x10, r9, r10}, 0x78) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x5aa2b, &(0x7f0000000300)={&(0x7f0000001bc0)=@newlink={0x84, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x1288}, [@IFLA_LINKINFO={0x5c, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x4c, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_LINK={0x8, 0x1, r11}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r11}]}, 0x84}}, 0x0) 08:01:48 executing program 0: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00000061c0)={0x5, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x100000000, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x8000, 0x0, 0x0, 0x52b4, 0x800, 0x8, 0x4, 0x3, 0x6, 0x6, 0x0, @perf_config_ext={0x2, 0x60}, 0x12, 0x0, 0x0, 0x0, 0x0, 0x1abad1f5, 0x4}, 0x0, 0x6, r0, 0x1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0xe, 0x4, 0x4, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r2, 0x0, 0x0}, 0x20) read(r1, &(0x7f0000001940)=""/232, 0xe8) r3 = syz_open_dev$vcsn(&(0x7f0000000000), 0x4, 0x202) preadv(r0, &(0x7f0000000540)=[{&(0x7f0000005100)=""/186, 0xba}, {&(0x7f00000001c0)=""/17, 0x11}, {&(0x7f0000000380)=""/120, 0x78}, {&(0x7f00000002c0)=""/23, 0x17}, {&(0x7f00000051c0)=""/4096, 0x1000}], 0x5, 0x6, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$TIPC_NL_MON_GET(r5, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={0x0, 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x0) accept$packet(r3, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001600)=0x14) r7 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000001740)=ANY=[@ANYBLOB="c93f3c02ff000000000000009e6693fb2e8ec666d7000000005fbd0f4720bd22ec885fe9fe9d9aa81ac02dfe2f89262e4448c74fd86990fc397d2fab4e1036a60b4bad9b142ffee70656130416137e110f252b6175b527b307d7cc00"/103], 0x0, 0x26}, 0x20) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000001f40)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000007999d02ff278039a60e2a885a593f9d4827ea4d48e0c802b77d89caec400002613f462acb4244fbcf91581f2b7810000006122cafe62f383212a831799084db50ae56d6cfdad88ea2ab02a5c186b4b2cb6d799b0b3d49e885db0591987b5e976dad1579a28b9f1ce17471d54fd6aee916d44c7871b58c442b15d40f29f59364ed2c75006b54db592ceaef87d14ed838968be2a16c78f3fea81c1bf0dd2c9d9be4b3aa26c1f60e65ae10c07f2db982187c47acf606e44ec66f11f0dd84c0f82bd4e60efe44ffb31fde79015ad50c96d94f60c40735bfad14717e7e7c1709c5dfb4c95a732113f189993d797c11dfa134e93f8c3fa3de94c12ede7990a3f9b82af05c45984e247c59b355c6694675f14736f506e6c19182d2ca5c01cee5443b987a67e7224a062b9505ad9452f90ea1d3406bf4469f800cc12182c23277d73c153c550d9600fe035a2a357c273163a599cb43cf6309e48928ee9eeced9ef5f634cb4dc39bfa69962324f31de23bfccff731bf552c7839f2594a5f7c2fdd45b4219c73e8bcbab144c0d8d2119948fdb0931bc0abbb19498027300df06802b90385b7693935cc681f70000000000b381b66237d90683f0880b2ca0e6bffb565bb5c712ba6411b0f5484340f71023e9a99b8b32999565fd871c004db3d000527f36d146fd41e7cdc6feb105d95818fa77a17fc79dfcdb9fe6dbe81155e75a802d2422b1f2d5695c00854f0efbc22aa018773e683715b626fdd4e0637bc80bb1c1e201524a0cc55f54a1b962aa651211b8a1728bfb6ecfde0681ee5b42514c7c64fde01329798b103fa2562fe21e26d74459875149977025707e1a793cc31db78aa3a9b57c177102b1ccc66653848e54e30d755bbf663eb5099dcdbc3432033a7280497502f9e69f86557f16a37992ec4a00"/689], &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r7, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001880)={r8, 0xc0, &(0x7f0000001a40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0xb, 0x6, &(0x7f0000001940)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0xb7, &(0x7f000000cf3d)=""/183, 0x40f00, 0xc, '\x00', 0x0, 0x3, r7, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r9}, 0x78) r10 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="1801000000060600000000000000008efe63d5006f00000095", @ANYRESDEC, @ANYRES32=r1], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000300)='lock_acquire\x00', r10}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000016c0)={0x11, 0x10, &(0x7f0000001940)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x1000, &(0x7f0000000600)=""/4096, 0x41100, 0xb, '\x00', r6, 0x7, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x9, 0x3}, 0x8, 0x10, &(0x7f0000001680)={0x3, 0xc, 0xa, 0x6}, 0x10, r9, r10}, 0x78) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x5aa2b, &(0x7f0000000300)={&(0x7f0000001bc0)=@newlink={0x84, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x1288}, [@IFLA_LINKINFO={0x5c, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x4c, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_LINK={0x8, 0x1, r11}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r11}]}, 0x84}}, 0x0) 08:01:48 executing program 3: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00000061c0)={0x5, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x100000000, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x8000, 0x0, 0x0, 0x52b4, 0x800, 0x8, 0x4, 0x3, 0x6, 0x6, 0x0, @perf_config_ext={0x2, 0x60}, 0x12, 0x0, 0x0, 0x0, 0x0, 0x1abad1f5, 0x4}, 0x0, 0x6, r0, 0x1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0xe, 0x4, 0x4, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r2, 0x0, 0x0}, 0x20) read(r1, &(0x7f0000001940)=""/232, 0xe8) r3 = syz_open_dev$vcsn(&(0x7f0000000000), 0x4, 0x202) preadv(r0, &(0x7f0000000540)=[{&(0x7f0000005100)=""/186, 0xba}, {&(0x7f00000001c0)=""/17, 0x11}, {&(0x7f0000000380)=""/120, 0x78}, {&(0x7f00000002c0)=""/23, 0x17}, {&(0x7f00000051c0)=""/4096, 0x1000}], 0x5, 0x6, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$TIPC_NL_MON_GET(r5, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={0x0, 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x0) accept$packet(r3, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001600)=0x14) r7 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000001740)=ANY=[@ANYBLOB="c93f3c02ff000000000000009e6693fb2e8ec666d7000000005fbd0f4720bd22ec885fe9fe9d9aa81ac02dfe2f89262e4448c74fd86990fc397d2fab4e1036a60b4bad9b142ffee70656130416137e110f252b6175b527b307d7cc00"/103], 0x0, 0x26}, 0x20) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000001f40)=ANY=[@ANYBLOB="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"/689], &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r7, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001880)={r8, 0xc0, &(0x7f0000001a40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0xb, 0x6, &(0x7f0000001940)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0xb7, &(0x7f000000cf3d)=""/183, 0x40f00, 0xc, '\x00', 0x0, 0x3, r7, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r9}, 0x78) r10 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="1801000000060600000000000000008efe63d5006f00000095", @ANYRESDEC, @ANYRES32=r1], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000300)='lock_acquire\x00', r10}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000016c0)={0x11, 0x10, &(0x7f0000001940)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x1000, &(0x7f0000000600)=""/4096, 0x41100, 0xb, '\x00', r6, 0x7, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x9, 0x3}, 0x8, 0x10, &(0x7f0000001680)={0x3, 0xc, 0xa, 0x6}, 0x10, r9, r10}, 0x78) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x5aa2b, &(0x7f0000000300)={&(0x7f0000001bc0)=@newlink={0x84, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x1288}, [@IFLA_LINKINFO={0x5c, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x4c, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_LINK={0x8, 0x1, r11}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r11}]}, 0x84}}, 0x0) 08:01:49 executing program 4: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00000061c0)={0x5, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x100000000, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x8000, 0x0, 0x0, 0x52b4, 0x800, 0x8, 0x4, 0x3, 0x6, 0x6, 0x0, @perf_config_ext={0x2, 0x60}, 0x12, 0x0, 0x0, 0x0, 0x0, 0x1abad1f5, 0x4}, 0x0, 0x6, r0, 0x1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0xe, 0x4, 0x4, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r2, 0x0, 0x0}, 0x20) read(r1, &(0x7f0000001940)=""/232, 0xe8) r3 = syz_open_dev$vcsn(&(0x7f0000000000), 0x4, 0x202) preadv(r0, &(0x7f0000000540)=[{&(0x7f0000005100)=""/186, 0xba}, {&(0x7f00000001c0)=""/17, 0x11}, {&(0x7f0000000380)=""/120, 0x78}, {&(0x7f00000002c0)=""/23, 0x17}, {&(0x7f00000051c0)=""/4096, 0x1000}], 0x5, 0x6, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$TIPC_NL_MON_GET(r5, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={0x0, 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x0) accept$packet(r3, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001600)=0x14) r7 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000001740)=ANY=[@ANYBLOB="c93f3c02ff000000000000009e6693fb2e8ec666d7000000005fbd0f4720bd22ec885fe9fe9d9aa81ac02dfe2f89262e4448c74fd86990fc397d2fab4e1036a60b4bad9b142ffee70656130416137e110f252b6175b527b307d7cc00"/103], 0x0, 0x26}, 0x20) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000001f40)=ANY=[@ANYBLOB="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"/689], &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r7, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001880)={r8, 0xc0, &(0x7f0000001a40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0xb, 0x6, &(0x7f0000001940)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0xb7, &(0x7f000000cf3d)=""/183, 0x40f00, 0xc, '\x00', 0x0, 0x3, r7, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r9}, 0x78) r10 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="1801000000060600000000000000008efe63d5006f00000095", @ANYRESDEC, @ANYRES32=r1], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000300)='lock_acquire\x00', r10}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000016c0)={0x11, 0x10, &(0x7f0000001940)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x1000, &(0x7f0000000600)=""/4096, 0x41100, 0xb, '\x00', r6, 0x7, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x9, 0x3}, 0x8, 0x10, &(0x7f0000001680)={0x3, 0xc, 0xa, 0x6}, 0x10, r9, r10}, 0x78) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x5aa2b, &(0x7f0000000300)={&(0x7f0000001bc0)=@newlink={0x84, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x1288}, [@IFLA_LINKINFO={0x5c, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x4c, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_LINK={0x8, 0x1, r11}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r11}]}, 0x84}}, 0x0) 08:01:49 executing program 5: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00000061c0)={0x5, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x100000000, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x8000, 0x0, 0x0, 0x52b4, 0x800, 0x8, 0x4, 0x3, 0x6, 0x6, 0x0, @perf_config_ext={0x2, 0x60}, 0x12, 0x0, 0x0, 0x0, 0x0, 0x1abad1f5, 0x4}, 0x0, 0x6, r0, 0x1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0xe, 0x4, 0x4, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r2, 0x0, 0x0}, 0x20) read(r1, &(0x7f0000001940)=""/232, 0xe8) r3 = syz_open_dev$vcsn(&(0x7f0000000000), 0x4, 0x202) preadv(r0, &(0x7f0000000540)=[{&(0x7f0000005100)=""/186, 0xba}, {&(0x7f00000001c0)=""/17, 0x11}, {&(0x7f0000000380)=""/120, 0x78}, {&(0x7f00000002c0)=""/23, 0x17}, {&(0x7f00000051c0)=""/4096, 0x1000}], 0x5, 0x6, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$TIPC_NL_MON_GET(r5, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={0x0, 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x0) accept$packet(r3, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001600)=0x14) r7 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000001740)=ANY=[@ANYBLOB="c93f3c02ff000000000000009e6693fb2e8ec666d7000000005fbd0f4720bd22ec885fe9fe9d9aa81ac02dfe2f89262e4448c74fd86990fc397d2fab4e1036a60b4bad9b142ffee70656130416137e110f252b6175b527b307d7cc00"/103], 0x0, 0x26}, 0x20) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000001f40)=ANY=[@ANYBLOB="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"/689], &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r7, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001880)={r8, 0xc0, &(0x7f0000001a40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0xb, 0x6, &(0x7f0000001940)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0xb7, &(0x7f000000cf3d)=""/183, 0x40f00, 0xc, '\x00', 0x0, 0x3, r7, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r9}, 0x78) r10 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="1801000000060600000000000000008efe63d5006f00000095", @ANYRESDEC, @ANYRES32=r1], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000300)='lock_acquire\x00', r10}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000016c0)={0x11, 0x10, &(0x7f0000001940)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x1000, &(0x7f0000000600)=""/4096, 0x41100, 0xb, '\x00', r6, 0x7, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x9, 0x3}, 0x8, 0x10, &(0x7f0000001680)={0x3, 0xc, 0xa, 0x6}, 0x10, r9, r10}, 0x78) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x5aa2b, &(0x7f0000000300)={&(0x7f0000001bc0)=@newlink={0x84, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x1288}, [@IFLA_LINKINFO={0x5c, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x4c, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_LINK={0x8, 0x1, r11}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r11}]}, 0x84}}, 0x0) 08:01:49 executing program 2: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00000061c0)={0x5, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x100000000, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x8000, 0x0, 0x0, 0x52b4, 0x800, 0x8, 0x4, 0x3, 0x6, 0x6, 0x0, @perf_config_ext={0x2, 0x60}, 0x12, 0x0, 0x0, 0x0, 0x0, 0x1abad1f5, 0x4}, 0x0, 0x6, r0, 0x1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0xe, 0x4, 0x4, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r2, 0x0, 0x0}, 0x20) read(r1, &(0x7f0000001940)=""/232, 0xe8) r3 = syz_open_dev$vcsn(&(0x7f0000000000), 0x4, 0x202) preadv(r0, &(0x7f0000000540)=[{&(0x7f0000005100)=""/186, 0xba}, {&(0x7f00000001c0)=""/17, 0x11}, {&(0x7f0000000380)=""/120, 0x78}, {&(0x7f00000002c0)=""/23, 0x17}, {&(0x7f00000051c0)=""/4096, 0x1000}], 0x5, 0x6, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$TIPC_NL_MON_GET(r5, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={0x0, 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x0) accept$packet(r3, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001600)=0x14) r7 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000001740)=ANY=[@ANYBLOB="c93f3c02ff000000000000009e6693fb2e8ec666d7000000005fbd0f4720bd22ec885fe9fe9d9aa81ac02dfe2f89262e4448c74fd86990fc397d2fab4e1036a60b4bad9b142ffee70656130416137e110f252b6175b527b307d7cc00"/103], 0x0, 0x26}, 0x20) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000001f40)=ANY=[@ANYBLOB="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"/689], &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r7, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001880)={r8, 0xc0, &(0x7f0000001a40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0xb, 0x6, &(0x7f0000001940)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0xb7, &(0x7f000000cf3d)=""/183, 0x40f00, 0xc, '\x00', 0x0, 0x3, r7, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r9}, 0x78) r10 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="1801000000060600000000000000008efe63d5006f00000095", @ANYRESDEC, @ANYRES32=r1], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000300)='lock_acquire\x00', r10}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000016c0)={0x11, 0x10, &(0x7f0000001940)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x1000, &(0x7f0000000600)=""/4096, 0x41100, 0xb, '\x00', r6, 0x7, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x9, 0x3}, 0x8, 0x10, &(0x7f0000001680)={0x3, 0xc, 0xa, 0x6}, 0x10, r9, r10}, 0x78) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x5aa2b, &(0x7f0000000300)={&(0x7f0000001bc0)=@newlink={0x84, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x1288}, [@IFLA_LINKINFO={0x5c, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x4c, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_LINK={0x8, 0x1, r11}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r11}]}, 0x84}}, 0x0) 08:01:49 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r2 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r2, &(0x7f0000000000), 0x10) sendmsg$can_bcm(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r1, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca3f420f0000000000", @ANYRES64=r0, @ANYRES64=0x0, @ANYRES64=r1, @ANYRES64=0x0, @ANYBLOB="6f04cf01ae"], 0x20000600}}, 0x0) 08:01:49 executing program 0: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00000061c0)={0x5, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x100000000, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x8000, 0x0, 0x0, 0x52b4, 0x800, 0x8, 0x4, 0x3, 0x6, 0x6, 0x0, @perf_config_ext={0x2, 0x60}, 0x12, 0x0, 0x0, 0x0, 0x0, 0x1abad1f5, 0x4}, 0x0, 0x6, r0, 0x1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0xe, 0x4, 0x4, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r2, 0x0, 0x0}, 0x20) read(r1, &(0x7f0000001940)=""/232, 0xe8) r3 = syz_open_dev$vcsn(&(0x7f0000000000), 0x4, 0x202) preadv(r0, &(0x7f0000000540)=[{&(0x7f0000005100)=""/186, 0xba}, {&(0x7f00000001c0)=""/17, 0x11}, {&(0x7f0000000380)=""/120, 0x78}, {&(0x7f00000002c0)=""/23, 0x17}, {&(0x7f00000051c0)=""/4096, 0x1000}], 0x5, 0x6, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$TIPC_NL_MON_GET(r5, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={0x0, 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x0) accept$packet(r3, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001600)=0x14) r7 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000001740)=ANY=[@ANYBLOB="c93f3c02ff000000000000009e6693fb2e8ec666d7000000005fbd0f4720bd22ec885fe9fe9d9aa81ac02dfe2f89262e4448c74fd86990fc397d2fab4e1036a60b4bad9b142ffee70656130416137e110f252b6175b527b307d7cc00"/103], 0x0, 0x26}, 0x20) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000001f40)=ANY=[@ANYBLOB="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"/689], &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r7, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001880)={r8, 0xc0, &(0x7f0000001a40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0xb, 0x6, &(0x7f0000001940)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0xb7, &(0x7f000000cf3d)=""/183, 0x40f00, 0xc, '\x00', 0x0, 0x3, r7, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r9}, 0x78) r10 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="1801000000060600000000000000008efe63d5006f00000095", @ANYRESDEC, @ANYRES32=r1], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000300)='lock_acquire\x00', r10}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000016c0)={0x11, 0x10, &(0x7f0000001940)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x1000, &(0x7f0000000600)=""/4096, 0x41100, 0xb, '\x00', r6, 0x7, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x9, 0x3}, 0x8, 0x10, &(0x7f0000001680)={0x3, 0xc, 0xa, 0x6}, 0x10, r9, r10}, 0x78) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x5aa2b, &(0x7f0000000300)={&(0x7f0000001bc0)=@newlink={0x84, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x1288}, [@IFLA_LINKINFO={0x5c, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x4c, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_LINK={0x8, 0x1, r11}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r11}]}, 0x84}}, 0x0) 08:01:49 executing program 4: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00000061c0)={0x5, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x100000000, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x8000, 0x0, 0x0, 0x52b4, 0x800, 0x8, 0x4, 0x3, 0x6, 0x6, 0x0, @perf_config_ext={0x2, 0x60}, 0x12, 0x0, 0x0, 0x0, 0x0, 0x1abad1f5, 0x4}, 0x0, 0x6, r0, 0x1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0xe, 0x4, 0x4, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r2, 0x0, 0x0}, 0x20) read(r1, &(0x7f0000001940)=""/232, 0xe8) r3 = syz_open_dev$vcsn(&(0x7f0000000000), 0x4, 0x202) preadv(r0, &(0x7f0000000540)=[{&(0x7f0000005100)=""/186, 0xba}, {&(0x7f00000001c0)=""/17, 0x11}, {&(0x7f0000000380)=""/120, 0x78}, {&(0x7f00000002c0)=""/23, 0x17}, {&(0x7f00000051c0)=""/4096, 0x1000}], 0x5, 0x6, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$TIPC_NL_MON_GET(r5, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={0x0, 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x0) accept$packet(r3, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001600)=0x14) r7 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000001740)=ANY=[@ANYBLOB="c93f3c02ff000000000000009e6693fb2e8ec666d7000000005fbd0f4720bd22ec885fe9fe9d9aa81ac02dfe2f89262e4448c74fd86990fc397d2fab4e1036a60b4bad9b142ffee70656130416137e110f252b6175b527b307d7cc00"/103], 0x0, 0x26}, 0x20) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000001f40)=ANY=[@ANYBLOB="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"/689], &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r7, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001880)={r8, 0xc0, &(0x7f0000001a40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0xb, 0x6, &(0x7f0000001940)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0xb7, &(0x7f000000cf3d)=""/183, 0x40f00, 0xc, '\x00', 0x0, 0x3, r7, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r9}, 0x78) r10 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="1801000000060600000000000000008efe63d5006f00000095", @ANYRESDEC, @ANYRES32=r1], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000300)='lock_acquire\x00', r10}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000016c0)={0x11, 0x10, &(0x7f0000001940)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x1000, &(0x7f0000000600)=""/4096, 0x41100, 0xb, '\x00', r6, 0x7, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x9, 0x3}, 0x8, 0x10, &(0x7f0000001680)={0x3, 0xc, 0xa, 0x6}, 0x10, r9, r10}, 0x78) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x5aa2b, &(0x7f0000000300)={&(0x7f0000001bc0)=@newlink={0x84, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x1288}, [@IFLA_LINKINFO={0x5c, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x4c, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_LINK={0x8, 0x1, r11}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r11}]}, 0x84}}, 0x0) 08:01:49 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r2 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r2, &(0x7f0000000000), 0x10) sendmsg$can_bcm(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r1, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca3f420f0000000000", @ANYRES64=r0, @ANYRES64=0x0, @ANYRES64=r1, @ANYRES64=0x0, @ANYBLOB="6f04cf01ae"], 0x20000600}}, 0x0) 08:01:49 executing program 3: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00000061c0)={0x5, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x100000000, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x8000, 0x0, 0x0, 0x52b4, 0x800, 0x8, 0x4, 0x3, 0x6, 0x6, 0x0, @perf_config_ext={0x2, 0x60}, 0x12, 0x0, 0x0, 0x0, 0x0, 0x1abad1f5, 0x4}, 0x0, 0x6, r0, 0x1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0xe, 0x4, 0x4, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r2, 0x0, 0x0}, 0x20) read(r1, &(0x7f0000001940)=""/232, 0xe8) r3 = syz_open_dev$vcsn(&(0x7f0000000000), 0x4, 0x202) preadv(r0, &(0x7f0000000540)=[{&(0x7f0000005100)=""/186, 0xba}, {&(0x7f00000001c0)=""/17, 0x11}, {&(0x7f0000000380)=""/120, 0x78}, {&(0x7f00000002c0)=""/23, 0x17}, {&(0x7f00000051c0)=""/4096, 0x1000}], 0x5, 0x6, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$TIPC_NL_MON_GET(r5, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={0x0, 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x0) accept$packet(r3, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001600)=0x14) r7 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000001740)=ANY=[@ANYBLOB="c93f3c02ff000000000000009e6693fb2e8ec666d7000000005fbd0f4720bd22ec885fe9fe9d9aa81ac02dfe2f89262e4448c74fd86990fc397d2fab4e1036a60b4bad9b142ffee70656130416137e110f252b6175b527b307d7cc00"/103], 0x0, 0x26}, 0x20) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000001f40)=ANY=[@ANYBLOB="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"/689], &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r7, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001880)={r8, 0xc0, &(0x7f0000001a40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0xb, 0x6, &(0x7f0000001940)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0xb7, &(0x7f000000cf3d)=""/183, 0x40f00, 0xc, '\x00', 0x0, 0x3, r7, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r9}, 0x78) r10 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="1801000000060600000000000000008efe63d5006f00000095", @ANYRESDEC, @ANYRES32=r1], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000300)='lock_acquire\x00', r10}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000016c0)={0x11, 0x10, &(0x7f0000001940)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x1000, &(0x7f0000000600)=""/4096, 0x41100, 0xb, '\x00', r6, 0x7, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x9, 0x3}, 0x8, 0x10, &(0x7f0000001680)={0x3, 0xc, 0xa, 0x6}, 0x10, r9, r10}, 0x78) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x5aa2b, &(0x7f0000000300)={&(0x7f0000001bc0)=@newlink={0x84, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x1288}, [@IFLA_LINKINFO={0x5c, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x4c, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_LINK={0x8, 0x1, r11}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r11}]}, 0x84}}, 0x0) 08:01:49 executing program 5: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00000061c0)={0x5, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x100000000, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x8000, 0x0, 0x0, 0x52b4, 0x800, 0x8, 0x4, 0x3, 0x6, 0x6, 0x0, @perf_config_ext={0x2, 0x60}, 0x12, 0x0, 0x0, 0x0, 0x0, 0x1abad1f5, 0x4}, 0x0, 0x6, r0, 0x1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0xe, 0x4, 0x4, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r2, 0x0, 0x0}, 0x20) read(r1, &(0x7f0000001940)=""/232, 0xe8) r3 = syz_open_dev$vcsn(&(0x7f0000000000), 0x4, 0x202) preadv(r0, &(0x7f0000000540)=[{&(0x7f0000005100)=""/186, 0xba}, {&(0x7f00000001c0)=""/17, 0x11}, {&(0x7f0000000380)=""/120, 0x78}, {&(0x7f00000002c0)=""/23, 0x17}, {&(0x7f00000051c0)=""/4096, 0x1000}], 0x5, 0x6, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$TIPC_NL_MON_GET(r5, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={0x0, 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x0) accept$packet(r3, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001600)=0x14) r7 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000001740)=ANY=[@ANYBLOB="c93f3c02ff000000000000009e6693fb2e8ec666d7000000005fbd0f4720bd22ec885fe9fe9d9aa81ac02dfe2f89262e4448c74fd86990fc397d2fab4e1036a60b4bad9b142ffee70656130416137e110f252b6175b527b307d7cc00"/103], 0x0, 0x26}, 0x20) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000001f40)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000007999d02ff278039a60e2a885a593f9d4827ea4d48e0c802b77d89caec400002613f462acb4244fbcf91581f2b7810000006122cafe62f383212a831799084db50ae56d6cfdad88ea2ab02a5c186b4b2cb6d799b0b3d49e885db0591987b5e976dad1579a28b9f1ce17471d54fd6aee916d44c7871b58c442b15d40f29f59364ed2c75006b54db592ceaef87d14ed838968be2a16c78f3fea81c1bf0dd2c9d9be4b3aa26c1f60e65ae10c07f2db982187c47acf606e44ec66f11f0dd84c0f82bd4e60efe44ffb31fde79015ad50c96d94f60c40735bfad14717e7e7c1709c5dfb4c95a732113f189993d797c11dfa134e93f8c3fa3de94c12ede7990a3f9b82af05c45984e247c59b355c6694675f14736f506e6c19182d2ca5c01cee5443b987a67e7224a062b9505ad9452f90ea1d3406bf4469f800cc12182c23277d73c153c550d9600fe035a2a357c273163a599cb43cf6309e48928ee9eeced9ef5f634cb4dc39bfa69962324f31de23bfccff731bf552c7839f2594a5f7c2fdd45b4219c73e8bcbab144c0d8d2119948fdb0931bc0abbb19498027300df06802b90385b7693935cc681f70000000000b381b66237d90683f0880b2ca0e6bffb565bb5c712ba6411b0f5484340f71023e9a99b8b32999565fd871c004db3d000527f36d146fd41e7cdc6feb105d95818fa77a17fc79dfcdb9fe6dbe81155e75a802d2422b1f2d5695c00854f0efbc22aa018773e683715b626fdd4e0637bc80bb1c1e201524a0cc55f54a1b962aa651211b8a1728bfb6ecfde0681ee5b42514c7c64fde01329798b103fa2562fe21e26d74459875149977025707e1a793cc31db78aa3a9b57c177102b1ccc66653848e54e30d755bbf663eb5099dcdbc3432033a7280497502f9e69f86557f16a37992ec4a00"/689], &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r7, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001880)={r8, 0xc0, &(0x7f0000001a40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0xb, 0x6, &(0x7f0000001940)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0xb7, &(0x7f000000cf3d)=""/183, 0x40f00, 0xc, '\x00', 0x0, 0x3, r7, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r9}, 0x78) r10 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="1801000000060600000000000000008efe63d5006f00000095", @ANYRESDEC, @ANYRES32=r1], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000300)='lock_acquire\x00', r10}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000016c0)={0x11, 0x10, &(0x7f0000001940)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x1000, &(0x7f0000000600)=""/4096, 0x41100, 0xb, '\x00', r6, 0x7, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x9, 0x3}, 0x8, 0x10, &(0x7f0000001680)={0x3, 0xc, 0xa, 0x6}, 0x10, r9, r10}, 0x78) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x5aa2b, &(0x7f0000000300)={&(0x7f0000001bc0)=@newlink={0x84, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x1288}, [@IFLA_LINKINFO={0x5c, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x4c, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_LINK={0x8, 0x1, r11}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r11}]}, 0x84}}, 0x0) 08:01:49 executing program 2: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00000061c0)={0x5, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x100000000, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x8000, 0x0, 0x0, 0x52b4, 0x800, 0x8, 0x4, 0x3, 0x6, 0x6, 0x0, @perf_config_ext={0x2, 0x60}, 0x12, 0x0, 0x0, 0x0, 0x0, 0x1abad1f5, 0x4}, 0x0, 0x6, r0, 0x1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0xe, 0x4, 0x4, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r2, 0x0, 0x0}, 0x20) read(r1, &(0x7f0000001940)=""/232, 0xe8) r3 = syz_open_dev$vcsn(&(0x7f0000000000), 0x4, 0x202) preadv(r0, &(0x7f0000000540)=[{&(0x7f0000005100)=""/186, 0xba}, {&(0x7f00000001c0)=""/17, 0x11}, {&(0x7f0000000380)=""/120, 0x78}, {&(0x7f00000002c0)=""/23, 0x17}, {&(0x7f00000051c0)=""/4096, 0x1000}], 0x5, 0x6, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$TIPC_NL_MON_GET(r5, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={0x0, 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x0) accept$packet(r3, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001600)=0x14) r7 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000001740)=ANY=[@ANYBLOB="c93f3c02ff000000000000009e6693fb2e8ec666d7000000005fbd0f4720bd22ec885fe9fe9d9aa81ac02dfe2f89262e4448c74fd86990fc397d2fab4e1036a60b4bad9b142ffee70656130416137e110f252b6175b527b307d7cc00"/103], 0x0, 0x26}, 0x20) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000001f40)=ANY=[@ANYBLOB="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"/689], &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r7, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001880)={r8, 0xc0, &(0x7f0000001a40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0xb, 0x6, &(0x7f0000001940)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0xb7, &(0x7f000000cf3d)=""/183, 0x40f00, 0xc, '\x00', 0x0, 0x3, r7, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r9}, 0x78) r10 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="1801000000060600000000000000008efe63d5006f00000095", @ANYRESDEC, @ANYRES32=r1], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000300)='lock_acquire\x00', r10}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000016c0)={0x11, 0x10, &(0x7f0000001940)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x1000, &(0x7f0000000600)=""/4096, 0x41100, 0xb, '\x00', r6, 0x7, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x9, 0x3}, 0x8, 0x10, &(0x7f0000001680)={0x3, 0xc, 0xa, 0x6}, 0x10, r9, r10}, 0x78) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x5aa2b, &(0x7f0000000300)={&(0x7f0000001bc0)=@newlink={0x84, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x1288}, [@IFLA_LINKINFO={0x5c, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x4c, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_LINK={0x8, 0x1, r11}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r11}]}, 0x84}}, 0x0) 08:01:49 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r2 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r2, &(0x7f0000000000), 0x10) sendmsg$can_bcm(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r1, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca3f420f0000000000", @ANYRES64=r0, @ANYRES64=0x0, @ANYRES64=r1, @ANYRES64=0x0, @ANYBLOB="6f04cf01ae"], 0x20000600}}, 0x0) 08:01:49 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r2 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r2, &(0x7f0000000000), 0x10) sendmsg$can_bcm(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r1, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca3f420f0000000000", @ANYRES64=r0, @ANYRES64=0x0, @ANYRES64=r1, @ANYRES64=0x0, @ANYBLOB="6f04cf01ae"], 0x20000600}}, 0x0) 08:01:49 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r2 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r2, &(0x7f0000000000), 0x10) sendmsg$can_bcm(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r1, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca3f420f0000000000", @ANYRES64=r0, @ANYRES64=0x0, @ANYRES64=r1, @ANYRES64=0x0, @ANYBLOB="6f04cf01ae"], 0x20000600}}, 0x0) 08:01:49 executing program 4: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00000061c0)={0x5, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x100000000, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x8000, 0x0, 0x0, 0x52b4, 0x800, 0x8, 0x4, 0x3, 0x6, 0x6, 0x0, @perf_config_ext={0x2, 0x60}, 0x12, 0x0, 0x0, 0x0, 0x0, 0x1abad1f5, 0x4}, 0x0, 0x6, r0, 0x1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0xe, 0x4, 0x4, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r2, 0x0, 0x0}, 0x20) read(r1, &(0x7f0000001940)=""/232, 0xe8) r3 = syz_open_dev$vcsn(&(0x7f0000000000), 0x4, 0x202) preadv(r0, &(0x7f0000000540)=[{&(0x7f0000005100)=""/186, 0xba}, {&(0x7f00000001c0)=""/17, 0x11}, {&(0x7f0000000380)=""/120, 0x78}, {&(0x7f00000002c0)=""/23, 0x17}, {&(0x7f00000051c0)=""/4096, 0x1000}], 0x5, 0x6, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$TIPC_NL_MON_GET(r5, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={0x0, 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x0) accept$packet(r3, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001600)=0x14) r7 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000001740)=ANY=[@ANYBLOB="c93f3c02ff000000000000009e6693fb2e8ec666d7000000005fbd0f4720bd22ec885fe9fe9d9aa81ac02dfe2f89262e4448c74fd86990fc397d2fab4e1036a60b4bad9b142ffee70656130416137e110f252b6175b527b307d7cc00"/103], 0x0, 0x26}, 0x20) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000001f40)=ANY=[@ANYBLOB="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"/689], &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r7, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001880)={r8, 0xc0, &(0x7f0000001a40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0xb, 0x6, &(0x7f0000001940)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0xb7, &(0x7f000000cf3d)=""/183, 0x40f00, 0xc, '\x00', 0x0, 0x3, r7, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r9}, 0x78) r10 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="1801000000060600000000000000008efe63d5006f00000095", @ANYRESDEC, @ANYRES32=r1], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000300)='lock_acquire\x00', r10}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000016c0)={0x11, 0x10, &(0x7f0000001940)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x1000, &(0x7f0000000600)=""/4096, 0x41100, 0xb, '\x00', r6, 0x7, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x9, 0x3}, 0x8, 0x10, &(0x7f0000001680)={0x3, 0xc, 0xa, 0x6}, 0x10, r9, r10}, 0x78) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x5aa2b, &(0x7f0000000300)={&(0x7f0000001bc0)=@newlink={0x84, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x1288}, [@IFLA_LINKINFO={0x5c, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x4c, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_LINK={0x8, 0x1, r11}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r11}]}, 0x84}}, 0x0) 08:01:49 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r2 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r2, &(0x7f0000000000), 0x10) sendmsg$can_bcm(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r1, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca3f420f0000000000", @ANYRES64=r0, @ANYRES64=0x0, @ANYRES64=r1, @ANYRES64=0x0, @ANYBLOB="6f04cf01ae"], 0x20000600}}, 0x0) 08:01:49 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'macvlan1\x00', &(0x7f0000000000)=@ethtool_gfeatures={0x34}}) 08:01:49 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r2 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r2, &(0x7f0000000000), 0x10) sendmsg$can_bcm(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r1, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca3f420f0000000000", @ANYRES64=r0, @ANYRES64=0x0, @ANYRES64=r1, @ANYRES64=0x0, @ANYBLOB="6f04cf01ae"], 0x20000600}}, 0x0) 08:01:49 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000000040)="120000001200e7ef007b0000f4afd7030a7c", 0x12, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) recvmmsg(r0, &(0x7f00000020c0), 0x3a4, 0x0, &(0x7f0000000000)={0x77359400}) shutdown(0xffffffffffffffff, 0x0) 08:01:49 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r2 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r2, &(0x7f0000000000), 0x10) sendmsg$can_bcm(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r1, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca3f420f0000000000", @ANYRES64=r0, @ANYRES64=0x0, @ANYRES64=r1, @ANYRES64=0x0, @ANYBLOB="6f04cf01ae"], 0x20000600}}, 0x0) 08:01:49 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r2 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r2, &(0x7f0000000000), 0x10) sendmsg$can_bcm(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r1, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca3f420f0000000000", @ANYRES64=r0, @ANYRES64=0x0, @ANYRES64=r1, @ANYRES64=0x0, @ANYBLOB="6f04cf01ae"], 0x20000600}}, 0x0) 08:01:50 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'macvlan1\x00', &(0x7f0000000000)=@ethtool_gfeatures={0x34}}) 08:01:50 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000000040)="120000001200e7ef007b0000f4afd7030a7c", 0x12, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) recvmmsg(r0, &(0x7f00000020c0), 0x3a4, 0x0, &(0x7f0000000000)={0x77359400}) shutdown(0xffffffffffffffff, 0x0) 08:01:50 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r2 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r2, &(0x7f0000000000), 0x10) sendmsg$can_bcm(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r1, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca3f420f0000000000", @ANYRES64=r0, @ANYRES64=0x0, @ANYRES64=r1, @ANYRES64=0x0, @ANYBLOB="6f04cf01ae"], 0x20000600}}, 0x0) 08:01:50 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r2 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r2, &(0x7f0000000000), 0x10) sendmsg$can_bcm(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r1, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca3f420f0000000000", @ANYRES64=r0, @ANYRES64=0x0, @ANYRES64=r1, @ANYRES64=0x0, @ANYBLOB="6f04cf01ae"], 0x20000600}}, 0x0) 08:01:50 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000000040)="120000001200e7ef007b0000f4afd7030a7c", 0x12, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) recvmmsg(r0, &(0x7f00000020c0), 0x3a4, 0x0, &(0x7f0000000000)={0x77359400}) shutdown(0xffffffffffffffff, 0x0) 08:01:50 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r2 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r2, &(0x7f0000000000), 0x10) sendmsg$can_bcm(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r1, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca3f420f0000000000", @ANYRES64=r0, @ANYRES64=0x0, @ANYRES64=r1, @ANYRES64=0x0, @ANYBLOB="6f04cf01ae"], 0x20000600}}, 0x0) 08:01:50 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'macvlan1\x00', &(0x7f0000000000)=@ethtool_gfeatures={0x34}}) 08:01:50 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000000040)="120000001200e7ef007b0000f4afd7030a7c", 0x12, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) recvmmsg(r0, &(0x7f00000020c0), 0x3a4, 0x0, &(0x7f0000000000)={0x77359400}) shutdown(0xffffffffffffffff, 0x0) 08:01:50 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000000040)="120000001200e7ef007b0000f4afd7030a7c", 0x12, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) recvmmsg(r0, &(0x7f00000020c0), 0x3a4, 0x0, &(0x7f0000000000)={0x77359400}) shutdown(0xffffffffffffffff, 0x0) 08:01:50 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000000040)="120000001200e7ef007b0000f4afd7030a7c", 0x12, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) recvmmsg(r0, &(0x7f00000020c0), 0x3a4, 0x0, &(0x7f0000000000)={0x77359400}) shutdown(0xffffffffffffffff, 0x0) 08:01:50 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000000040)="120000001200e7ef007b0000f4afd7030a7c", 0x12, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) recvmmsg(r0, &(0x7f00000020c0), 0x3a4, 0x0, &(0x7f0000000000)={0x77359400}) shutdown(0xffffffffffffffff, 0x0) 08:01:50 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000000040)="120000001200e7ef007b0000f4afd7030a7c", 0x12, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) recvmmsg(r0, &(0x7f00000020c0), 0x3a4, 0x0, &(0x7f0000000000)={0x77359400}) shutdown(0xffffffffffffffff, 0x0) 08:01:50 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000000040)="120000001200e7ef007b0000f4afd7030a7c", 0x12, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) recvmmsg(r0, &(0x7f00000020c0), 0x3a4, 0x0, &(0x7f0000000000)={0x77359400}) shutdown(0xffffffffffffffff, 0x0) 08:01:50 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, 0x0, &(0x7f0000000180)) 08:01:50 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000000040)="120000001200e7ef007b0000f4afd7030a7c", 0x12, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) recvmmsg(r0, &(0x7f00000020c0), 0x3a4, 0x0, &(0x7f0000000000)={0x77359400}) shutdown(0xffffffffffffffff, 0x0) 08:01:50 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000000040)="120000001200e7ef007b0000f4afd7030a7c", 0x12, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) recvmmsg(r0, &(0x7f00000020c0), 0x3a4, 0x0, &(0x7f0000000000)={0x77359400}) shutdown(0xffffffffffffffff, 0x0) 08:01:50 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000000040)="120000001200e7ef007b0000f4afd7030a7c", 0x12, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) recvmmsg(r0, &(0x7f00000020c0), 0x3a4, 0x0, &(0x7f0000000000)={0x77359400}) shutdown(0xffffffffffffffff, 0x0) 08:01:50 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000000040)="120000001200e7ef007b0000f4afd7030a7c", 0x12, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) recvmmsg(r0, &(0x7f00000020c0), 0x3a4, 0x0, &(0x7f0000000000)={0x77359400}) shutdown(0xffffffffffffffff, 0x0) 08:01:50 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000000040)="120000001200e7ef007b0000f4afd7030a7c", 0x12, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) recvmmsg(r0, &(0x7f00000020c0), 0x3a4, 0x0, &(0x7f0000000000)={0x77359400}) shutdown(0xffffffffffffffff, 0x0) 08:01:50 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, 0x0, &(0x7f0000000180)) 08:01:50 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000000040)="120000001200e7ef007b0000f4afd7030a7c", 0x12, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) recvmmsg(r0, &(0x7f00000020c0), 0x3a4, 0x0, &(0x7f0000000000)={0x77359400}) shutdown(0xffffffffffffffff, 0x0) 08:01:50 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000000040)="120000001200e7ef007b0000f4afd7030a7c", 0x12, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) recvmmsg(r0, &(0x7f00000020c0), 0x3a4, 0x0, &(0x7f0000000000)={0x77359400}) shutdown(0xffffffffffffffff, 0x0) 08:01:50 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, 0x0, &(0x7f0000000180)) 08:01:50 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000000040)="120000001200e7ef007b0000f4afd7030a7c", 0x12, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) recvmmsg(r0, &(0x7f00000020c0), 0x3a4, 0x0, &(0x7f0000000000)={0x77359400}) shutdown(0xffffffffffffffff, 0x0) 08:01:51 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, 0x0, &(0x7f0000000180)) 08:01:51 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = io_uring_setup(0x45db, &(0x7f0000000540)) r2 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000240), 0x0) read(r2, &(0x7f0000000a40)=""/102400, 0x19000) close_range(r1, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) 08:01:51 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000000040)="120000001200e7ef007b0000f4afd7030a7c", 0x12, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) recvmmsg(r0, &(0x7f00000020c0), 0x3a4, 0x0, &(0x7f0000000000)={0x77359400}) shutdown(0xffffffffffffffff, 0x0) 08:01:51 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, 0x0, &(0x7f0000000180)) 08:01:51 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, 0x0, &(0x7f0000000180)) 08:01:51 executing program 5: clone3(&(0x7f0000000680)={0xc0024000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 08:01:51 executing program 0: r0 = syz_open_dev$vim2m(&(0x7f0000000000), 0x4, 0x2) ioctl$vim2m_VIDIOC_G_FMT(r0, 0xc0d05604, &(0x7f0000000140)={0x2}) 08:01:51 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, 0x0, &(0x7f0000000180)) 08:01:51 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$DCCPDIAG_GETSOCK(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000040)={0x54, 0x13, 0xd29, 0x0, 0x0, {}, [@INET_DIAG_REQ_BYTECODE={0x8, 0x3, "06010000"}]}, 0x54}}, 0x0) 08:01:51 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = io_uring_setup(0x45db, &(0x7f0000000540)) r2 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000240), 0x0) read(r2, &(0x7f0000000a40)=""/102400, 0x19000) close_range(r1, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) 08:01:51 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = io_uring_setup(0x45db, &(0x7f0000000540)) r2 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000240), 0x0) read(r2, &(0x7f0000000a40)=""/102400, 0x19000) close_range(r1, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) 08:01:51 executing program 0: r0 = syz_open_dev$vim2m(&(0x7f0000000000), 0x4, 0x2) ioctl$vim2m_VIDIOC_G_FMT(r0, 0xc0d05604, &(0x7f0000000140)={0x2}) 08:01:51 executing program 4: r0 = syz_open_dev$vim2m(&(0x7f0000000000), 0x4, 0x2) ioctl$vim2m_VIDIOC_G_FMT(r0, 0xc0d05604, &(0x7f0000000140)={0x2}) 08:01:51 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$DCCPDIAG_GETSOCK(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000040)={0x54, 0x13, 0xd29, 0x0, 0x0, {}, [@INET_DIAG_REQ_BYTECODE={0x8, 0x3, "06010000"}]}, 0x54}}, 0x0) 08:01:51 executing program 0: r0 = syz_open_dev$vim2m(&(0x7f0000000000), 0x4, 0x2) ioctl$vim2m_VIDIOC_G_FMT(r0, 0xc0d05604, &(0x7f0000000140)={0x2}) 08:01:51 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$DCCPDIAG_GETSOCK(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000040)={0x54, 0x13, 0xd29, 0x0, 0x0, {}, [@INET_DIAG_REQ_BYTECODE={0x8, 0x3, "06010000"}]}, 0x54}}, 0x0) 08:01:51 executing program 4: r0 = syz_open_dev$vim2m(&(0x7f0000000000), 0x4, 0x2) ioctl$vim2m_VIDIOC_G_FMT(r0, 0xc0d05604, &(0x7f0000000140)={0x2}) 08:01:52 executing program 5: clone3(&(0x7f0000000680)={0xc0024000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 08:01:52 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = io_uring_setup(0x45db, &(0x7f0000000540)) r2 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000240), 0x0) read(r2, &(0x7f0000000a40)=""/102400, 0x19000) close_range(r1, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) 08:01:52 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$DCCPDIAG_GETSOCK(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000040)={0x54, 0x13, 0xd29, 0x0, 0x0, {}, [@INET_DIAG_REQ_BYTECODE={0x8, 0x3, "06010000"}]}, 0x54}}, 0x0) 08:01:52 executing program 0: r0 = syz_open_dev$vim2m(&(0x7f0000000000), 0x4, 0x2) ioctl$vim2m_VIDIOC_G_FMT(r0, 0xc0d05604, &(0x7f0000000140)={0x2}) 08:01:52 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = io_uring_setup(0x45db, &(0x7f0000000540)) r2 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000240), 0x0) read(r2, &(0x7f0000000a40)=""/102400, 0x19000) close_range(r1, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) 08:01:52 executing program 4: r0 = syz_open_dev$vim2m(&(0x7f0000000000), 0x4, 0x2) ioctl$vim2m_VIDIOC_G_FMT(r0, 0xc0d05604, &(0x7f0000000140)={0x2}) 08:01:52 executing program 4: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$DCCPDIAG_GETSOCK(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000040)={0x54, 0x13, 0xd29, 0x0, 0x0, {}, [@INET_DIAG_REQ_BYTECODE={0x8, 0x3, "06010000"}]}, 0x54}}, 0x0) 08:01:52 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$DCCPDIAG_GETSOCK(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000040)={0x54, 0x13, 0xd29, 0x0, 0x0, {}, [@INET_DIAG_REQ_BYTECODE={0x8, 0x3, "06010000"}]}, 0x54}}, 0x0) 08:01:52 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = io_uring_setup(0x45db, &(0x7f0000000540)) r2 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000240), 0x0) read(r2, &(0x7f0000000a40)=""/102400, 0x19000) close_range(r1, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) 08:01:52 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = io_uring_setup(0x45db, &(0x7f0000000540)) r2 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000240), 0x0) read(r2, &(0x7f0000000a40)=""/102400, 0x19000) close_range(r1, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) 08:01:52 executing program 4: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$DCCPDIAG_GETSOCK(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000040)={0x54, 0x13, 0xd29, 0x0, 0x0, {}, [@INET_DIAG_REQ_BYTECODE={0x8, 0x3, "06010000"}]}, 0x54}}, 0x0) 08:01:52 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = io_uring_setup(0x45db, &(0x7f0000000540)) r2 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000240), 0x0) read(r2, &(0x7f0000000a40)=""/102400, 0x19000) close_range(r1, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) 08:01:53 executing program 5: clone3(&(0x7f0000000680)={0xc0024000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 08:01:53 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$DCCPDIAG_GETSOCK(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000040)={0x54, 0x13, 0xd29, 0x0, 0x0, {}, [@INET_DIAG_REQ_BYTECODE={0x8, 0x3, "06010000"}]}, 0x54}}, 0x0) 08:01:53 executing program 4: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$DCCPDIAG_GETSOCK(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000040)={0x54, 0x13, 0xd29, 0x0, 0x0, {}, [@INET_DIAG_REQ_BYTECODE={0x8, 0x3, "06010000"}]}, 0x54}}, 0x0) 08:01:53 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = io_uring_setup(0x45db, &(0x7f0000000540)) r2 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000240), 0x0) read(r2, &(0x7f0000000a40)=""/102400, 0x19000) close_range(r1, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) 08:01:53 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = io_uring_setup(0x45db, &(0x7f0000000540)) r2 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000240), 0x0) read(r2, &(0x7f0000000a40)=""/102400, 0x19000) close_range(r1, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) 08:01:53 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = io_uring_setup(0x45db, &(0x7f0000000540)) r2 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000240), 0x0) read(r2, &(0x7f0000000a40)=""/102400, 0x19000) close_range(r1, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) 08:01:53 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$DCCPDIAG_GETSOCK(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000040)={0x54, 0x13, 0xd29, 0x0, 0x0, {}, [@INET_DIAG_REQ_BYTECODE={0x8, 0x3, "06010000"}]}, 0x54}}, 0x0) 08:01:53 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = io_uring_setup(0x45db, &(0x7f0000000540)) r2 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000240), 0x0) read(r2, &(0x7f0000000a40)=""/102400, 0x19000) close_range(r1, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) 08:01:53 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = io_uring_setup(0x45db, &(0x7f0000000540)) r2 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000240), 0x0) read(r2, &(0x7f0000000a40)=""/102400, 0x19000) close_range(r1, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) 08:01:53 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = io_uring_setup(0x45db, &(0x7f0000000540)) r2 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000240), 0x0) read(r2, &(0x7f0000000a40)=""/102400, 0x19000) close_range(r1, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) 08:01:53 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = io_uring_setup(0x45db, &(0x7f0000000540)) r2 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000240), 0x0) read(r2, &(0x7f0000000a40)=""/102400, 0x19000) close_range(r1, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) 08:01:53 executing program 2: unshare(0x48000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000a, 0x8031, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) r0 = socket$inet_sctp(0x2, 0x800000000001, 0x84) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r0, 0x2400001) accept(r0, 0x0, 0x0) listen(r0, 0x0) sendto$inet(r0, &(0x7f0000000000)="d2", 0x1, 0x5dc, &(0x7f0000a04000)={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) 08:01:53 executing program 5: clone3(&(0x7f0000000680)={0xc0024000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 08:01:53 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = io_uring_setup(0x45db, &(0x7f0000000540)) r2 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000240), 0x0) read(r2, &(0x7f0000000a40)=""/102400, 0x19000) close_range(r1, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) 08:01:53 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x18, 0x39, 0x319, 0x0, 0x0, {0x3}, [@typed={0x4}]}, 0x18}}, 0x0) 08:01:53 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = io_uring_setup(0x45db, &(0x7f0000000540)) r2 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000240), 0x0) read(r2, &(0x7f0000000a40)=""/102400, 0x19000) close_range(r1, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) 08:01:53 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = io_uring_setup(0x45db, &(0x7f0000000540)) r2 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000240), 0x0) read(r2, &(0x7f0000000a40)=""/102400, 0x19000) close_range(r1, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) 08:01:54 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x18, 0x39, 0x319, 0x0, 0x0, {0x3}, [@typed={0x4}]}, 0x18}}, 0x0) 08:01:54 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x18, 0x39, 0x319, 0x0, 0x0, {0x3}, [@typed={0x4}]}, 0x18}}, 0x0) 08:01:54 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x18, 0x39, 0x319, 0x0, 0x0, {0x3}, [@typed={0x4}]}, 0x18}}, 0x0) 08:01:54 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = io_uring_setup(0x45db, &(0x7f0000000540)) r2 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000240), 0x0) read(r2, &(0x7f0000000a40)=""/102400, 0x19000) close_range(r1, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) 08:01:54 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = dup(r0) fcntl$F_SET_FILE_RW_HINT(r2, 0x40e, &(0x7f0000000040)=0x4) write$UHID_INPUT(r2, 0x0, 0x0) 08:01:54 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x18, 0x39, 0x319, 0x0, 0x0, {0x3}, [@typed={0x4}]}, 0x18}}, 0x0) 08:01:54 executing program 2: unshare(0x48000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000a, 0x8031, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) r0 = socket$inet_sctp(0x2, 0x800000000001, 0x84) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r0, 0x2400001) accept(r0, 0x0, 0x0) listen(r0, 0x0) sendto$inet(r0, &(0x7f0000000000)="d2", 0x1, 0x5dc, &(0x7f0000a04000)={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) 08:01:54 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = dup(r0) fcntl$F_SET_FILE_RW_HINT(r2, 0x40e, &(0x7f0000000040)=0x4) write$UHID_INPUT(r2, 0x0, 0x0) 08:01:54 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = dup(r0) fcntl$F_SET_FILE_RW_HINT(r2, 0x40e, &(0x7f0000000040)=0x4) write$UHID_INPUT(r2, 0x0, 0x0) 08:01:54 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x18, 0x39, 0x319, 0x0, 0x0, {0x3}, [@typed={0x4}]}, 0x18}}, 0x0) 08:01:54 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = dup(r0) fcntl$F_SET_FILE_RW_HINT(r2, 0x40e, &(0x7f0000000040)=0x4) write$UHID_INPUT(r2, 0x0, 0x0) 08:01:54 executing program 5: unshare(0x48000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000a, 0x8031, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) r0 = socket$inet_sctp(0x2, 0x800000000001, 0x84) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r0, 0x2400001) accept(r0, 0x0, 0x0) listen(r0, 0x0) sendto$inet(r0, &(0x7f0000000000)="d2", 0x1, 0x5dc, &(0x7f0000a04000)={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) 08:01:55 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x18, 0x39, 0x319, 0x0, 0x0, {0x3}, [@typed={0x4}]}, 0x18}}, 0x0) 08:01:55 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = dup(r0) fcntl$F_SET_FILE_RW_HINT(r2, 0x40e, &(0x7f0000000040)=0x4) write$UHID_INPUT(r2, 0x0, 0x0) 08:01:55 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = dup(r0) fcntl$F_SET_FILE_RW_HINT(r2, 0x40e, &(0x7f0000000040)=0x4) write$UHID_INPUT(r2, 0x0, 0x0) 08:01:55 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = dup(r0) fcntl$F_SET_FILE_RW_HINT(r2, 0x40e, &(0x7f0000000040)=0x4) write$UHID_INPUT(r2, 0x0, 0x0) 08:01:55 executing program 3: unshare(0x48000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000a, 0x8031, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) r0 = socket$inet_sctp(0x2, 0x800000000001, 0x84) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r0, 0x2400001) accept(r0, 0x0, 0x0) listen(r0, 0x0) sendto$inet(r0, &(0x7f0000000000)="d2", 0x1, 0x5dc, &(0x7f0000a04000)={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) 08:01:55 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = dup(r0) fcntl$F_SET_FILE_RW_HINT(r2, 0x40e, &(0x7f0000000040)=0x4) write$UHID_INPUT(r2, 0x0, 0x0) 08:01:55 executing program 2: unshare(0x48000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000a, 0x8031, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) r0 = socket$inet_sctp(0x2, 0x800000000001, 0x84) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r0, 0x2400001) accept(r0, 0x0, 0x0) listen(r0, 0x0) sendto$inet(r0, &(0x7f0000000000)="d2", 0x1, 0x5dc, &(0x7f0000a04000)={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) 08:01:55 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = dup(r0) fcntl$F_SET_FILE_RW_HINT(r2, 0x40e, &(0x7f0000000040)=0x4) write$UHID_INPUT(r2, 0x0, 0x0) 08:01:55 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = dup(r0) fcntl$F_SET_FILE_RW_HINT(r2, 0x40e, &(0x7f0000000040)=0x4) write$UHID_INPUT(r2, 0x0, 0x0) 08:01:55 executing program 1: unshare(0x48000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000a, 0x8031, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) r0 = socket$inet_sctp(0x2, 0x800000000001, 0x84) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r0, 0x2400001) accept(r0, 0x0, 0x0) listen(r0, 0x0) sendto$inet(r0, &(0x7f0000000000)="d2", 0x1, 0x5dc, &(0x7f0000a04000)={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) 08:01:55 executing program 4: unshare(0x48000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000a, 0x8031, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) r0 = socket$inet_sctp(0x2, 0x800000000001, 0x84) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r0, 0x2400001) accept(r0, 0x0, 0x0) listen(r0, 0x0) sendto$inet(r0, &(0x7f0000000000)="d2", 0x1, 0x5dc, &(0x7f0000a04000)={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) 08:01:56 executing program 5: unshare(0x48000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000a, 0x8031, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) r0 = socket$inet_sctp(0x2, 0x800000000001, 0x84) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r0, 0x2400001) accept(r0, 0x0, 0x0) listen(r0, 0x0) sendto$inet(r0, &(0x7f0000000000)="d2", 0x1, 0x5dc, &(0x7f0000a04000)={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) 08:01:56 executing program 0: unshare(0x48000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000a, 0x8031, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) r0 = socket$inet_sctp(0x2, 0x800000000001, 0x84) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r0, 0x2400001) accept(r0, 0x0, 0x0) listen(r0, 0x0) sendto$inet(r0, &(0x7f0000000000)="d2", 0x1, 0x5dc, &(0x7f0000a04000)={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) 08:01:56 executing program 3: unshare(0x48000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000a, 0x8031, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) r0 = socket$inet_sctp(0x2, 0x800000000001, 0x84) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r0, 0x2400001) accept(r0, 0x0, 0x0) listen(r0, 0x0) sendto$inet(r0, &(0x7f0000000000)="d2", 0x1, 0x5dc, &(0x7f0000a04000)={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) 08:01:57 executing program 2: unshare(0x48000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000a, 0x8031, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) r0 = socket$inet_sctp(0x2, 0x800000000001, 0x84) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r0, 0x2400001) accept(r0, 0x0, 0x0) listen(r0, 0x0) sendto$inet(r0, &(0x7f0000000000)="d2", 0x1, 0x5dc, &(0x7f0000a04000)={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) 08:01:57 executing program 1: unshare(0x48000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000a, 0x8031, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) r0 = socket$inet_sctp(0x2, 0x800000000001, 0x84) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r0, 0x2400001) accept(r0, 0x0, 0x0) listen(r0, 0x0) sendto$inet(r0, &(0x7f0000000000)="d2", 0x1, 0x5dc, &(0x7f0000a04000)={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) 08:01:57 executing program 4: unshare(0x48000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000a, 0x8031, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) r0 = socket$inet_sctp(0x2, 0x800000000001, 0x84) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r0, 0x2400001) accept(r0, 0x0, 0x0) listen(r0, 0x0) sendto$inet(r0, &(0x7f0000000000)="d2", 0x1, 0x5dc, &(0x7f0000a04000)={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) 08:01:57 executing program 5: unshare(0x48000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000a, 0x8031, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) r0 = socket$inet_sctp(0x2, 0x800000000001, 0x84) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r0, 0x2400001) accept(r0, 0x0, 0x0) listen(r0, 0x0) sendto$inet(r0, &(0x7f0000000000)="d2", 0x1, 0x5dc, &(0x7f0000a04000)={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) 08:01:57 executing program 0: unshare(0x48000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000a, 0x8031, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) r0 = socket$inet_sctp(0x2, 0x800000000001, 0x84) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r0, 0x2400001) accept(r0, 0x0, 0x0) listen(r0, 0x0) sendto$inet(r0, &(0x7f0000000000)="d2", 0x1, 0x5dc, &(0x7f0000a04000)={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) 08:01:57 executing program 3: unshare(0x48000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000a, 0x8031, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) r0 = socket$inet_sctp(0x2, 0x800000000001, 0x84) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r0, 0x2400001) accept(r0, 0x0, 0x0) listen(r0, 0x0) sendto$inet(r0, &(0x7f0000000000)="d2", 0x1, 0x5dc, &(0x7f0000a04000)={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) 08:01:58 executing program 1: unshare(0x48000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000a, 0x8031, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) r0 = socket$inet_sctp(0x2, 0x800000000001, 0x84) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r0, 0x2400001) accept(r0, 0x0, 0x0) listen(r0, 0x0) sendto$inet(r0, &(0x7f0000000000)="d2", 0x1, 0x5dc, &(0x7f0000a04000)={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) 08:01:58 executing program 2: unshare(0x48000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000a, 0x8031, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) r0 = socket$inet_sctp(0x2, 0x800000000001, 0x84) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r0, 0x2400001) accept(r0, 0x0, 0x0) listen(r0, 0x0) sendto$inet(r0, &(0x7f0000000000)="d2", 0x1, 0x5dc, &(0x7f0000a04000)={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) 08:01:58 executing program 4: unshare(0x48000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000a, 0x8031, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) r0 = socket$inet_sctp(0x2, 0x800000000001, 0x84) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r0, 0x2400001) accept(r0, 0x0, 0x0) listen(r0, 0x0) sendto$inet(r0, &(0x7f0000000000)="d2", 0x1, 0x5dc, &(0x7f0000a04000)={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) 08:01:58 executing program 5: unshare(0x48000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000a, 0x8031, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) r0 = socket$inet_sctp(0x2, 0x800000000001, 0x84) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r0, 0x2400001) accept(r0, 0x0, 0x0) listen(r0, 0x0) sendto$inet(r0, &(0x7f0000000000)="d2", 0x1, 0x5dc, &(0x7f0000a04000)={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) 08:01:59 executing program 0: unshare(0x48000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000a, 0x8031, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) r0 = socket$inet_sctp(0x2, 0x800000000001, 0x84) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r0, 0x2400001) accept(r0, 0x0, 0x0) listen(r0, 0x0) sendto$inet(r0, &(0x7f0000000000)="d2", 0x1, 0x5dc, &(0x7f0000a04000)={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) 08:01:59 executing program 3: unshare(0x48000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000a, 0x8031, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) r0 = socket$inet_sctp(0x2, 0x800000000001, 0x84) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r0, 0x2400001) accept(r0, 0x0, 0x0) listen(r0, 0x0) sendto$inet(r0, &(0x7f0000000000)="d2", 0x1, 0x5dc, &(0x7f0000a04000)={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) 08:02:00 executing program 2: unshare(0x48000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000a, 0x8031, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) r0 = socket$inet_sctp(0x2, 0x800000000001, 0x84) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r0, 0x2400001) accept(r0, 0x0, 0x0) listen(r0, 0x0) sendto$inet(r0, &(0x7f0000000000)="d2", 0x1, 0x5dc, &(0x7f0000a04000)={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) 08:02:00 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = dup(r0) fcntl$F_SET_FILE_RW_HINT(r2, 0x40e, &(0x7f0000000040)=0x4) write$UHID_INPUT(r2, 0x0, 0x0) 08:02:00 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = dup(r0) fcntl$F_SET_FILE_RW_HINT(r2, 0x40e, &(0x7f0000000040)=0x4) write$UHID_INPUT(r2, 0x0, 0x0) 08:02:00 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = dup(r0) fcntl$F_SET_FILE_RW_HINT(r2, 0x40e, &(0x7f0000000040)=0x4) write$UHID_INPUT(r2, 0x0, 0x0) 08:02:00 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = dup(r0) fcntl$F_SET_FILE_RW_HINT(r2, 0x40e, &(0x7f0000000040)=0x4) write$UHID_INPUT(r2, 0x0, 0x0) 08:02:00 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = dup(r0) fcntl$F_SET_FILE_RW_HINT(r2, 0x40e, &(0x7f0000000040)=0x4) write$UHID_INPUT(r2, 0x0, 0x0) 08:02:00 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = dup(r0) fcntl$F_SET_FILE_RW_HINT(r2, 0x40e, &(0x7f0000000040)=0x4) write$UHID_INPUT(r2, 0x0, 0x0) 08:02:00 executing program 5: unshare(0x48000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000a, 0x8031, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) r0 = socket$inet_sctp(0x2, 0x800000000001, 0x84) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r0, 0x2400001) accept(r0, 0x0, 0x0) listen(r0, 0x0) sendto$inet(r0, &(0x7f0000000000)="d2", 0x1, 0x5dc, &(0x7f0000a04000)={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) 08:02:00 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = dup(r0) fcntl$F_SET_FILE_RW_HINT(r2, 0x40e, &(0x7f0000000040)=0x4) write$UHID_INPUT(r2, 0x0, 0x0) 08:02:00 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = dup(r0) fcntl$F_SET_FILE_RW_HINT(r2, 0x40e, &(0x7f0000000040)=0x4) write$UHID_INPUT(r2, 0x0, 0x0) 08:02:00 executing program 3: unshare(0x48000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000a, 0x8031, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) r0 = socket$inet_sctp(0x2, 0x800000000001, 0x84) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r0, 0x2400001) accept(r0, 0x0, 0x0) listen(r0, 0x0) sendto$inet(r0, &(0x7f0000000000)="d2", 0x1, 0x5dc, &(0x7f0000a04000)={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) 08:02:00 executing program 4: mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), 0x0) keyctl$get_persistent(0x5, 0x0, 0x0) keyctl$get_persistent(0x5, 0x0, 0x0) socket(0x10, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000300)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000980)="57595a4b414c4c45522020085ac19f69b8f2b2b1ea1b8a0ac9135eed1df1d1001cc2de850f1fffb2aed768634ef7e75effac2ac4c15e29fb3c18fafff8d198e312475ffa1d000000000000ad25822a17b17f463e104179c19c2ad2fbddc0777df2ec4f62826086704ddf95b43fcba468b720660208bb69031e12558284228bf73e037e2880b514a6b8a57f41fb86c26defeaf7e7230987f8ec610694e89ad37c804b9e46226ca6b9956a74a7d9ecf9be8f7ffba2f21b2dd0702c79aba387ec543ef51ffc665e7e849dba", 0xca, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f00000002c0)={[{@shortname_lower}]}) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) [ 129.509653][T10393] loop4: detected capacity change from 0 to 270 08:02:01 executing program 2: unshare(0x48000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000a, 0x8031, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) r0 = socket$inet_sctp(0x2, 0x800000000001, 0x84) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r0, 0x2400001) accept(r0, 0x0, 0x0) listen(r0, 0x0) sendto$inet(r0, &(0x7f0000000000)="d2", 0x1, 0x5dc, &(0x7f0000a04000)={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) 08:02:01 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, 0x0) 08:02:01 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = dup(r0) fcntl$F_SET_FILE_RW_HINT(r2, 0x40e, &(0x7f0000000040)=0x4) write$UHID_INPUT(r2, 0x0, 0x0) 08:02:01 executing program 4: mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), 0x0) keyctl$get_persistent(0x5, 0x0, 0x0) keyctl$get_persistent(0x5, 0x0, 0x0) socket(0x10, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000300)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000980)="57595a4b414c4c45522020085ac19f69b8f2b2b1ea1b8a0ac9135eed1df1d1001cc2de850f1fffb2aed768634ef7e75effac2ac4c15e29fb3c18fafff8d198e312475ffa1d000000000000ad25822a17b17f463e104179c19c2ad2fbddc0777df2ec4f62826086704ddf95b43fcba468b720660208bb69031e12558284228bf73e037e2880b514a6b8a57f41fb86c26defeaf7e7230987f8ec610694e89ad37c804b9e46226ca6b9956a74a7d9ecf9be8f7ffba2f21b2dd0702c79aba387ec543ef51ffc665e7e849dba", 0xca, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f00000002c0)={[{@shortname_lower}]}) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) [ 130.069741][T10439] loop4: detected capacity change from 0 to 270 08:02:01 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, 0x0) 08:02:01 executing program 0: mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), 0x0) keyctl$get_persistent(0x5, 0x0, 0x0) keyctl$get_persistent(0x5, 0x0, 0x0) socket(0x10, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000300)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000980)="57595a4b414c4c45522020085ac19f69b8f2b2b1ea1b8a0ac9135eed1df1d1001cc2de850f1fffb2aed768634ef7e75effac2ac4c15e29fb3c18fafff8d198e312475ffa1d000000000000ad25822a17b17f463e104179c19c2ad2fbddc0777df2ec4f62826086704ddf95b43fcba468b720660208bb69031e12558284228bf73e037e2880b514a6b8a57f41fb86c26defeaf7e7230987f8ec610694e89ad37c804b9e46226ca6b9956a74a7d9ecf9be8f7ffba2f21b2dd0702c79aba387ec543ef51ffc665e7e849dba", 0xca, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f00000002c0)={[{@shortname_lower}]}) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) 08:02:01 executing program 4: mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), 0x0) keyctl$get_persistent(0x5, 0x0, 0x0) keyctl$get_persistent(0x5, 0x0, 0x0) socket(0x10, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000300)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000980)="57595a4b414c4c45522020085ac19f69b8f2b2b1ea1b8a0ac9135eed1df1d1001cc2de850f1fffb2aed768634ef7e75effac2ac4c15e29fb3c18fafff8d198e312475ffa1d000000000000ad25822a17b17f463e104179c19c2ad2fbddc0777df2ec4f62826086704ddf95b43fcba468b720660208bb69031e12558284228bf73e037e2880b514a6b8a57f41fb86c26defeaf7e7230987f8ec610694e89ad37c804b9e46226ca6b9956a74a7d9ecf9be8f7ffba2f21b2dd0702c79aba387ec543ef51ffc665e7e849dba", 0xca, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f00000002c0)={[{@shortname_lower}]}) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) [ 130.320936][T10449] loop0: detected capacity change from 0 to 270 [ 130.356651][T10470] loop4: detected capacity change from 0 to 270 08:02:01 executing program 5: unshare(0x48000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000a, 0x8031, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) r0 = socket$inet_sctp(0x2, 0x800000000001, 0x84) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r0, 0x2400001) accept(r0, 0x0, 0x0) listen(r0, 0x0) sendto$inet(r0, &(0x7f0000000000)="d2", 0x1, 0x5dc, &(0x7f0000a04000)={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) 08:02:01 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, 0x0) 08:02:01 executing program 0: mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), 0x0) keyctl$get_persistent(0x5, 0x0, 0x0) keyctl$get_persistent(0x5, 0x0, 0x0) socket(0x10, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000300)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000980)="57595a4b414c4c45522020085ac19f69b8f2b2b1ea1b8a0ac9135eed1df1d1001cc2de850f1fffb2aed768634ef7e75effac2ac4c15e29fb3c18fafff8d198e312475ffa1d000000000000ad25822a17b17f463e104179c19c2ad2fbddc0777df2ec4f62826086704ddf95b43fcba468b720660208bb69031e12558284228bf73e037e2880b514a6b8a57f41fb86c26defeaf7e7230987f8ec610694e89ad37c804b9e46226ca6b9956a74a7d9ecf9be8f7ffba2f21b2dd0702c79aba387ec543ef51ffc665e7e849dba", 0xca, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f00000002c0)={[{@shortname_lower}]}) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) 08:02:01 executing program 3: unshare(0x48000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000a, 0x8031, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) r0 = socket$inet_sctp(0x2, 0x800000000001, 0x84) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r0, 0x2400001) accept(r0, 0x0, 0x0) listen(r0, 0x0) sendto$inet(r0, &(0x7f0000000000)="d2", 0x1, 0x5dc, &(0x7f0000a04000)={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) 08:02:01 executing program 4: mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), 0x0) keyctl$get_persistent(0x5, 0x0, 0x0) keyctl$get_persistent(0x5, 0x0, 0x0) socket(0x10, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000300)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000980)="57595a4b414c4c45522020085ac19f69b8f2b2b1ea1b8a0ac9135eed1df1d1001cc2de850f1fffb2aed768634ef7e75effac2ac4c15e29fb3c18fafff8d198e312475ffa1d000000000000ad25822a17b17f463e104179c19c2ad2fbddc0777df2ec4f62826086704ddf95b43fcba468b720660208bb69031e12558284228bf73e037e2880b514a6b8a57f41fb86c26defeaf7e7230987f8ec610694e89ad37c804b9e46226ca6b9956a74a7d9ecf9be8f7ffba2f21b2dd0702c79aba387ec543ef51ffc665e7e849dba", 0xca, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f00000002c0)={[{@shortname_lower}]}) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) [ 130.720954][T10497] loop0: detected capacity change from 0 to 270 [ 130.753299][T10500] loop4: detected capacity change from 0 to 270 08:02:02 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, 0x0) 08:02:02 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, 0x0) 08:02:02 executing program 0: mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), 0x0) keyctl$get_persistent(0x5, 0x0, 0x0) keyctl$get_persistent(0x5, 0x0, 0x0) socket(0x10, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000300)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000980)="57595a4b414c4c45522020085ac19f69b8f2b2b1ea1b8a0ac9135eed1df1d1001cc2de850f1fffb2aed768634ef7e75effac2ac4c15e29fb3c18fafff8d198e312475ffa1d000000000000ad25822a17b17f463e104179c19c2ad2fbddc0777df2ec4f62826086704ddf95b43fcba468b720660208bb69031e12558284228bf73e037e2880b514a6b8a57f41fb86c26defeaf7e7230987f8ec610694e89ad37c804b9e46226ca6b9956a74a7d9ecf9be8f7ffba2f21b2dd0702c79aba387ec543ef51ffc665e7e849dba", 0xca, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f00000002c0)={[{@shortname_lower}]}) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) 08:02:02 executing program 2: mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), 0x0) keyctl$get_persistent(0x5, 0x0, 0x0) keyctl$get_persistent(0x5, 0x0, 0x0) socket(0x10, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000300)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000980)="57595a4b414c4c45522020085ac19f69b8f2b2b1ea1b8a0ac9135eed1df1d1001cc2de850f1fffb2aed768634ef7e75effac2ac4c15e29fb3c18fafff8d198e312475ffa1d000000000000ad25822a17b17f463e104179c19c2ad2fbddc0777df2ec4f62826086704ddf95b43fcba468b720660208bb69031e12558284228bf73e037e2880b514a6b8a57f41fb86c26defeaf7e7230987f8ec610694e89ad37c804b9e46226ca6b9956a74a7d9ecf9be8f7ffba2f21b2dd0702c79aba387ec543ef51ffc665e7e849dba", 0xca, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f00000002c0)={[{@shortname_lower}]}) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) 08:02:02 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, 0x0) 08:02:02 executing program 1: mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), 0x0) keyctl$get_persistent(0x5, 0x0, 0x0) keyctl$get_persistent(0x5, 0x0, 0x0) socket(0x10, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000300)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000980)="57595a4b414c4c45522020085ac19f69b8f2b2b1ea1b8a0ac9135eed1df1d1001cc2de850f1fffb2aed768634ef7e75effac2ac4c15e29fb3c18fafff8d198e312475ffa1d000000000000ad25822a17b17f463e104179c19c2ad2fbddc0777df2ec4f62826086704ddf95b43fcba468b720660208bb69031e12558284228bf73e037e2880b514a6b8a57f41fb86c26defeaf7e7230987f8ec610694e89ad37c804b9e46226ca6b9956a74a7d9ecf9be8f7ffba2f21b2dd0702c79aba387ec543ef51ffc665e7e849dba", 0xca, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f00000002c0)={[{@shortname_lower}]}) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) [ 131.291432][T10563] loop2: detected capacity change from 0 to 270 [ 131.311205][T10566] loop0: detected capacity change from 0 to 270 08:02:02 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, 0x0) [ 131.482015][T10576] loop1: detected capacity change from 0 to 270 08:02:02 executing program 0: mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), 0x0) keyctl$get_persistent(0x5, 0x0, 0x0) keyctl$get_persistent(0x5, 0x0, 0x0) socket(0x10, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000300)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000980)="57595a4b414c4c45522020085ac19f69b8f2b2b1ea1b8a0ac9135eed1df1d1001cc2de850f1fffb2aed768634ef7e75effac2ac4c15e29fb3c18fafff8d198e312475ffa1d000000000000ad25822a17b17f463e104179c19c2ad2fbddc0777df2ec4f62826086704ddf95b43fcba468b720660208bb69031e12558284228bf73e037e2880b514a6b8a57f41fb86c26defeaf7e7230987f8ec610694e89ad37c804b9e46226ca6b9956a74a7d9ecf9be8f7ffba2f21b2dd0702c79aba387ec543ef51ffc665e7e849dba", 0xca, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f00000002c0)={[{@shortname_lower}]}) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) 08:02:02 executing program 2: mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), 0x0) keyctl$get_persistent(0x5, 0x0, 0x0) keyctl$get_persistent(0x5, 0x0, 0x0) socket(0x10, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000300)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000980)="57595a4b414c4c45522020085ac19f69b8f2b2b1ea1b8a0ac9135eed1df1d1001cc2de850f1fffb2aed768634ef7e75effac2ac4c15e29fb3c18fafff8d198e312475ffa1d000000000000ad25822a17b17f463e104179c19c2ad2fbddc0777df2ec4f62826086704ddf95b43fcba468b720660208bb69031e12558284228bf73e037e2880b514a6b8a57f41fb86c26defeaf7e7230987f8ec610694e89ad37c804b9e46226ca6b9956a74a7d9ecf9be8f7ffba2f21b2dd0702c79aba387ec543ef51ffc665e7e849dba", 0xca, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f00000002c0)={[{@shortname_lower}]}) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) 08:02:02 executing program 4: mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), 0x0) keyctl$get_persistent(0x5, 0x0, 0x0) keyctl$get_persistent(0x5, 0x0, 0x0) socket(0x10, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000300)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000980)="57595a4b414c4c45522020085ac19f69b8f2b2b1ea1b8a0ac9135eed1df1d1001cc2de850f1fffb2aed768634ef7e75effac2ac4c15e29fb3c18fafff8d198e312475ffa1d000000000000ad25822a17b17f463e104179c19c2ad2fbddc0777df2ec4f62826086704ddf95b43fcba468b720660208bb69031e12558284228bf73e037e2880b514a6b8a57f41fb86c26defeaf7e7230987f8ec610694e89ad37c804b9e46226ca6b9956a74a7d9ecf9be8f7ffba2f21b2dd0702c79aba387ec543ef51ffc665e7e849dba", 0xca, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f00000002c0)={[{@shortname_lower}]}) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) [ 131.855204][T10593] loop2: detected capacity change from 0 to 270 [ 131.890238][T10595] loop4: detected capacity change from 0 to 270 08:02:03 executing program 5: mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), 0x0) keyctl$get_persistent(0x5, 0x0, 0x0) keyctl$get_persistent(0x5, 0x0, 0x0) socket(0x10, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000300)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000980)="57595a4b414c4c45522020085ac19f69b8f2b2b1ea1b8a0ac9135eed1df1d1001cc2de850f1fffb2aed768634ef7e75effac2ac4c15e29fb3c18fafff8d198e312475ffa1d000000000000ad25822a17b17f463e104179c19c2ad2fbddc0777df2ec4f62826086704ddf95b43fcba468b720660208bb69031e12558284228bf73e037e2880b514a6b8a57f41fb86c26defeaf7e7230987f8ec610694e89ad37c804b9e46226ca6b9956a74a7d9ecf9be8f7ffba2f21b2dd0702c79aba387ec543ef51ffc665e7e849dba", 0xca, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f00000002c0)={[{@shortname_lower}]}) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) 08:02:03 executing program 1: mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), 0x0) keyctl$get_persistent(0x5, 0x0, 0x0) keyctl$get_persistent(0x5, 0x0, 0x0) socket(0x10, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000300)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000980)="57595a4b414c4c45522020085ac19f69b8f2b2b1ea1b8a0ac9135eed1df1d1001cc2de850f1fffb2aed768634ef7e75effac2ac4c15e29fb3c18fafff8d198e312475ffa1d000000000000ad25822a17b17f463e104179c19c2ad2fbddc0777df2ec4f62826086704ddf95b43fcba468b720660208bb69031e12558284228bf73e037e2880b514a6b8a57f41fb86c26defeaf7e7230987f8ec610694e89ad37c804b9e46226ca6b9956a74a7d9ecf9be8f7ffba2f21b2dd0702c79aba387ec543ef51ffc665e7e849dba", 0xca, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f00000002c0)={[{@shortname_lower}]}) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) [ 131.908937][T10594] loop0: detected capacity change from 0 to 270 08:02:03 executing program 3: mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), 0x0) keyctl$get_persistent(0x5, 0x0, 0x0) keyctl$get_persistent(0x5, 0x0, 0x0) socket(0x10, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000300)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000980)="57595a4b414c4c45522020085ac19f69b8f2b2b1ea1b8a0ac9135eed1df1d1001cc2de850f1fffb2aed768634ef7e75effac2ac4c15e29fb3c18fafff8d198e312475ffa1d000000000000ad25822a17b17f463e104179c19c2ad2fbddc0777df2ec4f62826086704ddf95b43fcba468b720660208bb69031e12558284228bf73e037e2880b514a6b8a57f41fb86c26defeaf7e7230987f8ec610694e89ad37c804b9e46226ca6b9956a74a7d9ecf9be8f7ffba2f21b2dd0702c79aba387ec543ef51ffc665e7e849dba", 0xca, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f00000002c0)={[{@shortname_lower}]}) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) 08:02:03 executing program 2: mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), 0x0) keyctl$get_persistent(0x5, 0x0, 0x0) keyctl$get_persistent(0x5, 0x0, 0x0) socket(0x10, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000300)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000980)="57595a4b414c4c45522020085ac19f69b8f2b2b1ea1b8a0ac9135eed1df1d1001cc2de850f1fffb2aed768634ef7e75effac2ac4c15e29fb3c18fafff8d198e312475ffa1d000000000000ad25822a17b17f463e104179c19c2ad2fbddc0777df2ec4f62826086704ddf95b43fcba468b720660208bb69031e12558284228bf73e037e2880b514a6b8a57f41fb86c26defeaf7e7230987f8ec610694e89ad37c804b9e46226ca6b9956a74a7d9ecf9be8f7ffba2f21b2dd0702c79aba387ec543ef51ffc665e7e849dba", 0xca, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f00000002c0)={[{@shortname_lower}]}) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) [ 132.028653][T10610] loop1: detected capacity change from 0 to 270 08:02:03 executing program 0: mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), 0x0) keyctl$get_persistent(0x5, 0x0, 0x0) keyctl$get_persistent(0x5, 0x0, 0x0) socket(0x10, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000300)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000980)="57595a4b414c4c45522020085ac19f69b8f2b2b1ea1b8a0ac9135eed1df1d1001cc2de850f1fffb2aed768634ef7e75effac2ac4c15e29fb3c18fafff8d198e312475ffa1d000000000000ad25822a17b17f463e104179c19c2ad2fbddc0777df2ec4f62826086704ddf95b43fcba468b720660208bb69031e12558284228bf73e037e2880b514a6b8a57f41fb86c26defeaf7e7230987f8ec610694e89ad37c804b9e46226ca6b9956a74a7d9ecf9be8f7ffba2f21b2dd0702c79aba387ec543ef51ffc665e7e849dba", 0xca, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f00000002c0)={[{@shortname_lower}]}) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) 08:02:03 executing program 4: mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), 0x0) keyctl$get_persistent(0x5, 0x0, 0x0) keyctl$get_persistent(0x5, 0x0, 0x0) socket(0x10, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000300)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000980)="57595a4b414c4c45522020085ac19f69b8f2b2b1ea1b8a0ac9135eed1df1d1001cc2de850f1fffb2aed768634ef7e75effac2ac4c15e29fb3c18fafff8d198e312475ffa1d000000000000ad25822a17b17f463e104179c19c2ad2fbddc0777df2ec4f62826086704ddf95b43fcba468b720660208bb69031e12558284228bf73e037e2880b514a6b8a57f41fb86c26defeaf7e7230987f8ec610694e89ad37c804b9e46226ca6b9956a74a7d9ecf9be8f7ffba2f21b2dd0702c79aba387ec543ef51ffc665e7e849dba", 0xca, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f00000002c0)={[{@shortname_lower}]}) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) [ 132.087532][T10617] loop5: detected capacity change from 0 to 270 [ 132.162862][T10619] loop3: detected capacity change from 0 to 270 08:02:03 executing program 1: mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), 0x0) keyctl$get_persistent(0x5, 0x0, 0x0) keyctl$get_persistent(0x5, 0x0, 0x0) socket(0x10, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000300)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000980)="57595a4b414c4c45522020085ac19f69b8f2b2b1ea1b8a0ac9135eed1df1d1001cc2de850f1fffb2aed768634ef7e75effac2ac4c15e29fb3c18fafff8d198e312475ffa1d000000000000ad25822a17b17f463e104179c19c2ad2fbddc0777df2ec4f62826086704ddf95b43fcba468b720660208bb69031e12558284228bf73e037e2880b514a6b8a57f41fb86c26defeaf7e7230987f8ec610694e89ad37c804b9e46226ca6b9956a74a7d9ecf9be8f7ffba2f21b2dd0702c79aba387ec543ef51ffc665e7e849dba", 0xca, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f00000002c0)={[{@shortname_lower}]}) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) 08:02:03 executing program 5: mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), 0x0) keyctl$get_persistent(0x5, 0x0, 0x0) keyctl$get_persistent(0x5, 0x0, 0x0) socket(0x10, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000300)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000980)="57595a4b414c4c45522020085ac19f69b8f2b2b1ea1b8a0ac9135eed1df1d1001cc2de850f1fffb2aed768634ef7e75effac2ac4c15e29fb3c18fafff8d198e312475ffa1d000000000000ad25822a17b17f463e104179c19c2ad2fbddc0777df2ec4f62826086704ddf95b43fcba468b720660208bb69031e12558284228bf73e037e2880b514a6b8a57f41fb86c26defeaf7e7230987f8ec610694e89ad37c804b9e46226ca6b9956a74a7d9ecf9be8f7ffba2f21b2dd0702c79aba387ec543ef51ffc665e7e849dba", 0xca, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f00000002c0)={[{@shortname_lower}]}) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) [ 132.257502][T10633] loop2: detected capacity change from 0 to 270 [ 132.314311][T10641] loop4: detected capacity change from 0 to 270 [ 132.355197][T10643] loop0: detected capacity change from 0 to 270 08:02:03 executing program 3: mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), 0x0) keyctl$get_persistent(0x5, 0x0, 0x0) keyctl$get_persistent(0x5, 0x0, 0x0) socket(0x10, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000300)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000980)="57595a4b414c4c45522020085ac19f69b8f2b2b1ea1b8a0ac9135eed1df1d1001cc2de850f1fffb2aed768634ef7e75effac2ac4c15e29fb3c18fafff8d198e312475ffa1d000000000000ad25822a17b17f463e104179c19c2ad2fbddc0777df2ec4f62826086704ddf95b43fcba468b720660208bb69031e12558284228bf73e037e2880b514a6b8a57f41fb86c26defeaf7e7230987f8ec610694e89ad37c804b9e46226ca6b9956a74a7d9ecf9be8f7ffba2f21b2dd0702c79aba387ec543ef51ffc665e7e849dba", 0xca, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f00000002c0)={[{@shortname_lower}]}) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) 08:02:03 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0x15, 0x5, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(r2, 0x114, 0x2715, 0x0, 0x552000) 08:02:03 executing program 0: mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), 0x0) keyctl$get_persistent(0x5, 0x0, 0x0) keyctl$get_persistent(0x5, 0x0, 0x0) socket(0x10, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000300)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000980)="57595a4b414c4c45522020085ac19f69b8f2b2b1ea1b8a0ac9135eed1df1d1001cc2de850f1fffb2aed768634ef7e75effac2ac4c15e29fb3c18fafff8d198e312475ffa1d000000000000ad25822a17b17f463e104179c19c2ad2fbddc0777df2ec4f62826086704ddf95b43fcba468b720660208bb69031e12558284228bf73e037e2880b514a6b8a57f41fb86c26defeaf7e7230987f8ec610694e89ad37c804b9e46226ca6b9956a74a7d9ecf9be8f7ffba2f21b2dd0702c79aba387ec543ef51ffc665e7e849dba", 0xca, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f00000002c0)={[{@shortname_lower}]}) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) [ 132.517930][ T1374] ieee802154 phy0 wpan0: encryption failed: -22 [ 132.524454][ T1374] ieee802154 phy1 wpan1: encryption failed: -22 [ 132.549593][T10662] loop5: detected capacity change from 0 to 270 08:02:03 executing program 4: mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), 0x0) keyctl$get_persistent(0x5, 0x0, 0x0) keyctl$get_persistent(0x5, 0x0, 0x0) socket(0x10, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000300)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000980)="57595a4b414c4c45522020085ac19f69b8f2b2b1ea1b8a0ac9135eed1df1d1001cc2de850f1fffb2aed768634ef7e75effac2ac4c15e29fb3c18fafff8d198e312475ffa1d000000000000ad25822a17b17f463e104179c19c2ad2fbddc0777df2ec4f62826086704ddf95b43fcba468b720660208bb69031e12558284228bf73e037e2880b514a6b8a57f41fb86c26defeaf7e7230987f8ec610694e89ad37c804b9e46226ca6b9956a74a7d9ecf9be8f7ffba2f21b2dd0702c79aba387ec543ef51ffc665e7e849dba", 0xca, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f00000002c0)={[{@shortname_lower}]}) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) [ 132.596428][T10669] loop1: detected capacity change from 0 to 270 [ 132.672804][T10671] loop3: detected capacity change from 0 to 270 08:02:03 executing program 5: mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), 0x0) keyctl$get_persistent(0x5, 0x0, 0x0) keyctl$get_persistent(0x5, 0x0, 0x0) socket(0x10, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000300)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000980)="57595a4b414c4c45522020085ac19f69b8f2b2b1ea1b8a0ac9135eed1df1d1001cc2de850f1fffb2aed768634ef7e75effac2ac4c15e29fb3c18fafff8d198e312475ffa1d000000000000ad25822a17b17f463e104179c19c2ad2fbddc0777df2ec4f62826086704ddf95b43fcba468b720660208bb69031e12558284228bf73e037e2880b514a6b8a57f41fb86c26defeaf7e7230987f8ec610694e89ad37c804b9e46226ca6b9956a74a7d9ecf9be8f7ffba2f21b2dd0702c79aba387ec543ef51ffc665e7e849dba", 0xca, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f00000002c0)={[{@shortname_lower}]}) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) 08:02:03 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0x15, 0x5, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(r2, 0x114, 0x2715, 0x0, 0x552000) 08:02:04 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0x15, 0x5, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(r2, 0x114, 0x2715, 0x0, 0x552000) [ 132.801082][T10683] loop0: detected capacity change from 0 to 270 08:02:04 executing program 3: mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), 0x0) keyctl$get_persistent(0x5, 0x0, 0x0) keyctl$get_persistent(0x5, 0x0, 0x0) socket(0x10, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000300)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000980)="57595a4b414c4c45522020085ac19f69b8f2b2b1ea1b8a0ac9135eed1df1d1001cc2de850f1fffb2aed768634ef7e75effac2ac4c15e29fb3c18fafff8d198e312475ffa1d000000000000ad25822a17b17f463e104179c19c2ad2fbddc0777df2ec4f62826086704ddf95b43fcba468b720660208bb69031e12558284228bf73e037e2880b514a6b8a57f41fb86c26defeaf7e7230987f8ec610694e89ad37c804b9e46226ca6b9956a74a7d9ecf9be8f7ffba2f21b2dd0702c79aba387ec543ef51ffc665e7e849dba", 0xca, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f00000002c0)={[{@shortname_lower}]}) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) 08:02:04 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0x15, 0x5, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(r2, 0x114, 0x2715, 0x0, 0x552000) [ 132.912735][T10693] loop4: detected capacity change from 0 to 270 [ 132.942176][T10706] loop5: detected capacity change from 0 to 270 08:02:04 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0x15, 0x5, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(r2, 0x114, 0x2715, 0x0, 0x552000) 08:02:04 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0x15, 0x5, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(r2, 0x114, 0x2715, 0x0, 0x552000) 08:02:04 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0x15, 0x5, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(r2, 0x114, 0x2715, 0x0, 0x552000) 08:02:04 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000006c0)=@setlink={0x28, 0x12, 0x1, 0x0, 0x0, {}, [@IFLA_TARGET_NETNSID={0x8, 0x2e, 0x81000000}]}, 0x28}}, 0x0) 08:02:04 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0x15, 0x5, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(r2, 0x114, 0x2715, 0x0, 0x552000) [ 133.136727][T10718] loop3: detected capacity change from 0 to 270 08:02:04 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0x15, 0x5, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(r2, 0x114, 0x2715, 0x0, 0x552000) 08:02:04 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0x15, 0x5, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(r2, 0x114, 0x2715, 0x0, 0x552000) 08:02:04 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000006c0)=@setlink={0x28, 0x12, 0x1, 0x0, 0x0, {}, [@IFLA_TARGET_NETNSID={0x8, 0x2e, 0x81000000}]}, 0x28}}, 0x0) 08:02:04 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000001380), 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000001640)={&(0x7f00000016c0)=ANY=[@ANYBLOB="83000000fedbdf250000000000000000000000002dc6942e71ccf4d91155db74cf3b59b496b3ae5c57131270866c27cc4ca1e2a2a3443053b12c916ec561d6fa65fee2222156b9f5ffb8d68ed393a1d7cf8087cef2a75ccfd57755c913"], 0x14}, 0x1, 0x0, 0x0, 0x400c011}, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000280), 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x1) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000003c0)=@newtaction={0xe98, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe84, 0x1, [@m_pedit={0xe80, 0x1, 0x0, 0x0, {{0xa}, {0xe54, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe50, 0x2, {{{}, 0x97, 0x0, [{}, {}]}, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x400}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}], [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x4}, {0x2}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe98}}, 0x0) 08:02:04 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0x15, 0x5, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(r2, 0x114, 0x2715, 0x0, 0x552000) 08:02:04 executing program 2: open(&(0x7f0000000200)='./file0\x00', 0x41, 0x0) lsetxattr$trusted_overlay_opaque(&(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000180)=@getlink={0x28, 0x12, 0x1, 0x0, 0x0, {}, [@IFLA_NET_NS_FD={0x8}]}, 0x28}}, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$nl_route(r0, 0x0, 0xc0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='oom_adj\x00') perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43}, 0x0, 0x0, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000140)={0x20080522}, &(0x7f0000000180)) capset(0x0, 0x0) sendfile(r1, r1, 0x0, 0x7ffff003) mount$9p_fd(0xfeffff, 0x0, &(0x7f0000000100), 0x0, 0x0) 08:02:04 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0x15, 0x5, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(r2, 0x114, 0x2715, 0x0, 0x552000) 08:02:04 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) sendmsg$NL80211_CMD_DISASSOCIATE(r0, &(0x7f0000000480)={0x0, 0x89803f00, &(0x7f0000000340)={&(0x7f0000000400)={0x14, r1, 0x1, 0x0, 0x0, {{0x7e}, {@void, @void}}}, 0x14}}, 0x0) 08:02:04 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000006c0)=@setlink={0x28, 0x12, 0x1, 0x0, 0x0, {}, [@IFLA_TARGET_NETNSID={0x8, 0x2e, 0x81000000}]}, 0x28}}, 0x0) 08:02:04 executing program 2: open(&(0x7f0000000200)='./file0\x00', 0x41, 0x0) lsetxattr$trusted_overlay_opaque(&(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000180)=@getlink={0x28, 0x12, 0x1, 0x0, 0x0, {}, [@IFLA_NET_NS_FD={0x8}]}, 0x28}}, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$nl_route(r0, 0x0, 0xc0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='oom_adj\x00') perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43}, 0x0, 0x0, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000140)={0x20080522}, &(0x7f0000000180)) capset(0x0, 0x0) sendfile(r1, r1, 0x0, 0x7ffff003) mount$9p_fd(0xfeffff, 0x0, &(0x7f0000000100), 0x0, 0x0) 08:02:04 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0x15, 0x5, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(r2, 0x114, 0x2715, 0x0, 0x552000) 08:02:04 executing program 0: open(&(0x7f0000000200)='./file0\x00', 0x41, 0x0) lsetxattr$trusted_overlay_opaque(&(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000180)=@getlink={0x28, 0x12, 0x1, 0x0, 0x0, {}, [@IFLA_NET_NS_FD={0x8}]}, 0x28}}, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$nl_route(r0, 0x0, 0xc0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='oom_adj\x00') perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43}, 0x0, 0x0, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000140)={0x20080522}, &(0x7f0000000180)) capset(0x0, 0x0) sendfile(r1, r1, 0x0, 0x7ffff003) mount$9p_fd(0xfeffff, 0x0, &(0x7f0000000100), 0x0, 0x0) 08:02:04 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000001380), 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000001640)={&(0x7f00000016c0)=ANY=[@ANYBLOB="83000000fedbdf250000000000000000000000002dc6942e71ccf4d91155db74cf3b59b496b3ae5c57131270866c27cc4ca1e2a2a3443053b12c916ec561d6fa65fee2222156b9f5ffb8d68ed393a1d7cf8087cef2a75ccfd57755c913"], 0x14}, 0x1, 0x0, 0x0, 0x400c011}, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000280), 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x1) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000003c0)=@newtaction={0xe98, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe84, 0x1, [@m_pedit={0xe80, 0x1, 0x0, 0x0, {{0xa}, {0xe54, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe50, 0x2, {{{}, 0x97, 0x0, [{}, {}]}, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x400}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}], [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x4}, {0x2}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe98}}, 0x0) [ 133.629212][T10757] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 08:02:04 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000006c0)=@setlink={0x28, 0x12, 0x1, 0x0, 0x0, {}, [@IFLA_TARGET_NETNSID={0x8, 0x2e, 0x81000000}]}, 0x28}}, 0x0) [ 133.690846][T10757] platform regulatory.0: Falling back to sysfs fallback for: regulatory.db 08:02:04 executing program 2: open(&(0x7f0000000200)='./file0\x00', 0x41, 0x0) lsetxattr$trusted_overlay_opaque(&(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000180)=@getlink={0x28, 0x12, 0x1, 0x0, 0x0, {}, [@IFLA_NET_NS_FD={0x8}]}, 0x28}}, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$nl_route(r0, 0x0, 0xc0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='oom_adj\x00') perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43}, 0x0, 0x0, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000140)={0x20080522}, &(0x7f0000000180)) capset(0x0, 0x0) sendfile(r1, r1, 0x0, 0x7ffff003) mount$9p_fd(0xfeffff, 0x0, &(0x7f0000000100), 0x0, 0x0) 08:02:04 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000001380), 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000001640)={&(0x7f00000016c0)=ANY=[@ANYBLOB="83000000fedbdf250000000000000000000000002dc6942e71ccf4d91155db74cf3b59b496b3ae5c57131270866c27cc4ca1e2a2a3443053b12c916ec561d6fa65fee2222156b9f5ffb8d68ed393a1d7cf8087cef2a75ccfd57755c913"], 0x14}, 0x1, 0x0, 0x0, 0x400c011}, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000280), 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x1) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000003c0)=@newtaction={0xe98, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe84, 0x1, [@m_pedit={0xe80, 0x1, 0x0, 0x0, {{0xa}, {0xe54, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe50, 0x2, {{{}, 0x97, 0x0, [{}, {}]}, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x400}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}], [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x4}, {0x2}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe98}}, 0x0) 08:02:05 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000001380), 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000001640)={&(0x7f00000016c0)=ANY=[@ANYBLOB="83000000fedbdf250000000000000000000000002dc6942e71ccf4d91155db74cf3b59b496b3ae5c57131270866c27cc4ca1e2a2a3443053b12c916ec561d6fa65fee2222156b9f5ffb8d68ed393a1d7cf8087cef2a75ccfd57755c913"], 0x14}, 0x1, 0x0, 0x0, 0x400c011}, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000280), 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x1) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000003c0)=@newtaction={0xe98, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe84, 0x1, [@m_pedit={0xe80, 0x1, 0x0, 0x0, {{0xa}, {0xe54, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe50, 0x2, {{{}, 0x97, 0x0, [{}, {}]}, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x400}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}], [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x4}, {0x2}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe98}}, 0x0) 08:02:05 executing program 0: open(&(0x7f0000000200)='./file0\x00', 0x41, 0x0) lsetxattr$trusted_overlay_opaque(&(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000180)=@getlink={0x28, 0x12, 0x1, 0x0, 0x0, {}, [@IFLA_NET_NS_FD={0x8}]}, 0x28}}, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$nl_route(r0, 0x0, 0xc0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='oom_adj\x00') perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43}, 0x0, 0x0, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000140)={0x20080522}, &(0x7f0000000180)) capset(0x0, 0x0) sendfile(r1, r1, 0x0, 0x7ffff003) mount$9p_fd(0xfeffff, 0x0, &(0x7f0000000100), 0x0, 0x0) 08:02:05 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000001380), 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000001640)={&(0x7f00000016c0)=ANY=[@ANYBLOB="83000000fedbdf250000000000000000000000002dc6942e71ccf4d91155db74cf3b59b496b3ae5c57131270866c27cc4ca1e2a2a3443053b12c916ec561d6fa65fee2222156b9f5ffb8d68ed393a1d7cf8087cef2a75ccfd57755c913"], 0x14}, 0x1, 0x0, 0x0, 0x400c011}, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000280), 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x1) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000003c0)=@newtaction={0xe98, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe84, 0x1, [@m_pedit={0xe80, 0x1, 0x0, 0x0, {{0xa}, {0xe54, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe50, 0x2, {{{}, 0x97, 0x0, [{}, {}]}, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x400}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}], [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x4}, {0x2}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe98}}, 0x0) 08:02:05 executing program 2: open(&(0x7f0000000200)='./file0\x00', 0x41, 0x0) lsetxattr$trusted_overlay_opaque(&(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000180)=@getlink={0x28, 0x12, 0x1, 0x0, 0x0, {}, [@IFLA_NET_NS_FD={0x8}]}, 0x28}}, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$nl_route(r0, 0x0, 0xc0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='oom_adj\x00') perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43}, 0x0, 0x0, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000140)={0x20080522}, &(0x7f0000000180)) capset(0x0, 0x0) sendfile(r1, r1, 0x0, 0x7ffff003) mount$9p_fd(0xfeffff, 0x0, &(0x7f0000000100), 0x0, 0x0) 08:02:05 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000001380), 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000001640)={&(0x7f00000016c0)=ANY=[@ANYBLOB="83000000fedbdf250000000000000000000000002dc6942e71ccf4d91155db74cf3b59b496b3ae5c57131270866c27cc4ca1e2a2a3443053b12c916ec561d6fa65fee2222156b9f5ffb8d68ed393a1d7cf8087cef2a75ccfd57755c913"], 0x14}, 0x1, 0x0, 0x0, 0x400c011}, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000280), 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x1) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000003c0)=@newtaction={0xe98, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe84, 0x1, [@m_pedit={0xe80, 0x1, 0x0, 0x0, {{0xa}, {0xe54, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe50, 0x2, {{{}, 0x97, 0x0, [{}, {}]}, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x400}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}], [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x4}, {0x2}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe98}}, 0x0) 08:02:05 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000001380), 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000001640)={&(0x7f00000016c0)=ANY=[@ANYBLOB="83000000fedbdf250000000000000000000000002dc6942e71ccf4d91155db74cf3b59b496b3ae5c57131270866c27cc4ca1e2a2a3443053b12c916ec561d6fa65fee2222156b9f5ffb8d68ed393a1d7cf8087cef2a75ccfd57755c913"], 0x14}, 0x1, 0x0, 0x0, 0x400c011}, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000280), 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x1) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000003c0)=@newtaction={0xe98, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe84, 0x1, [@m_pedit={0xe80, 0x1, 0x0, 0x0, {{0xa}, {0xe54, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe50, 0x2, {{{}, 0x97, 0x0, [{}, {}]}, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x400}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}], [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x4}, {0x2}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe98}}, 0x0) 08:02:05 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000001380), 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000001640)={&(0x7f00000016c0)=ANY=[@ANYBLOB="83000000fedbdf250000000000000000000000002dc6942e71ccf4d91155db74cf3b59b496b3ae5c57131270866c27cc4ca1e2a2a3443053b12c916ec561d6fa65fee2222156b9f5ffb8d68ed393a1d7cf8087cef2a75ccfd57755c913"], 0x14}, 0x1, 0x0, 0x0, 0x400c011}, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000280), 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x1) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000003c0)=@newtaction={0xe98, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe84, 0x1, [@m_pedit={0xe80, 0x1, 0x0, 0x0, {{0xa}, {0xe54, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe50, 0x2, {{{}, 0x97, 0x0, [{}, {}]}, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x400}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}], [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x4}, {0x2}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe98}}, 0x0) 08:02:05 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) sendmsg$NL80211_CMD_DISASSOCIATE(r0, &(0x7f0000000480)={0x0, 0x89803f00, &(0x7f0000000340)={&(0x7f0000000400)={0x14, r1, 0x1, 0x0, 0x0, {{0x7e}, {@void, @void}}}, 0x14}}, 0x0) 08:02:05 executing program 0: open(&(0x7f0000000200)='./file0\x00', 0x41, 0x0) lsetxattr$trusted_overlay_opaque(&(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000180)=@getlink={0x28, 0x12, 0x1, 0x0, 0x0, {}, [@IFLA_NET_NS_FD={0x8}]}, 0x28}}, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$nl_route(r0, 0x0, 0xc0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='oom_adj\x00') perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43}, 0x0, 0x0, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000140)={0x20080522}, &(0x7f0000000180)) capset(0x0, 0x0) sendfile(r1, r1, 0x0, 0x7ffff003) mount$9p_fd(0xfeffff, 0x0, &(0x7f0000000100), 0x0, 0x0) 08:02:05 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) sendmsg$NL80211_CMD_DISASSOCIATE(r0, &(0x7f0000000480)={0x0, 0x89803f00, &(0x7f0000000340)={&(0x7f0000000400)={0x14, r1, 0x1, 0x0, 0x0, {{0x7e}, {@void, @void}}}, 0x14}}, 0x0) 08:02:05 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000001380), 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000001640)={&(0x7f00000016c0)=ANY=[@ANYBLOB="83000000fedbdf250000000000000000000000002dc6942e71ccf4d91155db74cf3b59b496b3ae5c57131270866c27cc4ca1e2a2a3443053b12c916ec561d6fa65fee2222156b9f5ffb8d68ed393a1d7cf8087cef2a75ccfd57755c913"], 0x14}, 0x1, 0x0, 0x0, 0x400c011}, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000280), 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x1) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000003c0)=@newtaction={0xe98, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe84, 0x1, [@m_pedit={0xe80, 0x1, 0x0, 0x0, {{0xa}, {0xe54, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe50, 0x2, {{{}, 0x97, 0x0, [{}, {}]}, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x400}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}], [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x4}, {0x2}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe98}}, 0x0) 08:02:05 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000001380), 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000001640)={&(0x7f00000016c0)=ANY=[@ANYBLOB="83000000fedbdf250000000000000000000000002dc6942e71ccf4d91155db74cf3b59b496b3ae5c57131270866c27cc4ca1e2a2a3443053b12c916ec561d6fa65fee2222156b9f5ffb8d68ed393a1d7cf8087cef2a75ccfd57755c913"], 0x14}, 0x1, 0x0, 0x0, 0x400c011}, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000280), 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x1) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000003c0)=@newtaction={0xe98, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe84, 0x1, [@m_pedit={0xe80, 0x1, 0x0, 0x0, {{0xa}, {0xe54, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe50, 0x2, {{{}, 0x97, 0x0, [{}, {}]}, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x400}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}], [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x4}, {0x2}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe98}}, 0x0) 08:02:05 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) sendmsg$NL80211_CMD_DISASSOCIATE(r0, &(0x7f0000000480)={0x0, 0x89803f00, &(0x7f0000000340)={&(0x7f0000000400)={0x14, r1, 0x1, 0x0, 0x0, {{0x7e}, {@void, @void}}}, 0x14}}, 0x0) 08:02:05 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000001380), 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000001640)={&(0x7f00000016c0)=ANY=[@ANYBLOB="83000000fedbdf250000000000000000000000002dc6942e71ccf4d91155db74cf3b59b496b3ae5c57131270866c27cc4ca1e2a2a3443053b12c916ec561d6fa65fee2222156b9f5ffb8d68ed393a1d7cf8087cef2a75ccfd57755c913"], 0x14}, 0x1, 0x0, 0x0, 0x400c011}, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000280), 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x1) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000003c0)=@newtaction={0xe98, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe84, 0x1, [@m_pedit={0xe80, 0x1, 0x0, 0x0, {{0xa}, {0xe54, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe50, 0x2, {{{}, 0x97, 0x0, [{}, {}]}, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x400}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}], [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x4}, {0x2}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe98}}, 0x0) [ 134.657707][T10814] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 134.724480][T10814] platform regulatory.0: Falling back to sysfs fallback for: regulatory.db 08:02:05 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000001380), 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000001640)={&(0x7f00000016c0)=ANY=[@ANYBLOB="83000000fedbdf250000000000000000000000002dc6942e71ccf4d91155db74cf3b59b496b3ae5c57131270866c27cc4ca1e2a2a3443053b12c916ec561d6fa65fee2222156b9f5ffb8d68ed393a1d7cf8087cef2a75ccfd57755c913"], 0x14}, 0x1, 0x0, 0x0, 0x400c011}, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000280), 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x1) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000003c0)=@newtaction={0xe98, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe84, 0x1, [@m_pedit={0xe80, 0x1, 0x0, 0x0, {{0xa}, {0xe54, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe50, 0x2, {{{}, 0x97, 0x0, [{}, {}]}, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x400}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}], [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x4}, {0x2}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe98}}, 0x0) 08:02:06 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000001380), 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000001640)={&(0x7f00000016c0)=ANY=[@ANYBLOB="83000000fedbdf250000000000000000000000002dc6942e71ccf4d91155db74cf3b59b496b3ae5c57131270866c27cc4ca1e2a2a3443053b12c916ec561d6fa65fee2222156b9f5ffb8d68ed393a1d7cf8087cef2a75ccfd57755c913"], 0x14}, 0x1, 0x0, 0x0, 0x400c011}, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000280), 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x1) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000003c0)=@newtaction={0xe98, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe84, 0x1, [@m_pedit={0xe80, 0x1, 0x0, 0x0, {{0xa}, {0xe54, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe50, 0x2, {{{}, 0x97, 0x0, [{}, {}]}, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x400}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}], [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x4}, {0x2}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe98}}, 0x0) 08:02:06 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000001380), 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000001640)={&(0x7f00000016c0)=ANY=[@ANYBLOB="83000000fedbdf250000000000000000000000002dc6942e71ccf4d91155db74cf3b59b496b3ae5c57131270866c27cc4ca1e2a2a3443053b12c916ec561d6fa65fee2222156b9f5ffb8d68ed393a1d7cf8087cef2a75ccfd57755c913"], 0x14}, 0x1, 0x0, 0x0, 0x400c011}, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000280), 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x1) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000003c0)=@newtaction={0xe98, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe84, 0x1, [@m_pedit={0xe80, 0x1, 0x0, 0x0, {{0xa}, {0xe54, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe50, 0x2, {{{}, 0x97, 0x0, [{}, {}]}, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x400}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}], [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x4}, {0x2}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe98}}, 0x0) 08:02:06 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000001380), 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000001640)={&(0x7f00000016c0)=ANY=[@ANYBLOB="83000000fedbdf250000000000000000000000002dc6942e71ccf4d91155db74cf3b59b496b3ae5c57131270866c27cc4ca1e2a2a3443053b12c916ec561d6fa65fee2222156b9f5ffb8d68ed393a1d7cf8087cef2a75ccfd57755c913"], 0x14}, 0x1, 0x0, 0x0, 0x400c011}, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000280), 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x1) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000003c0)=@newtaction={0xe98, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe84, 0x1, [@m_pedit={0xe80, 0x1, 0x0, 0x0, {{0xa}, {0xe54, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe50, 0x2, {{{}, 0x97, 0x0, [{}, {}]}, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x400}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}], [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x4}, {0x2}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe98}}, 0x0) 08:02:06 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000001380), 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000001640)={&(0x7f00000016c0)=ANY=[@ANYBLOB="83000000fedbdf250000000000000000000000002dc6942e71ccf4d91155db74cf3b59b496b3ae5c57131270866c27cc4ca1e2a2a3443053b12c916ec561d6fa65fee2222156b9f5ffb8d68ed393a1d7cf8087cef2a75ccfd57755c913"], 0x14}, 0x1, 0x0, 0x0, 0x400c011}, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000280), 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x1) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000003c0)=@newtaction={0xe98, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe84, 0x1, [@m_pedit={0xe80, 0x1, 0x0, 0x0, {{0xa}, {0xe54, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe50, 0x2, {{{}, 0x97, 0x0, [{}, {}]}, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x400}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}], [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x4}, {0x2}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe98}}, 0x0) 08:02:06 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) sendmsg$NL80211_CMD_DISASSOCIATE(r0, &(0x7f0000000480)={0x0, 0x89803f00, &(0x7f0000000340)={&(0x7f0000000400)={0x14, r1, 0x1, 0x0, 0x0, {{0x7e}, {@void, @void}}}, 0x14}}, 0x0) 08:02:06 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000001380), 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000001640)={&(0x7f00000016c0)=ANY=[@ANYBLOB="83000000fedbdf250000000000000000000000002dc6942e71ccf4d91155db74cf3b59b496b3ae5c57131270866c27cc4ca1e2a2a3443053b12c916ec561d6fa65fee2222156b9f5ffb8d68ed393a1d7cf8087cef2a75ccfd57755c913"], 0x14}, 0x1, 0x0, 0x0, 0x400c011}, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000280), 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x1) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000003c0)=@newtaction={0xe98, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe84, 0x1, [@m_pedit={0xe80, 0x1, 0x0, 0x0, {{0xa}, {0xe54, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe50, 0x2, {{{}, 0x97, 0x0, [{}, {}]}, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x400}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}], [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x4}, {0x2}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe98}}, 0x0) 08:02:06 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000001380), 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000001640)={&(0x7f00000016c0)=ANY=[@ANYBLOB="83000000fedbdf250000000000000000000000002dc6942e71ccf4d91155db74cf3b59b496b3ae5c57131270866c27cc4ca1e2a2a3443053b12c916ec561d6fa65fee2222156b9f5ffb8d68ed393a1d7cf8087cef2a75ccfd57755c913"], 0x14}, 0x1, 0x0, 0x0, 0x400c011}, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000280), 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x1) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000003c0)=@newtaction={0xe98, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe84, 0x1, [@m_pedit={0xe80, 0x1, 0x0, 0x0, {{0xa}, {0xe54, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe50, 0x2, {{{}, 0x97, 0x0, [{}, {}]}, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x400}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}], [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x4}, {0x2}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe98}}, 0x0) 08:02:06 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) sendmsg$NL80211_CMD_DISASSOCIATE(r0, &(0x7f0000000480)={0x0, 0x89803f00, &(0x7f0000000340)={&(0x7f0000000400)={0x14, r1, 0x1, 0x0, 0x0, {{0x7e}, {@void, @void}}}, 0x14}}, 0x0) 08:02:06 executing program 3: open(&(0x7f0000000200)='./file0\x00', 0x41, 0x0) lsetxattr$trusted_overlay_opaque(&(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000180)=@getlink={0x28, 0x12, 0x1, 0x0, 0x0, {}, [@IFLA_NET_NS_FD={0x8}]}, 0x28}}, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$nl_route(r0, 0x0, 0xc0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='oom_adj\x00') perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43}, 0x0, 0x0, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000140)={0x20080522}, &(0x7f0000000180)) capset(0x0, 0x0) sendfile(r1, r1, 0x0, 0x7ffff003) mount$9p_fd(0xfeffff, 0x0, &(0x7f0000000100), 0x0, 0x0) 08:02:06 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) sendmsg$NL80211_CMD_DISASSOCIATE(r0, &(0x7f0000000480)={0x0, 0x89803f00, &(0x7f0000000340)={&(0x7f0000000400)={0x14, r1, 0x1, 0x0, 0x0, {{0x7e}, {@void, @void}}}, 0x14}}, 0x0) 08:02:06 executing program 3: open(&(0x7f0000000200)='./file0\x00', 0x41, 0x0) lsetxattr$trusted_overlay_opaque(&(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000180)=@getlink={0x28, 0x12, 0x1, 0x0, 0x0, {}, [@IFLA_NET_NS_FD={0x8}]}, 0x28}}, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$nl_route(r0, 0x0, 0xc0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='oom_adj\x00') perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43}, 0x0, 0x0, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000140)={0x20080522}, &(0x7f0000000180)) capset(0x0, 0x0) sendfile(r1, r1, 0x0, 0x7ffff003) mount$9p_fd(0xfeffff, 0x0, &(0x7f0000000100), 0x0, 0x0) [ 135.566068][T10853] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 135.604721][T10853] platform regulatory.0: Falling back to sysfs fallback for: regulatory.db 08:02:06 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000001380), 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000001640)={&(0x7f00000016c0)=ANY=[@ANYBLOB="83000000fedbdf250000000000000000000000002dc6942e71ccf4d91155db74cf3b59b496b3ae5c57131270866c27cc4ca1e2a2a3443053b12c916ec561d6fa65fee2222156b9f5ffb8d68ed393a1d7cf8087cef2a75ccfd57755c913"], 0x14}, 0x1, 0x0, 0x0, 0x400c011}, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000280), 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x1) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000003c0)=@newtaction={0xe98, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe84, 0x1, [@m_pedit={0xe80, 0x1, 0x0, 0x0, {{0xa}, {0xe54, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe50, 0x2, {{{}, 0x97, 0x0, [{}, {}]}, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x400}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}], [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x4}, {0x2}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe98}}, 0x0) 08:02:06 executing program 4: open(&(0x7f0000000200)='./file0\x00', 0x41, 0x0) lsetxattr$trusted_overlay_opaque(&(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000180)=@getlink={0x28, 0x12, 0x1, 0x0, 0x0, {}, [@IFLA_NET_NS_FD={0x8}]}, 0x28}}, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$nl_route(r0, 0x0, 0xc0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='oom_adj\x00') perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43}, 0x0, 0x0, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000140)={0x20080522}, &(0x7f0000000180)) capset(0x0, 0x0) sendfile(r1, r1, 0x0, 0x7ffff003) mount$9p_fd(0xfeffff, 0x0, &(0x7f0000000100), 0x0, 0x0) 08:02:06 executing program 3: open(&(0x7f0000000200)='./file0\x00', 0x41, 0x0) lsetxattr$trusted_overlay_opaque(&(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000180)=@getlink={0x28, 0x12, 0x1, 0x0, 0x0, {}, [@IFLA_NET_NS_FD={0x8}]}, 0x28}}, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$nl_route(r0, 0x0, 0xc0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='oom_adj\x00') perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43}, 0x0, 0x0, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000140)={0x20080522}, &(0x7f0000000180)) capset(0x0, 0x0) sendfile(r1, r1, 0x0, 0x7ffff003) mount$9p_fd(0xfeffff, 0x0, &(0x7f0000000100), 0x0, 0x0) 08:02:06 executing program 5: open(&(0x7f0000000200)='./file0\x00', 0x41, 0x0) lsetxattr$trusted_overlay_opaque(&(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000180)=@getlink={0x28, 0x12, 0x1, 0x0, 0x0, {}, [@IFLA_NET_NS_FD={0x8}]}, 0x28}}, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$nl_route(r0, 0x0, 0xc0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='oom_adj\x00') perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43}, 0x0, 0x0, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000140)={0x20080522}, &(0x7f0000000180)) capset(0x0, 0x0) sendfile(r1, r1, 0x0, 0x7ffff003) mount$9p_fd(0xfeffff, 0x0, &(0x7f0000000100), 0x0, 0x0) 08:02:07 executing program 3: open(&(0x7f0000000200)='./file0\x00', 0x41, 0x0) lsetxattr$trusted_overlay_opaque(&(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000180)=@getlink={0x28, 0x12, 0x1, 0x0, 0x0, {}, [@IFLA_NET_NS_FD={0x8}]}, 0x28}}, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$nl_route(r0, 0x0, 0xc0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='oom_adj\x00') perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43}, 0x0, 0x0, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000140)={0x20080522}, &(0x7f0000000180)) capset(0x0, 0x0) sendfile(r1, r1, 0x0, 0x7ffff003) mount$9p_fd(0xfeffff, 0x0, &(0x7f0000000100), 0x0, 0x0) 08:02:07 executing program 3: open(&(0x7f0000000200)='./file0\x00', 0x41, 0x0) lsetxattr$trusted_overlay_opaque(&(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000180)=@getlink={0x28, 0x12, 0x1, 0x0, 0x0, {}, [@IFLA_NET_NS_FD={0x8}]}, 0x28}}, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$nl_route(r0, 0x0, 0xc0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='oom_adj\x00') perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43}, 0x0, 0x0, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000140)={0x20080522}, &(0x7f0000000180)) capset(0x0, 0x0) sendfile(r1, r1, 0x0, 0x7ffff003) mount$9p_fd(0xfeffff, 0x0, &(0x7f0000000100), 0x0, 0x0) 08:02:07 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) sendmsg$NL80211_CMD_DISASSOCIATE(r0, &(0x7f0000000480)={0x0, 0x89803f00, &(0x7f0000000340)={&(0x7f0000000400)={0x14, r1, 0x1, 0x0, 0x0, {{0x7e}, {@void, @void}}}, 0x14}}, 0x0) 08:02:07 executing program 5: open(&(0x7f0000000200)='./file0\x00', 0x41, 0x0) lsetxattr$trusted_overlay_opaque(&(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000180)=@getlink={0x28, 0x12, 0x1, 0x0, 0x0, {}, [@IFLA_NET_NS_FD={0x8}]}, 0x28}}, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$nl_route(r0, 0x0, 0xc0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='oom_adj\x00') perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43}, 0x0, 0x0, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000140)={0x20080522}, &(0x7f0000000180)) capset(0x0, 0x0) sendfile(r1, r1, 0x0, 0x7ffff003) mount$9p_fd(0xfeffff, 0x0, &(0x7f0000000100), 0x0, 0x0) 08:02:07 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) sendmsg$NL80211_CMD_DISASSOCIATE(r0, &(0x7f0000000480)={0x0, 0x89803f00, &(0x7f0000000340)={&(0x7f0000000400)={0x14, r1, 0x1, 0x0, 0x0, {{0x7e}, {@void, @void}}}, 0x14}}, 0x0) 08:02:07 executing program 4: open(&(0x7f0000000200)='./file0\x00', 0x41, 0x0) lsetxattr$trusted_overlay_opaque(&(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000180)=@getlink={0x28, 0x12, 0x1, 0x0, 0x0, {}, [@IFLA_NET_NS_FD={0x8}]}, 0x28}}, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$nl_route(r0, 0x0, 0xc0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='oom_adj\x00') perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43}, 0x0, 0x0, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000140)={0x20080522}, &(0x7f0000000180)) capset(0x0, 0x0) sendfile(r1, r1, 0x0, 0x7ffff003) mount$9p_fd(0xfeffff, 0x0, &(0x7f0000000100), 0x0, 0x0) 08:02:07 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) sendmsg$NL80211_CMD_DISASSOCIATE(r0, &(0x7f0000000480)={0x0, 0x89803f00, &(0x7f0000000340)={&(0x7f0000000400)={0x14, r1, 0x1, 0x0, 0x0, {{0x7e}, {@void, @void}}}, 0x14}}, 0x0) 08:02:07 executing program 5: open(&(0x7f0000000200)='./file0\x00', 0x41, 0x0) lsetxattr$trusted_overlay_opaque(&(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000180)=@getlink={0x28, 0x12, 0x1, 0x0, 0x0, {}, [@IFLA_NET_NS_FD={0x8}]}, 0x28}}, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$nl_route(r0, 0x0, 0xc0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='oom_adj\x00') perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43}, 0x0, 0x0, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000140)={0x20080522}, &(0x7f0000000180)) capset(0x0, 0x0) sendfile(r1, r1, 0x0, 0x7ffff003) mount$9p_fd(0xfeffff, 0x0, &(0x7f0000000100), 0x0, 0x0) 08:02:07 executing program 3: open(&(0x7f0000000200)='./file0\x00', 0x41, 0x0) lsetxattr$trusted_overlay_opaque(&(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000180)=@getlink={0x28, 0x12, 0x1, 0x0, 0x0, {}, [@IFLA_NET_NS_FD={0x8}]}, 0x28}}, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$nl_route(r0, 0x0, 0xc0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='oom_adj\x00') perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43}, 0x0, 0x0, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000140)={0x20080522}, &(0x7f0000000180)) capset(0x0, 0x0) sendfile(r1, r1, 0x0, 0x7ffff003) mount$9p_fd(0xfeffff, 0x0, &(0x7f0000000100), 0x0, 0x0) [ 136.554979][T10899] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 08:02:07 executing program 4: open(&(0x7f0000000200)='./file0\x00', 0x41, 0x0) lsetxattr$trusted_overlay_opaque(&(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000180)=@getlink={0x28, 0x12, 0x1, 0x0, 0x0, {}, [@IFLA_NET_NS_FD={0x8}]}, 0x28}}, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$nl_route(r0, 0x0, 0xc0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='oom_adj\x00') perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43}, 0x0, 0x0, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000140)={0x20080522}, &(0x7f0000000180)) capset(0x0, 0x0) sendfile(r1, r1, 0x0, 0x7ffff003) mount$9p_fd(0xfeffff, 0x0, &(0x7f0000000100), 0x0, 0x0) 08:02:07 executing program 3: open(&(0x7f0000000200)='./file0\x00', 0x41, 0x0) lsetxattr$trusted_overlay_opaque(&(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000180)=@getlink={0x28, 0x12, 0x1, 0x0, 0x0, {}, [@IFLA_NET_NS_FD={0x8}]}, 0x28}}, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$nl_route(r0, 0x0, 0xc0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='oom_adj\x00') perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43}, 0x0, 0x0, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000140)={0x20080522}, &(0x7f0000000180)) capset(0x0, 0x0) sendfile(r1, r1, 0x0, 0x7ffff003) mount$9p_fd(0xfeffff, 0x0, &(0x7f0000000100), 0x0, 0x0) [ 136.604811][T10899] platform regulatory.0: Falling back to sysfs fallback for: regulatory.db 08:02:07 executing program 5: open(&(0x7f0000000200)='./file0\x00', 0x41, 0x0) lsetxattr$trusted_overlay_opaque(&(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000180)=@getlink={0x28, 0x12, 0x1, 0x0, 0x0, {}, [@IFLA_NET_NS_FD={0x8}]}, 0x28}}, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$nl_route(r0, 0x0, 0xc0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='oom_adj\x00') perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43}, 0x0, 0x0, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000140)={0x20080522}, &(0x7f0000000180)) capset(0x0, 0x0) sendfile(r1, r1, 0x0, 0x7ffff003) mount$9p_fd(0xfeffff, 0x0, &(0x7f0000000100), 0x0, 0x0) 08:02:07 executing program 3: open(&(0x7f0000000200)='./file0\x00', 0x41, 0x0) lsetxattr$trusted_overlay_opaque(&(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000180)=@getlink={0x28, 0x12, 0x1, 0x0, 0x0, {}, [@IFLA_NET_NS_FD={0x8}]}, 0x28}}, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$nl_route(r0, 0x0, 0xc0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='oom_adj\x00') perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43}, 0x0, 0x0, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000140)={0x20080522}, &(0x7f0000000180)) capset(0x0, 0x0) sendfile(r1, r1, 0x0, 0x7ffff003) mount$9p_fd(0xfeffff, 0x0, &(0x7f0000000100), 0x0, 0x0) 08:02:07 executing program 4: open(&(0x7f0000000200)='./file0\x00', 0x41, 0x0) lsetxattr$trusted_overlay_opaque(&(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000180)=@getlink={0x28, 0x12, 0x1, 0x0, 0x0, {}, [@IFLA_NET_NS_FD={0x8}]}, 0x28}}, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$nl_route(r0, 0x0, 0xc0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='oom_adj\x00') perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43}, 0x0, 0x0, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000140)={0x20080522}, &(0x7f0000000180)) capset(0x0, 0x0) sendfile(r1, r1, 0x0, 0x7ffff003) mount$9p_fd(0xfeffff, 0x0, &(0x7f0000000100), 0x0, 0x0) 08:02:08 executing program 3: open(&(0x7f0000000200)='./file0\x00', 0x41, 0x0) lsetxattr$trusted_overlay_opaque(&(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000180)=@getlink={0x28, 0x12, 0x1, 0x0, 0x0, {}, [@IFLA_NET_NS_FD={0x8}]}, 0x28}}, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$nl_route(r0, 0x0, 0xc0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='oom_adj\x00') perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43}, 0x0, 0x0, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000140)={0x20080522}, &(0x7f0000000180)) capset(0x0, 0x0) sendfile(r1, r1, 0x0, 0x7ffff003) mount$9p_fd(0xfeffff, 0x0, &(0x7f0000000100), 0x0, 0x0) 08:02:08 executing program 5: open(&(0x7f0000000200)='./file0\x00', 0x41, 0x0) lsetxattr$trusted_overlay_opaque(&(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000180)=@getlink={0x28, 0x12, 0x1, 0x0, 0x0, {}, [@IFLA_NET_NS_FD={0x8}]}, 0x28}}, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$nl_route(r0, 0x0, 0xc0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='oom_adj\x00') perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43}, 0x0, 0x0, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000140)={0x20080522}, &(0x7f0000000180)) capset(0x0, 0x0) sendfile(r1, r1, 0x0, 0x7ffff003) mount$9p_fd(0xfeffff, 0x0, &(0x7f0000000100), 0x0, 0x0) 08:02:08 executing program 4: open(&(0x7f0000000200)='./file0\x00', 0x41, 0x0) lsetxattr$trusted_overlay_opaque(&(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000180)=@getlink={0x28, 0x12, 0x1, 0x0, 0x0, {}, [@IFLA_NET_NS_FD={0x8}]}, 0x28}}, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$nl_route(r0, 0x0, 0xc0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='oom_adj\x00') perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43}, 0x0, 0x0, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000140)={0x20080522}, &(0x7f0000000180)) capset(0x0, 0x0) sendfile(r1, r1, 0x0, 0x7ffff003) mount$9p_fd(0xfeffff, 0x0, &(0x7f0000000100), 0x0, 0x0) 08:02:08 executing program 0: open(&(0x7f0000000200)='./file0\x00', 0x41, 0x0) lsetxattr$trusted_overlay_opaque(&(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000180)=@getlink={0x28, 0x12, 0x1, 0x0, 0x0, {}, [@IFLA_NET_NS_FD={0x8}]}, 0x28}}, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$nl_route(r0, 0x0, 0xc0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='oom_adj\x00') perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43}, 0x0, 0x0, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000140)={0x20080522}, &(0x7f0000000180)) capset(0x0, 0x0) sendfile(r1, r1, 0x0, 0x7ffff003) mount$9p_fd(0xfeffff, 0x0, &(0x7f0000000100), 0x0, 0x0) 08:02:08 executing program 1: open(&(0x7f0000000200)='./file0\x00', 0x41, 0x0) lsetxattr$trusted_overlay_opaque(&(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000180)=@getlink={0x28, 0x12, 0x1, 0x0, 0x0, {}, [@IFLA_NET_NS_FD={0x8}]}, 0x28}}, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$nl_route(r0, 0x0, 0xc0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='oom_adj\x00') perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43}, 0x0, 0x0, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000140)={0x20080522}, &(0x7f0000000180)) capset(0x0, 0x0) sendfile(r1, r1, 0x0, 0x7ffff003) mount$9p_fd(0xfeffff, 0x0, &(0x7f0000000100), 0x0, 0x0) 08:02:08 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000140)="66530700ae897094e7b126b097eaa769be6d05c41bd3074cfdaa4e677d114b654b499374a8db38f8c44f7b7d9ce423c26f45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd9e05485b4ff15f715134d82ce9c0952d644157684e3dae491de7642a7c52cc2d523be91b58773", 0x6d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00, 0xee00, 0x0, 0x1}}}, 0x78) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000300)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 08:02:08 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8003e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffdfffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 08:02:08 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000140)="66530700ae897094e7b126b097eaa769be6d05c41bd3074cfdaa4e677d114b654b499374a8db38f8c44f7b7d9ce423c26f45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd9e05485b4ff15f715134d82ce9c0952d644157684e3dae491de7642a7c52cc2d523be91b58773", 0x6d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00, 0xee00, 0x0, 0x1}}}, 0x78) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000300)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 08:02:08 executing program 5: open(&(0x7f0000000200)='./file0\x00', 0x41, 0x0) lsetxattr$trusted_overlay_opaque(&(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000180)=@getlink={0x28, 0x12, 0x1, 0x0, 0x0, {}, [@IFLA_NET_NS_FD={0x8}]}, 0x28}}, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$nl_route(r0, 0x0, 0xc0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='oom_adj\x00') perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43}, 0x0, 0x0, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000140)={0x20080522}, &(0x7f0000000180)) capset(0x0, 0x0) sendfile(r1, r1, 0x0, 0x7ffff003) mount$9p_fd(0xfeffff, 0x0, &(0x7f0000000100), 0x0, 0x0) 08:02:08 executing program 0: open(&(0x7f0000000200)='./file0\x00', 0x41, 0x0) lsetxattr$trusted_overlay_opaque(&(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000180)=@getlink={0x28, 0x12, 0x1, 0x0, 0x0, {}, [@IFLA_NET_NS_FD={0x8}]}, 0x28}}, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$nl_route(r0, 0x0, 0xc0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='oom_adj\x00') perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43}, 0x0, 0x0, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000140)={0x20080522}, &(0x7f0000000180)) capset(0x0, 0x0) sendfile(r1, r1, 0x0, 0x7ffff003) mount$9p_fd(0xfeffff, 0x0, &(0x7f0000000100), 0x0, 0x0) 08:02:08 executing program 4: open(&(0x7f0000000200)='./file0\x00', 0x41, 0x0) lsetxattr$trusted_overlay_opaque(&(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000180)=@getlink={0x28, 0x12, 0x1, 0x0, 0x0, {}, [@IFLA_NET_NS_FD={0x8}]}, 0x28}}, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$nl_route(r0, 0x0, 0xc0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='oom_adj\x00') perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43}, 0x0, 0x0, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000140)={0x20080522}, &(0x7f0000000180)) capset(0x0, 0x0) sendfile(r1, r1, 0x0, 0x7ffff003) mount$9p_fd(0xfeffff, 0x0, &(0x7f0000000100), 0x0, 0x0) 08:02:08 executing program 1: open(&(0x7f0000000200)='./file0\x00', 0x41, 0x0) lsetxattr$trusted_overlay_opaque(&(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000180)=@getlink={0x28, 0x12, 0x1, 0x0, 0x0, {}, [@IFLA_NET_NS_FD={0x8}]}, 0x28}}, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$nl_route(r0, 0x0, 0xc0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='oom_adj\x00') perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43}, 0x0, 0x0, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000140)={0x20080522}, &(0x7f0000000180)) capset(0x0, 0x0) sendfile(r1, r1, 0x0, 0x7ffff003) mount$9p_fd(0xfeffff, 0x0, &(0x7f0000000100), 0x0, 0x0) 08:02:08 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8003e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffdfffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 08:02:08 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8003e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffdfffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 08:02:08 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000140)="66530700ae897094e7b126b097eaa769be6d05c41bd3074cfdaa4e677d114b654b499374a8db38f8c44f7b7d9ce423c26f45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd9e05485b4ff15f715134d82ce9c0952d644157684e3dae491de7642a7c52cc2d523be91b58773", 0x6d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00, 0xee00, 0x0, 0x1}}}, 0x78) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000300)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 08:02:08 executing program 0: open(&(0x7f0000000200)='./file0\x00', 0x41, 0x0) lsetxattr$trusted_overlay_opaque(&(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000180)=@getlink={0x28, 0x12, 0x1, 0x0, 0x0, {}, [@IFLA_NET_NS_FD={0x8}]}, 0x28}}, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$nl_route(r0, 0x0, 0xc0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='oom_adj\x00') perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43}, 0x0, 0x0, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000140)={0x20080522}, &(0x7f0000000180)) capset(0x0, 0x0) sendfile(r1, r1, 0x0, 0x7ffff003) mount$9p_fd(0xfeffff, 0x0, &(0x7f0000000100), 0x0, 0x0) 08:02:08 executing program 1: open(&(0x7f0000000200)='./file0\x00', 0x41, 0x0) lsetxattr$trusted_overlay_opaque(&(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000180)=@getlink={0x28, 0x12, 0x1, 0x0, 0x0, {}, [@IFLA_NET_NS_FD={0x8}]}, 0x28}}, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$nl_route(r0, 0x0, 0xc0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='oom_adj\x00') perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43}, 0x0, 0x0, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000140)={0x20080522}, &(0x7f0000000180)) capset(0x0, 0x0) sendfile(r1, r1, 0x0, 0x7ffff003) mount$9p_fd(0xfeffff, 0x0, &(0x7f0000000100), 0x0, 0x0) 08:02:08 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000140)="66530700ae897094e7b126b097eaa769be6d05c41bd3074cfdaa4e677d114b654b499374a8db38f8c44f7b7d9ce423c26f45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd9e05485b4ff15f715134d82ce9c0952d644157684e3dae491de7642a7c52cc2d523be91b58773", 0x6d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00, 0xee00, 0x0, 0x1}}}, 0x78) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000300)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 08:02:09 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8003e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffdfffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 08:02:09 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8003e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffdfffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 08:02:09 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000140)="66530700ae897094e7b126b097eaa769be6d05c41bd3074cfdaa4e677d114b654b499374a8db38f8c44f7b7d9ce423c26f45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd9e05485b4ff15f715134d82ce9c0952d644157684e3dae491de7642a7c52cc2d523be91b58773", 0x6d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00, 0xee00, 0x0, 0x1}}}, 0x78) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000300)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 08:02:09 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000140)="66530700ae897094e7b126b097eaa769be6d05c41bd3074cfdaa4e677d114b654b499374a8db38f8c44f7b7d9ce423c26f45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd9e05485b4ff15f715134d82ce9c0952d644157684e3dae491de7642a7c52cc2d523be91b58773", 0x6d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00, 0xee00, 0x0, 0x1}}}, 0x78) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000300)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 08:02:09 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000140)="66530700ae897094e7b126b097eaa769be6d05c41bd3074cfdaa4e677d114b654b499374a8db38f8c44f7b7d9ce423c26f45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd9e05485b4ff15f715134d82ce9c0952d644157684e3dae491de7642a7c52cc2d523be91b58773", 0x6d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00, 0xee00, 0x0, 0x1}}}, 0x78) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000300)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 08:02:09 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000140)="66530700ae897094e7b126b097eaa769be6d05c41bd3074cfdaa4e677d114b654b499374a8db38f8c44f7b7d9ce423c26f45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd9e05485b4ff15f715134d82ce9c0952d644157684e3dae491de7642a7c52cc2d523be91b58773", 0x6d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00, 0xee00, 0x0, 0x1}}}, 0x78) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000300)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 08:02:09 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8003e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffdfffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 08:02:09 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8003e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffdfffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 08:02:09 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000140)="66530700ae897094e7b126b097eaa769be6d05c41bd3074cfdaa4e677d114b654b499374a8db38f8c44f7b7d9ce423c26f45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd9e05485b4ff15f715134d82ce9c0952d644157684e3dae491de7642a7c52cc2d523be91b58773", 0x6d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00, 0xee00, 0x0, 0x1}}}, 0x78) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000300)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 08:02:09 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000140)="66530700ae897094e7b126b097eaa769be6d05c41bd3074cfdaa4e677d114b654b499374a8db38f8c44f7b7d9ce423c26f45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd9e05485b4ff15f715134d82ce9c0952d644157684e3dae491de7642a7c52cc2d523be91b58773", 0x6d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00, 0xee00, 0x0, 0x1}}}, 0x78) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000300)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 08:02:09 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000140)="66530700ae897094e7b126b097eaa769be6d05c41bd3074cfdaa4e677d114b654b499374a8db38f8c44f7b7d9ce423c26f45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd9e05485b4ff15f715134d82ce9c0952d644157684e3dae491de7642a7c52cc2d523be91b58773", 0x6d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00, 0xee00, 0x0, 0x1}}}, 0x78) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000300)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 08:02:09 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000140)="66530700ae897094e7b126b097eaa769be6d05c41bd3074cfdaa4e677d114b654b499374a8db38f8c44f7b7d9ce423c26f45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd9e05485b4ff15f715134d82ce9c0952d644157684e3dae491de7642a7c52cc2d523be91b58773", 0x6d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00, 0xee00, 0x0, 0x1}}}, 0x78) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000300)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 08:02:09 executing program 5: syz_open_dev$video4linux(&(0x7f0000000080), 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000000180)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) 08:02:09 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000140)="66530700ae897094e7b126b097eaa769be6d05c41bd3074cfdaa4e677d114b654b499374a8db38f8c44f7b7d9ce423c26f45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd9e05485b4ff15f715134d82ce9c0952d644157684e3dae491de7642a7c52cc2d523be91b58773", 0x6d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00, 0xee00, 0x0, 0x1}}}, 0x78) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000300)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 08:02:09 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000580)=""/143, &(0x7f0000000340)=0xfee5) open(&(0x7f0000000300)='.\x00', 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x3, 0x3, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0xfb, 0x0, 0x0, 0x20]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000440)={0x2, 0x0, @local}, 0x9) ioctl$KVM_RUN(r2, 0xae80, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 08:02:09 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000140)="66530700ae897094e7b126b097eaa769be6d05c41bd3074cfdaa4e677d114b654b499374a8db38f8c44f7b7d9ce423c26f45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd9e05485b4ff15f715134d82ce9c0952d644157684e3dae491de7642a7c52cc2d523be91b58773", 0x6d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00, 0xee00, 0x0, 0x1}}}, 0x78) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000300)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 08:02:09 executing program 4: syz_genetlink_get_family_id$ipvs(&(0x7f0000000140), 0xffffffffffffffff) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c0b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x270, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0x98, 0xe0, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2d0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_STATION(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="1b110000", @ANYRES16=r1, @ANYBLOB="010400000000000000001200000008000300", @ANYRES32=r2, @ANYBLOB="0500e40020000000"], 0x24}}, 0x0) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r3, 0x40046f41, 0x76006e) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x80801, 0x0) ioctl$ASHMEM_GET_SIZE(r4, 0x40186f40, 0x550000) r5 = signalfd(r3, &(0x7f0000000200)={[0x7]}, 0x8) ioctl$ASHMEM_GET_SIZE(r5, 0x7704, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1000004, 0x4000010, r4, 0xc15a5000) 08:02:09 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000140)="66530700ae897094e7b126b097eaa769be6d05c41bd3074cfdaa4e677d114b654b499374a8db38f8c44f7b7d9ce423c26f45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd9e05485b4ff15f715134d82ce9c0952d644157684e3dae491de7642a7c52cc2d523be91b58773", 0x6d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00, 0xee00, 0x0, 0x1}}}, 0x78) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000300)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 08:02:09 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000140)="66530700ae897094e7b126b097eaa769be6d05c41bd3074cfdaa4e677d114b654b499374a8db38f8c44f7b7d9ce423c26f45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd9e05485b4ff15f715134d82ce9c0952d644157684e3dae491de7642a7c52cc2d523be91b58773", 0x6d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00, 0xee00, 0x0, 0x1}}}, 0x78) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000300)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) [ 138.272658][T11030] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 138.383131][T11035] ubi0: attaching mtd0 08:02:09 executing program 1: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f00000000c0)={0x500, 0xf0, 0x0, 0x0, 0x769, 0x8001, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69, 0x0, 0x8f1}) [ 138.410263][T11035] ubi0: scanning is finished 08:02:09 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x15) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) writev(r0, &(0x7f0000001400)=[{&(0x7f0000000140)="ad", 0x1}], 0x1) 08:02:09 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0xaf) setsockopt(r1, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @dev}, 0x10) sendmmsg(r1, &(0x7f0000005180)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f00000000c0)="a4", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000400)='p', 0x1}], 0x1}}], 0x2, 0x0) [ 138.440884][T11035] ubi0: empty MTD device detected 08:02:09 executing program 5: syz_open_dev$video4linux(&(0x7f0000000080), 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000000180)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) 08:02:09 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000580)=""/143, &(0x7f0000000340)=0xfee5) open(&(0x7f0000000300)='.\x00', 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x3, 0x3, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0xfb, 0x0, 0x0, 0x20]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000440)={0x2, 0x0, @local}, 0x9) ioctl$KVM_RUN(r2, 0xae80, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 08:02:09 executing program 1: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f00000000c0)={0x500, 0xf0, 0x0, 0x0, 0x769, 0x8001, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69, 0x0, 0x8f1}) 08:02:09 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0xaf) setsockopt(r1, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @dev}, 0x10) sendmmsg(r1, &(0x7f0000005180)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f00000000c0)="a4", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000400)='p', 0x1}], 0x1}}], 0x2, 0x0) 08:02:09 executing program 1: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f00000000c0)={0x500, 0xf0, 0x0, 0x0, 0x769, 0x8001, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69, 0x0, 0x8f1}) [ 138.668410][T11035] ubi0: attached mtd0 (name "mtdram test device", size 0 MiB) [ 138.703419][T11035] ubi0: PEB size: 4096 bytes (4 KiB), LEB size: 3968 bytes 08:02:09 executing program 5: syz_open_dev$video4linux(&(0x7f0000000080), 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000000180)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) [ 138.754933][T11035] ubi0: min./max. I/O unit sizes: 1/64, sub-page size 1 [ 138.809451][T11035] ubi0: VID header offset: 64 (aligned 64), data offset: 128 [ 138.856873][T11035] ubi0: good PEBs: 32, bad PEBs: 0, corrupted PEBs: 0 [ 138.897251][T11035] ubi0: user volume: 0, internal volumes: 1, max. volumes count: 23 [ 138.929875][T11035] ubi0: max/mean erase counter: 0/0, WL threshold: 4096, image sequence number: 1956362979 [ 138.954041][T11035] ubi0: available PEBs: 28, total reserved PEBs: 4, PEBs reserved for bad PEB handling: 0 [ 139.008624][T11118] ubi0: background thread "ubi_bgt0d" started, PID 11118 [ 139.022890][T11052] ubi0: detaching mtd0 [ 139.035337][T11052] ubi0: mtd0 is detached [ 139.049161][T11035] ubi0: attaching mtd0 [ 139.058612][T11035] ubi0: scanning is finished 08:02:10 executing program 4: syz_genetlink_get_family_id$ipvs(&(0x7f0000000140), 0xffffffffffffffff) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c0b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x270, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0x98, 0xe0, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2d0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_STATION(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="1b110000", @ANYRES16=r1, @ANYBLOB="010400000000000000001200000008000300", @ANYRES32=r2, @ANYBLOB="0500e40020000000"], 0x24}}, 0x0) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r3, 0x40046f41, 0x76006e) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x80801, 0x0) ioctl$ASHMEM_GET_SIZE(r4, 0x40186f40, 0x550000) r5 = signalfd(r3, &(0x7f0000000200)={[0x7]}, 0x8) ioctl$ASHMEM_GET_SIZE(r5, 0x7704, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1000004, 0x4000010, r4, 0xc15a5000) 08:02:10 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x15) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) writev(r0, &(0x7f0000001400)=[{&(0x7f0000000140)="ad", 0x1}], 0x1) 08:02:10 executing program 1: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f00000000c0)={0x500, 0xf0, 0x0, 0x0, 0x769, 0x8001, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69, 0x0, 0x8f1}) 08:02:10 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0xaf) setsockopt(r1, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @dev}, 0x10) sendmmsg(r1, &(0x7f0000005180)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f00000000c0)="a4", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000400)='p', 0x1}], 0x1}}], 0x2, 0x0) 08:02:10 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000580)=""/143, &(0x7f0000000340)=0xfee5) open(&(0x7f0000000300)='.\x00', 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x3, 0x3, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0xfb, 0x0, 0x0, 0x20]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000440)={0x2, 0x0, @local}, 0x9) ioctl$KVM_RUN(r2, 0xae80, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 08:02:10 executing program 5: syz_open_dev$video4linux(&(0x7f0000000080), 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000000180)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) [ 139.100161][T11035] ubi0 error: ubi_attach_mtd_dev: cannot spawn "ubi_bgt0d", error -4 08:02:10 executing program 1: syz_genetlink_get_family_id$ipvs(&(0x7f0000000140), 0xffffffffffffffff) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c0b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x270, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0x98, 0xe0, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2d0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_STATION(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="1b110000", @ANYRES16=r1, @ANYBLOB="010400000000000000001200000008000300", @ANYRES32=r2, @ANYBLOB="0500e40020000000"], 0x24}}, 0x0) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r3, 0x40046f41, 0x76006e) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x80801, 0x0) ioctl$ASHMEM_GET_SIZE(r4, 0x40186f40, 0x550000) r5 = signalfd(r3, &(0x7f0000000200)={[0x7]}, 0x8) ioctl$ASHMEM_GET_SIZE(r5, 0x7704, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1000004, 0x4000010, r4, 0xc15a5000) [ 139.336081][T11236] ubi0: attaching mtd0 08:02:10 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0xaf) setsockopt(r1, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @dev}, 0x10) sendmmsg(r1, &(0x7f0000005180)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f00000000c0)="a4", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000400)='p', 0x1}], 0x1}}], 0x2, 0x0) [ 139.413044][T11236] ubi0: scanning is finished 08:02:10 executing program 5: syz_genetlink_get_family_id$ipvs(&(0x7f0000000140), 0xffffffffffffffff) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c0b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x270, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0x98, 0xe0, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2d0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_STATION(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="1b110000", @ANYRES16=r1, @ANYBLOB="010400000000000000001200000008000300", @ANYRES32=r2, @ANYBLOB="0500e40020000000"], 0x24}}, 0x0) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r3, 0x40046f41, 0x76006e) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x80801, 0x0) ioctl$ASHMEM_GET_SIZE(r4, 0x40186f40, 0x550000) r5 = signalfd(r3, &(0x7f0000000200)={[0x7]}, 0x8) ioctl$ASHMEM_GET_SIZE(r5, 0x7704, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1000004, 0x4000010, r4, 0xc15a5000) 08:02:10 executing program 2: syz_genetlink_get_family_id$ipvs(&(0x7f0000000140), 0xffffffffffffffff) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c0b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x270, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0x98, 0xe0, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2d0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_STATION(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="1b110000", @ANYRES16=r1, @ANYBLOB="010400000000000000001200000008000300", @ANYRES32=r2, @ANYBLOB="0500e40020000000"], 0x24}}, 0x0) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r3, 0x40046f41, 0x76006e) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x80801, 0x0) ioctl$ASHMEM_GET_SIZE(r4, 0x40186f40, 0x550000) r5 = signalfd(r3, &(0x7f0000000200)={[0x7]}, 0x8) ioctl$ASHMEM_GET_SIZE(r5, 0x7704, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1000004, 0x4000010, r4, 0xc15a5000) 08:02:10 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000580)=""/143, &(0x7f0000000340)=0xfee5) open(&(0x7f0000000300)='.\x00', 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x3, 0x3, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0xfb, 0x0, 0x0, 0x20]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000440)={0x2, 0x0, @local}, 0x9) ioctl$KVM_RUN(r2, 0xae80, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 139.662414][T11236] ubi0: attached mtd0 (name "mtdram test device", size 0 MiB) [ 139.683042][T11236] ubi0: PEB size: 4096 bytes (4 KiB), LEB size: 3968 bytes [ 139.722072][T11236] ubi0: min./max. I/O unit sizes: 1/64, sub-page size 1 [ 139.773690][T11236] ubi0: VID header offset: 64 (aligned 64), data offset: 128 [ 139.832594][T11236] ubi0: good PEBs: 32, bad PEBs: 0, corrupted PEBs: 0 [ 139.892946][T11236] ubi0: user volume: 0, internal volumes: 1, max. volumes count: 23 [ 139.928976][T11236] ubi0: max/mean erase counter: 1/1, WL threshold: 4096, image sequence number: 1956362979 08:02:11 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x15) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) writev(r0, &(0x7f0000001400)=[{&(0x7f0000000140)="ad", 0x1}], 0x1) [ 139.947696][T11236] ubi0: available PEBs: 28, total reserved PEBs: 4, PEBs reserved for bad PEB handling: 0 [ 139.960185][T11327] ubi0: background thread "ubi_bgt0d" started, PID 11327 [ 139.967566][T11302] ubi0: detaching mtd0 [ 139.983728][T11302] ubi0: mtd0 is detached [ 139.995077][T11314] ubi0: attaching mtd0 [ 140.002970][T11314] ubi0: scanning is finished 08:02:11 executing program 4: syz_genetlink_get_family_id$ipvs(&(0x7f0000000140), 0xffffffffffffffff) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c0b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x270, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0x98, 0xe0, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2d0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_STATION(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="1b110000", @ANYRES16=r1, @ANYBLOB="010400000000000000001200000008000300", @ANYRES32=r2, @ANYBLOB="0500e40020000000"], 0x24}}, 0x0) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r3, 0x40046f41, 0x76006e) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x80801, 0x0) ioctl$ASHMEM_GET_SIZE(r4, 0x40186f40, 0x550000) r5 = signalfd(r3, &(0x7f0000000200)={[0x7]}, 0x8) ioctl$ASHMEM_GET_SIZE(r5, 0x7704, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1000004, 0x4000010, r4, 0xc15a5000) 08:02:11 executing program 3: syz_genetlink_get_family_id$ipvs(&(0x7f0000000140), 0xffffffffffffffff) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c0b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x270, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0x98, 0xe0, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2d0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_STATION(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="1b110000", @ANYRES16=r1, @ANYBLOB="010400000000000000001200000008000300", @ANYRES32=r2, @ANYBLOB="0500e40020000000"], 0x24}}, 0x0) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r3, 0x40046f41, 0x76006e) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x80801, 0x0) ioctl$ASHMEM_GET_SIZE(r4, 0x40186f40, 0x550000) r5 = signalfd(r3, &(0x7f0000000200)={[0x7]}, 0x8) ioctl$ASHMEM_GET_SIZE(r5, 0x7704, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1000004, 0x4000010, r4, 0xc15a5000) [ 140.189998][T11314] ubi0: attached mtd0 (name "mtdram test device", size 0 MiB) [ 140.221867][T11314] ubi0: PEB size: 4096 bytes (4 KiB), LEB size: 3968 bytes [ 140.253823][T11314] ubi0: min./max. I/O unit sizes: 1/64, sub-page size 1 [ 140.267075][T11314] ubi0: VID header offset: 64 (aligned 64), data offset: 128 [ 140.289695][T11314] ubi0: good PEBs: 32, bad PEBs: 0, corrupted PEBs: 0 [ 140.374756][T11314] ubi0: user volume: 0, internal volumes: 1, max. volumes count: 23 [ 140.429834][T11314] ubi0: max/mean erase counter: 1/1, WL threshold: 4096, image sequence number: 1956362979 [ 140.452458][T11314] ubi0: available PEBs: 28, total reserved PEBs: 4, PEBs reserved for bad PEB handling: 0 [ 140.465962][T11426] ubi0: background thread "ubi_bgt0d" started, PID 11426 [ 140.473204][T11329] ubi0: detaching mtd0 08:02:11 executing program 1: syz_genetlink_get_family_id$ipvs(&(0x7f0000000140), 0xffffffffffffffff) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c0b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x270, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0x98, 0xe0, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2d0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_STATION(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="1b110000", @ANYRES16=r1, @ANYBLOB="010400000000000000001200000008000300", @ANYRES32=r2, @ANYBLOB="0500e40020000000"], 0x24}}, 0x0) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r3, 0x40046f41, 0x76006e) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x80801, 0x0) ioctl$ASHMEM_GET_SIZE(r4, 0x40186f40, 0x550000) r5 = signalfd(r3, &(0x7f0000000200)={[0x7]}, 0x8) ioctl$ASHMEM_GET_SIZE(r5, 0x7704, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1000004, 0x4000010, r4, 0xc15a5000) [ 140.485873][T11329] ubi0: mtd0 is detached [ 140.502383][T11350] ubi0: attaching mtd0 [ 140.514994][T11350] ubi0: scanning is finished 08:02:11 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x15) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) writev(r0, &(0x7f0000001400)=[{&(0x7f0000000140)="ad", 0x1}], 0x1) [ 140.730237][T11350] ubi0 error: ubi_attach_mtd_dev: cannot spawn "ubi_bgt0d", error -4 [ 140.749558][T11362] ubi0: attaching mtd0 [ 140.754399][T11362] ubi0: scanning is finished 08:02:12 executing program 5: syz_genetlink_get_family_id$ipvs(&(0x7f0000000140), 0xffffffffffffffff) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c0b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x270, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0x98, 0xe0, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2d0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_STATION(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="1b110000", @ANYRES16=r1, @ANYBLOB="010400000000000000001200000008000300", @ANYRES32=r2, @ANYBLOB="0500e40020000000"], 0x24}}, 0x0) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r3, 0x40046f41, 0x76006e) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x80801, 0x0) ioctl$ASHMEM_GET_SIZE(r4, 0x40186f40, 0x550000) r5 = signalfd(r3, &(0x7f0000000200)={[0x7]}, 0x8) ioctl$ASHMEM_GET_SIZE(r5, 0x7704, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1000004, 0x4000010, r4, 0xc15a5000) [ 140.890867][T11362] ubi0 error: ubi_attach_mtd_dev: cannot spawn "ubi_bgt0d", error -4 [ 140.913200][T11465] ubi0: attaching mtd0 [ 140.919250][T11465] ubi0: scanning is finished 08:02:12 executing program 2: syz_genetlink_get_family_id$ipvs(&(0x7f0000000140), 0xffffffffffffffff) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c0b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x270, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0x98, 0xe0, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2d0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_STATION(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="1b110000", @ANYRES16=r1, @ANYBLOB="010400000000000000001200000008000300", @ANYRES32=r2, @ANYBLOB="0500e40020000000"], 0x24}}, 0x0) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r3, 0x40046f41, 0x76006e) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x80801, 0x0) ioctl$ASHMEM_GET_SIZE(r4, 0x40186f40, 0x550000) r5 = signalfd(r3, &(0x7f0000000200)={[0x7]}, 0x8) ioctl$ASHMEM_GET_SIZE(r5, 0x7704, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1000004, 0x4000010, r4, 0xc15a5000) [ 141.035446][T11465] ubi0: attached mtd0 (name "mtdram test device", size 0 MiB) [ 141.126428][T11465] ubi0: PEB size: 4096 bytes (4 KiB), LEB size: 3968 bytes [ 141.196202][T11465] ubi0: min./max. I/O unit sizes: 1/64, sub-page size 1 [ 141.280816][T11465] ubi0: VID header offset: 64 (aligned 64), data offset: 128 [ 141.349618][T11465] ubi0: good PEBs: 32, bad PEBs: 0, corrupted PEBs: 0 [ 141.381022][T11465] ubi0: user volume: 0, internal volumes: 1, max. volumes count: 23 [ 141.395836][T11465] ubi0: max/mean erase counter: 1/1, WL threshold: 4096, image sequence number: 1956362979 [ 141.411399][T11465] ubi0: available PEBs: 28, total reserved PEBs: 4, PEBs reserved for bad PEB handling: 0 [ 141.531655][T11618] ubi0: background thread "ubi_bgt0d" started, PID 11618 [ 141.541706][T11470] ubi: mtd0 is already attached to ubi0 [ 141.554975][T11525] ubi0: detaching mtd0 [ 141.571795][T11525] ubi0: mtd0 is detached [ 141.606392][T11537] ubi0: attaching mtd0 [ 141.611384][T11537] ubi0: scanning is finished 08:02:12 executing program 3: syz_genetlink_get_family_id$ipvs(&(0x7f0000000140), 0xffffffffffffffff) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c0b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x270, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0x98, 0xe0, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2d0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_STATION(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="1b110000", @ANYRES16=r1, @ANYBLOB="010400000000000000001200000008000300", @ANYRES32=r2, @ANYBLOB="0500e40020000000"], 0x24}}, 0x0) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r3, 0x40046f41, 0x76006e) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x80801, 0x0) ioctl$ASHMEM_GET_SIZE(r4, 0x40186f40, 0x550000) r5 = signalfd(r3, &(0x7f0000000200)={[0x7]}, 0x8) ioctl$ASHMEM_GET_SIZE(r5, 0x7704, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1000004, 0x4000010, r4, 0xc15a5000) 08:02:12 executing program 4: syz_genetlink_get_family_id$ipvs(&(0x7f0000000140), 0xffffffffffffffff) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c0b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x270, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0x98, 0xe0, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2d0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_STATION(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="1b110000", @ANYRES16=r1, @ANYBLOB="010400000000000000001200000008000300", @ANYRES32=r2, @ANYBLOB="0500e40020000000"], 0x24}}, 0x0) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r3, 0x40046f41, 0x76006e) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x80801, 0x0) ioctl$ASHMEM_GET_SIZE(r4, 0x40186f40, 0x550000) r5 = signalfd(r3, &(0x7f0000000200)={[0x7]}, 0x8) ioctl$ASHMEM_GET_SIZE(r5, 0x7704, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1000004, 0x4000010, r4, 0xc15a5000) 08:02:12 executing program 0: syz_genetlink_get_family_id$ipvs(&(0x7f0000000140), 0xffffffffffffffff) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c0b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x270, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0x98, 0xe0, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2d0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_STATION(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="1b110000", @ANYRES16=r1, @ANYBLOB="010400000000000000001200000008000300", @ANYRES32=r2, @ANYBLOB="0500e40020000000"], 0x24}}, 0x0) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r3, 0x40046f41, 0x76006e) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x80801, 0x0) ioctl$ASHMEM_GET_SIZE(r4, 0x40186f40, 0x550000) r5 = signalfd(r3, &(0x7f0000000200)={[0x7]}, 0x8) ioctl$ASHMEM_GET_SIZE(r5, 0x7704, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1000004, 0x4000010, r4, 0xc15a5000) [ 141.776165][T11537] ubi0 error: ubi_attach_mtd_dev: cannot spawn "ubi_bgt0d", error -4 [ 141.801826][T11610] ubi0: attaching mtd0 [ 141.808886][T11610] ubi0: scanning is finished 08:02:13 executing program 1: syz_genetlink_get_family_id$ipvs(&(0x7f0000000140), 0xffffffffffffffff) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c0b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x270, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0x98, 0xe0, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2d0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_STATION(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="1b110000", @ANYRES16=r1, @ANYBLOB="010400000000000000001200000008000300", @ANYRES32=r2, @ANYBLOB="0500e40020000000"], 0x24}}, 0x0) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r3, 0x40046f41, 0x76006e) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x80801, 0x0) ioctl$ASHMEM_GET_SIZE(r4, 0x40186f40, 0x550000) r5 = signalfd(r3, &(0x7f0000000200)={[0x7]}, 0x8) ioctl$ASHMEM_GET_SIZE(r5, 0x7704, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1000004, 0x4000010, r4, 0xc15a5000) [ 142.059582][T11610] ubi0 error: ubi_attach_mtd_dev: cannot spawn "ubi_bgt0d", error -4 [ 142.091693][T11635] ubi0: attaching mtd0 [ 142.099561][T11635] ubi0: scanning is finished 08:02:13 executing program 5: syz_genetlink_get_family_id$ipvs(&(0x7f0000000140), 0xffffffffffffffff) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c0b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x270, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0x98, 0xe0, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2d0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_STATION(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="1b110000", @ANYRES16=r1, @ANYBLOB="010400000000000000001200000008000300", @ANYRES32=r2, @ANYBLOB="0500e40020000000"], 0x24}}, 0x0) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r3, 0x40046f41, 0x76006e) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x80801, 0x0) ioctl$ASHMEM_GET_SIZE(r4, 0x40186f40, 0x550000) r5 = signalfd(r3, &(0x7f0000000200)={[0x7]}, 0x8) ioctl$ASHMEM_GET_SIZE(r5, 0x7704, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1000004, 0x4000010, r4, 0xc15a5000) [ 142.278221][T11635] ubi0 error: ubi_attach_mtd_dev: cannot spawn "ubi_bgt0d", error -4 [ 142.329451][T11696] ubi0: attaching mtd0 [ 142.363341][T11696] ubi0: scanning is finished 08:02:13 executing program 2: syz_genetlink_get_family_id$ipvs(&(0x7f0000000140), 0xffffffffffffffff) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c0b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x270, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0x98, 0xe0, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2d0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_STATION(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="1b110000", @ANYRES16=r1, @ANYBLOB="010400000000000000001200000008000300", @ANYRES32=r2, @ANYBLOB="0500e40020000000"], 0x24}}, 0x0) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r3, 0x40046f41, 0x76006e) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x80801, 0x0) ioctl$ASHMEM_GET_SIZE(r4, 0x40186f40, 0x550000) r5 = signalfd(r3, &(0x7f0000000200)={[0x7]}, 0x8) ioctl$ASHMEM_GET_SIZE(r5, 0x7704, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1000004, 0x4000010, r4, 0xc15a5000) [ 142.608890][T11696] ubi0: attached mtd0 (name "mtdram test device", size 0 MiB) [ 142.642904][T11696] ubi0: PEB size: 4096 bytes (4 KiB), LEB size: 3968 bytes [ 142.662454][T11696] ubi0: min./max. I/O unit sizes: 1/64, sub-page size 1 [ 142.674848][T11696] ubi0: VID header offset: 64 (aligned 64), data offset: 128 [ 142.684446][T11696] ubi0: good PEBs: 32, bad PEBs: 0, corrupted PEBs: 0 [ 142.693716][T11696] ubi0: user volume: 0, internal volumes: 1, max. volumes count: 23 [ 142.703947][T11696] ubi0: max/mean erase counter: 1/1, WL threshold: 4096, image sequence number: 1956362979 [ 142.717559][T11696] ubi0: available PEBs: 28, total reserved PEBs: 4, PEBs reserved for bad PEB handling: 0 [ 142.733346][T11719] ubi0: background thread "ubi_bgt0d" started, PID 11719 [ 142.749144][T11698] ubi: mtd0 is already attached to ubi0 [ 142.754917][T11697] ubi0: detaching mtd0 [ 142.783557][T11697] ubi0: mtd0 is detached [ 142.802709][T11702] ubi0: attaching mtd0 [ 142.809894][T11702] ubi0: scanning is finished 08:02:14 executing program 0: syz_genetlink_get_family_id$ipvs(&(0x7f0000000140), 0xffffffffffffffff) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c0b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x270, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0x98, 0xe0, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2d0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_STATION(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="1b110000", @ANYRES16=r1, @ANYBLOB="010400000000000000001200000008000300", @ANYRES32=r2, @ANYBLOB="0500e40020000000"], 0x24}}, 0x0) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r3, 0x40046f41, 0x76006e) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x80801, 0x0) ioctl$ASHMEM_GET_SIZE(r4, 0x40186f40, 0x550000) r5 = signalfd(r3, &(0x7f0000000200)={[0x7]}, 0x8) ioctl$ASHMEM_GET_SIZE(r5, 0x7704, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1000004, 0x4000010, r4, 0xc15a5000) 08:02:14 executing program 4: syz_genetlink_get_family_id$ipvs(&(0x7f0000000140), 0xffffffffffffffff) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c0b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x270, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0x98, 0xe0, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2d0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_STATION(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="1b110000", @ANYRES16=r1, @ANYBLOB="010400000000000000001200000008000300", @ANYRES32=r2, @ANYBLOB="0500e40020000000"], 0x24}}, 0x0) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r3, 0x40046f41, 0x76006e) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x80801, 0x0) ioctl$ASHMEM_GET_SIZE(r4, 0x40186f40, 0x550000) r5 = signalfd(r3, &(0x7f0000000200)={[0x7]}, 0x8) ioctl$ASHMEM_GET_SIZE(r5, 0x7704, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1000004, 0x4000010, r4, 0xc15a5000) [ 143.006790][T11702] ubi0 error: ubi_attach_mtd_dev: cannot spawn "ubi_bgt0d", error -4 [ 143.056721][T11704] ubi0: attaching mtd0 [ 143.061685][T11704] ubi0: scanning is finished 08:02:14 executing program 3: syz_genetlink_get_family_id$ipvs(&(0x7f0000000140), 0xffffffffffffffff) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c0b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x270, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0x98, 0xe0, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2d0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_STATION(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="1b110000", @ANYRES16=r1, @ANYBLOB="010400000000000000001200000008000300", @ANYRES32=r2, @ANYBLOB="0500e40020000000"], 0x24}}, 0x0) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r3, 0x40046f41, 0x76006e) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x80801, 0x0) ioctl$ASHMEM_GET_SIZE(r4, 0x40186f40, 0x550000) r5 = signalfd(r3, &(0x7f0000000200)={[0x7]}, 0x8) ioctl$ASHMEM_GET_SIZE(r5, 0x7704, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1000004, 0x4000010, r4, 0xc15a5000) [ 143.271496][T11704] ubi0 error: ubi_attach_mtd_dev: cannot spawn "ubi_bgt0d", error -4 [ 143.356770][T11715] ubi0: attaching mtd0 [ 143.361761][T11715] ubi0: scanning is finished 08:02:14 executing program 1: syz_genetlink_get_family_id$ipvs(&(0x7f0000000140), 0xffffffffffffffff) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c0b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x270, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0x98, 0xe0, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2d0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_STATION(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="1b110000", @ANYRES16=r1, @ANYBLOB="010400000000000000001200000008000300", @ANYRES32=r2, @ANYBLOB="0500e40020000000"], 0x24}}, 0x0) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r3, 0x40046f41, 0x76006e) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x80801, 0x0) ioctl$ASHMEM_GET_SIZE(r4, 0x40186f40, 0x550000) r5 = signalfd(r3, &(0x7f0000000200)={[0x7]}, 0x8) ioctl$ASHMEM_GET_SIZE(r5, 0x7704, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1000004, 0x4000010, r4, 0xc15a5000) [ 143.527748][T11715] ubi0 error: ubi_attach_mtd_dev: cannot spawn "ubi_bgt0d", error -4 [ 143.544040][T11722] ubi0: attaching mtd0 [ 143.549968][T11722] ubi0: scanning is finished 08:02:14 executing program 5: syz_genetlink_get_family_id$ipvs(&(0x7f0000000140), 0xffffffffffffffff) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c0b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x270, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0x98, 0xe0, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2d0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_STATION(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="1b110000", @ANYRES16=r1, @ANYBLOB="010400000000000000001200000008000300", @ANYRES32=r2, @ANYBLOB="0500e40020000000"], 0x24}}, 0x0) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r3, 0x40046f41, 0x76006e) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x80801, 0x0) ioctl$ASHMEM_GET_SIZE(r4, 0x40186f40, 0x550000) r5 = signalfd(r3, &(0x7f0000000200)={[0x7]}, 0x8) ioctl$ASHMEM_GET_SIZE(r5, 0x7704, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1000004, 0x4000010, r4, 0xc15a5000) [ 143.753033][T11722] ubi0 error: ubi_attach_mtd_dev: cannot spawn "ubi_bgt0d", error -4 08:02:15 executing program 2: syz_genetlink_get_family_id$ipvs(&(0x7f0000000140), 0xffffffffffffffff) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c0b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x270, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0x98, 0xe0, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2d0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_STATION(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="1b110000", @ANYRES16=r1, @ANYBLOB="010400000000000000001200000008000300", @ANYRES32=r2, @ANYBLOB="0500e40020000000"], 0x24}}, 0x0) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r3, 0x40046f41, 0x76006e) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x80801, 0x0) ioctl$ASHMEM_GET_SIZE(r4, 0x40186f40, 0x550000) r5 = signalfd(r3, &(0x7f0000000200)={[0x7]}, 0x8) ioctl$ASHMEM_GET_SIZE(r5, 0x7704, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1000004, 0x4000010, r4, 0xc15a5000) [ 143.804083][T11732] ubi0: attaching mtd0 [ 143.812216][T11732] ubi0: scanning is finished 08:02:15 executing program 0: syz_genetlink_get_family_id$ipvs(&(0x7f0000000140), 0xffffffffffffffff) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c0b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x270, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0x98, 0xe0, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2d0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_STATION(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="1b110000", @ANYRES16=r1, @ANYBLOB="010400000000000000001200000008000300", @ANYRES32=r2, @ANYBLOB="0500e40020000000"], 0x24}}, 0x0) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r3, 0x40046f41, 0x76006e) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x80801, 0x0) ioctl$ASHMEM_GET_SIZE(r4, 0x40186f40, 0x550000) r5 = signalfd(r3, &(0x7f0000000200)={[0x7]}, 0x8) ioctl$ASHMEM_GET_SIZE(r5, 0x7704, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1000004, 0x4000010, r4, 0xc15a5000) [ 143.994432][T11732] ubi0 error: ubi_attach_mtd_dev: cannot spawn "ubi_bgt0d", error -4 [ 144.009489][T11734] ubi0: attaching mtd0 [ 144.014494][T11734] ubi0: scanning is finished [ 144.117641][T11734] ubi0 error: ubi_attach_mtd_dev: cannot spawn "ubi_bgt0d", error -4 [ 144.178130][T11745] ubi0: attaching mtd0 [ 144.184988][T11745] ubi0: scanning is finished 08:02:15 executing program 4: syz_genetlink_get_family_id$ipvs(&(0x7f0000000140), 0xffffffffffffffff) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c0b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x270, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0x98, 0xe0, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2d0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_STATION(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="1b110000", @ANYRES16=r1, @ANYBLOB="010400000000000000001200000008000300", @ANYRES32=r2, @ANYBLOB="0500e40020000000"], 0x24}}, 0x0) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r3, 0x40046f41, 0x76006e) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x80801, 0x0) ioctl$ASHMEM_GET_SIZE(r4, 0x40186f40, 0x550000) r5 = signalfd(r3, &(0x7f0000000200)={[0x7]}, 0x8) ioctl$ASHMEM_GET_SIZE(r5, 0x7704, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1000004, 0x4000010, r4, 0xc15a5000) [ 144.312479][T11745] ubi0 error: ubi_attach_mtd_dev: cannot spawn "ubi_bgt0d", error -4 [ 144.330193][T11748] ubi0: attaching mtd0 [ 144.340242][T11748] ubi0: scanning is finished 08:02:15 executing program 3: syz_genetlink_get_family_id$ipvs(&(0x7f0000000140), 0xffffffffffffffff) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c0b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x270, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0x98, 0xe0, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2d0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_STATION(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="1b110000", @ANYRES16=r1, @ANYBLOB="010400000000000000001200000008000300", @ANYRES32=r2, @ANYBLOB="0500e40020000000"], 0x24}}, 0x0) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r3, 0x40046f41, 0x76006e) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x80801, 0x0) ioctl$ASHMEM_GET_SIZE(r4, 0x40186f40, 0x550000) r5 = signalfd(r3, &(0x7f0000000200)={[0x7]}, 0x8) ioctl$ASHMEM_GET_SIZE(r5, 0x7704, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1000004, 0x4000010, r4, 0xc15a5000) [ 144.467296][T11748] ubi0 error: ubi_attach_mtd_dev: cannot spawn "ubi_bgt0d", error -4 [ 144.512463][T11758] ubi0: attaching mtd0 [ 144.522753][T11758] ubi0: scanning is finished 08:02:15 executing program 1: syz_genetlink_get_family_id$ipvs(&(0x7f0000000140), 0xffffffffffffffff) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c0b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x270, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0x98, 0xe0, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2d0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_STATION(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="1b110000", @ANYRES16=r1, @ANYBLOB="010400000000000000001200000008000300", @ANYRES32=r2, @ANYBLOB="0500e40020000000"], 0x24}}, 0x0) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r3, 0x40046f41, 0x76006e) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x80801, 0x0) ioctl$ASHMEM_GET_SIZE(r4, 0x40186f40, 0x550000) r5 = signalfd(r3, &(0x7f0000000200)={[0x7]}, 0x8) ioctl$ASHMEM_GET_SIZE(r5, 0x7704, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1000004, 0x4000010, r4, 0xc15a5000) [ 144.690913][T11758] ubi0: attached mtd0 (name "mtdram test device", size 0 MiB) [ 144.703510][T11758] ubi0: PEB size: 4096 bytes (4 KiB), LEB size: 3968 bytes [ 144.720980][T11758] ubi0: min./max. I/O unit sizes: 1/64, sub-page size 1 [ 144.737565][T11758] ubi0: VID header offset: 64 (aligned 64), data offset: 128 [ 144.745127][T11758] ubi0: good PEBs: 32, bad PEBs: 0, corrupted PEBs: 0 [ 144.752663][T11758] ubi0: user volume: 0, internal volumes: 1, max. volumes count: 23 [ 144.761262][T11758] ubi0: max/mean erase counter: 1/1, WL threshold: 4096, image sequence number: 1956362979 [ 144.771794][T11758] ubi0: available PEBs: 28, total reserved PEBs: 4, PEBs reserved for bad PEB handling: 0 [ 144.782056][T11789] ubi0: background thread "ubi_bgt0d" started, PID 11789 08:02:16 executing program 5: syz_genetlink_get_family_id$ipvs(&(0x7f0000000140), 0xffffffffffffffff) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c0b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x270, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0x98, 0xe0, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2d0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_STATION(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="1b110000", @ANYRES16=r1, @ANYBLOB="010400000000000000001200000008000300", @ANYRES32=r2, @ANYBLOB="0500e40020000000"], 0x24}}, 0x0) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r3, 0x40046f41, 0x76006e) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x80801, 0x0) ioctl$ASHMEM_GET_SIZE(r4, 0x40186f40, 0x550000) r5 = signalfd(r3, &(0x7f0000000200)={[0x7]}, 0x8) ioctl$ASHMEM_GET_SIZE(r5, 0x7704, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1000004, 0x4000010, r4, 0xc15a5000) [ 144.790508][T11757] ubi0: detaching mtd0 [ 144.803423][T11757] ubi0: mtd0 is detached [ 144.819369][T11763] ubi0: attaching mtd0 [ 144.824241][T11763] ubi0: scanning is finished [ 145.043533][T11763] ubi0 error: ubi_attach_mtd_dev: cannot spawn "ubi_bgt0d", error -4 [ 145.060365][T11771] ubi0: attaching mtd0 [ 145.097890][T11771] ubi0: scanning is finished 08:02:16 executing program 2: syz_genetlink_get_family_id$ipvs(&(0x7f0000000140), 0xffffffffffffffff) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c0b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x270, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0x98, 0xe0, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2d0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_STATION(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="1b110000", @ANYRES16=r1, @ANYBLOB="010400000000000000001200000008000300", @ANYRES32=r2, @ANYBLOB="0500e40020000000"], 0x24}}, 0x0) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r3, 0x40046f41, 0x76006e) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x80801, 0x0) ioctl$ASHMEM_GET_SIZE(r4, 0x40186f40, 0x550000) r5 = signalfd(r3, &(0x7f0000000200)={[0x7]}, 0x8) ioctl$ASHMEM_GET_SIZE(r5, 0x7704, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1000004, 0x4000010, r4, 0xc15a5000) [ 145.241246][T11771] ubi0 error: ubi_attach_mtd_dev: cannot spawn "ubi_bgt0d", error -4 [ 145.276649][T11779] ubi0: attaching mtd0 [ 145.283584][T11779] ubi0: scanning is finished 08:02:16 executing program 0: syz_genetlink_get_family_id$ipvs(&(0x7f0000000140), 0xffffffffffffffff) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c0b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x270, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0x98, 0xe0, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2d0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_STATION(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="1b110000", @ANYRES16=r1, @ANYBLOB="010400000000000000001200000008000300", @ANYRES32=r2, @ANYBLOB="0500e40020000000"], 0x24}}, 0x0) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r3, 0x40046f41, 0x76006e) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x80801, 0x0) ioctl$ASHMEM_GET_SIZE(r4, 0x40186f40, 0x550000) r5 = signalfd(r3, &(0x7f0000000200)={[0x7]}, 0x8) ioctl$ASHMEM_GET_SIZE(r5, 0x7704, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1000004, 0x4000010, r4, 0xc15a5000) 08:02:16 executing program 4: syz_genetlink_get_family_id$ipvs(&(0x7f0000000140), 0xffffffffffffffff) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c0b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x270, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0x98, 0xe0, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2d0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_STATION(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="1b110000", @ANYRES16=r1, @ANYBLOB="010400000000000000001200000008000300", @ANYRES32=r2, @ANYBLOB="0500e40020000000"], 0x24}}, 0x0) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r3, 0x40046f41, 0x76006e) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x80801, 0x0) ioctl$ASHMEM_GET_SIZE(r4, 0x40186f40, 0x550000) r5 = signalfd(r3, &(0x7f0000000200)={[0x7]}, 0x8) ioctl$ASHMEM_GET_SIZE(r5, 0x7704, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1000004, 0x4000010, r4, 0xc15a5000) [ 145.410828][T11779] ubi0 error: ubi_attach_mtd_dev: cannot spawn "ubi_bgt0d", error -4 [ 145.435715][T11786] ubi0: attaching mtd0 [ 145.441159][T11786] ubi0: scanning is finished [ 145.544560][T11786] ubi0 error: ubi_attach_mtd_dev: cannot spawn "ubi_bgt0d", error -4 08:02:16 executing program 3: syz_genetlink_get_family_id$ipvs(&(0x7f0000000140), 0xffffffffffffffff) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c0b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x270, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0x98, 0xe0, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2d0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_STATION(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="1b110000", @ANYRES16=r1, @ANYBLOB="010400000000000000001200000008000300", @ANYRES32=r2, @ANYBLOB="0500e40020000000"], 0x24}}, 0x0) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r3, 0x40046f41, 0x76006e) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x80801, 0x0) ioctl$ASHMEM_GET_SIZE(r4, 0x40186f40, 0x550000) r5 = signalfd(r3, &(0x7f0000000200)={[0x7]}, 0x8) ioctl$ASHMEM_GET_SIZE(r5, 0x7704, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1000004, 0x4000010, r4, 0xc15a5000) [ 145.619548][T11793] ubi0: attaching mtd0 [ 145.624508][T11793] ubi0: scanning is finished 08:02:17 executing program 1: syz_genetlink_get_family_id$ipvs(&(0x7f0000000140), 0xffffffffffffffff) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c0b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x270, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0x98, 0xe0, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2d0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_STATION(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="1b110000", @ANYRES16=r1, @ANYBLOB="010400000000000000001200000008000300", @ANYRES32=r2, @ANYBLOB="0500e40020000000"], 0x24}}, 0x0) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r3, 0x40046f41, 0x76006e) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x80801, 0x0) ioctl$ASHMEM_GET_SIZE(r4, 0x40186f40, 0x550000) r5 = signalfd(r3, &(0x7f0000000200)={[0x7]}, 0x8) ioctl$ASHMEM_GET_SIZE(r5, 0x7704, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1000004, 0x4000010, r4, 0xc15a5000) [ 145.738987][T11793] ubi0 error: ubi_attach_mtd_dev: cannot spawn "ubi_bgt0d", error -4 [ 145.757865][T11801] ubi0: attaching mtd0 [ 145.762828][T11801] ubi0: scanning is finished 08:02:17 executing program 5: syz_genetlink_get_family_id$ipvs(&(0x7f0000000140), 0xffffffffffffffff) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c0b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x270, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0x98, 0xe0, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2d0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_STATION(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="1b110000", @ANYRES16=r1, @ANYBLOB="010400000000000000001200000008000300", @ANYRES32=r2, @ANYBLOB="0500e40020000000"], 0x24}}, 0x0) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r3, 0x40046f41, 0x76006e) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x80801, 0x0) ioctl$ASHMEM_GET_SIZE(r4, 0x40186f40, 0x550000) r5 = signalfd(r3, &(0x7f0000000200)={[0x7]}, 0x8) ioctl$ASHMEM_GET_SIZE(r5, 0x7704, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1000004, 0x4000010, r4, 0xc15a5000) [ 145.818032][T11801] ubi0 error: ubi_attach_mtd_dev: cannot spawn "ubi_bgt0d", error -4 [ 145.855912][T11809] ubi0: attaching mtd0 [ 145.860927][T11809] ubi0: scanning is finished [ 146.000111][T11809] ubi0: attached mtd0 (name "mtdram test device", size 0 MiB) [ 146.010023][T11809] ubi0: PEB size: 4096 bytes (4 KiB), LEB size: 3968 bytes [ 146.018711][T11809] ubi0: min./max. I/O unit sizes: 1/64, sub-page size 1 [ 146.025670][T11809] ubi0: VID header offset: 64 (aligned 64), data offset: 128 [ 146.036514][T11809] ubi0: good PEBs: 32, bad PEBs: 0, corrupted PEBs: 0 [ 146.043299][T11809] ubi0: user volume: 0, internal volumes: 1, max. volumes count: 23 [ 146.053969][T11809] ubi0: max/mean erase counter: 1/1, WL threshold: 4096, image sequence number: 1956362979 [ 146.064965][T11809] ubi0: available PEBs: 28, total reserved PEBs: 4, PEBs reserved for bad PEB handling: 0 [ 146.124403][T11811] ubi0: detaching mtd0 [ 146.124449][T11845] ubi0: background thread "ubi_bgt0d" started, PID 11845 08:02:17 executing program 2: syz_genetlink_get_family_id$ipvs(&(0x7f0000000140), 0xffffffffffffffff) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c0b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x270, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0x98, 0xe0, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2d0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_STATION(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="1b110000", @ANYRES16=r1, @ANYBLOB="010400000000000000001200000008000300", @ANYRES32=r2, @ANYBLOB="0500e40020000000"], 0x24}}, 0x0) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r3, 0x40046f41, 0x76006e) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x80801, 0x0) ioctl$ASHMEM_GET_SIZE(r4, 0x40186f40, 0x550000) r5 = signalfd(r3, &(0x7f0000000200)={[0x7]}, 0x8) ioctl$ASHMEM_GET_SIZE(r5, 0x7704, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1000004, 0x4000010, r4, 0xc15a5000) [ 146.173593][T11811] ubi0: mtd0 is detached [ 146.179852][T11817] ubi0: attaching mtd0 [ 146.184939][T11817] ubi0: scanning is finished [ 146.258171][T11817] ubi0: attached mtd0 (name "mtdram test device", size 0 MiB) [ 146.269132][T11817] ubi0: PEB size: 4096 bytes (4 KiB), LEB size: 3968 bytes [ 146.276988][T11817] ubi0: min./max. I/O unit sizes: 1/64, sub-page size 1 [ 146.284138][T11817] ubi0: VID header offset: 64 (aligned 64), data offset: 128 [ 146.292010][T11817] ubi0: good PEBs: 32, bad PEBs: 0, corrupted PEBs: 0 [ 146.299582][T11817] ubi0: user volume: 0, internal volumes: 1, max. volumes count: 23 [ 146.309983][T11817] ubi0: max/mean erase counter: 1/1, WL threshold: 4096, image sequence number: 1956362979 [ 146.321860][T11817] ubi0: available PEBs: 28, total reserved PEBs: 4, PEBs reserved for bad PEB handling: 0 [ 146.336411][T11822] ubi0: detaching mtd0 [ 146.338149][T11853] ubi0: background thread "ubi_bgt0d" started, PID 11853 08:02:17 executing program 0: syz_genetlink_get_family_id$ipvs(&(0x7f0000000140), 0xffffffffffffffff) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c0b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x270, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0x98, 0xe0, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2d0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_STATION(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="1b110000", @ANYRES16=r1, @ANYBLOB="010400000000000000001200000008000300", @ANYRES32=r2, @ANYBLOB="0500e40020000000"], 0x24}}, 0x0) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r3, 0x40046f41, 0x76006e) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x80801, 0x0) ioctl$ASHMEM_GET_SIZE(r4, 0x40186f40, 0x550000) r5 = signalfd(r3, &(0x7f0000000200)={[0x7]}, 0x8) ioctl$ASHMEM_GET_SIZE(r5, 0x7704, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1000004, 0x4000010, r4, 0xc15a5000) [ 146.362279][T11822] ubi0: mtd0 is detached [ 146.378497][T11825] ubi0: attaching mtd0 [ 146.383816][T11825] ubi0: scanning is finished 08:02:17 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x15) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) writev(r0, &(0x7f0000001400)=[{&(0x7f0000000140)="ad", 0x1}], 0x1) [ 146.466586][T11825] ubi0 error: ubi_attach_mtd_dev: cannot spawn "ubi_bgt0d", error -4 [ 146.479593][T11832] ubi0: attaching mtd0 [ 146.484597][T11832] ubi0: scanning is finished [ 146.534004][T11832] ubi0: attached mtd0 (name "mtdram test device", size 0 MiB) [ 146.558172][T11832] ubi0: PEB size: 4096 bytes (4 KiB), LEB size: 3968 bytes [ 146.571557][T11832] ubi0: min./max. I/O unit sizes: 1/64, sub-page size 1 [ 146.585463][T11832] ubi0: VID header offset: 64 (aligned 64), data offset: 128 [ 146.624693][T11832] ubi0: good PEBs: 32, bad PEBs: 0, corrupted PEBs: 0 [ 146.652781][T11832] ubi0: user volume: 0, internal volumes: 1, max. volumes count: 23 [ 146.671752][T11832] ubi0: max/mean erase counter: 1/1, WL threshold: 4096, image sequence number: 1956362979 [ 146.738596][T11832] ubi0: available PEBs: 28, total reserved PEBs: 4, PEBs reserved for bad PEB handling: 0 [ 146.788517][T11868] ubi0: background thread "ubi_bgt0d" started, PID 11868 [ 146.804422][T11837] ubi0: detaching mtd0 [ 146.828725][T11837] ubi0: mtd0 is detached 08:02:18 executing program 3: syz_genetlink_get_family_id$ipvs(&(0x7f0000000140), 0xffffffffffffffff) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c0b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x270, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0x98, 0xe0, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2d0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_STATION(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="1b110000", @ANYRES16=r1, @ANYBLOB="010400000000000000001200000008000300", @ANYRES32=r2, @ANYBLOB="0500e40020000000"], 0x24}}, 0x0) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r3, 0x40046f41, 0x76006e) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x80801, 0x0) ioctl$ASHMEM_GET_SIZE(r4, 0x40186f40, 0x550000) r5 = signalfd(r3, &(0x7f0000000200)={[0x7]}, 0x8) ioctl$ASHMEM_GET_SIZE(r5, 0x7704, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1000004, 0x4000010, r4, 0xc15a5000) [ 146.858937][T11841] ubi0: attaching mtd0 [ 146.924516][T11841] ubi0: scanning is finished 08:02:18 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x15) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) writev(r0, &(0x7f0000001400)=[{&(0x7f0000000140)="ad", 0x1}], 0x1) [ 147.030653][T11841] ubi0 error: ubi_attach_mtd_dev: cannot spawn "ubi_bgt0d", error -4 [ 147.048076][T11843] ubi0: attaching mtd0 [ 147.053148][T11843] ubi0: scanning is finished 08:02:18 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x15) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) writev(r0, &(0x7f0000001400)=[{&(0x7f0000000140)="ad", 0x1}], 0x1) [ 147.162595][T11843] ubi0 error: ubi_attach_mtd_dev: cannot spawn "ubi_bgt0d", error -4 [ 147.196437][T11854] ubi0: attaching mtd0 [ 147.201434][T11854] ubi0: scanning is finished 08:02:18 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x15) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) writev(r0, &(0x7f0000001400)=[{&(0x7f0000000140)="ad", 0x1}], 0x1) [ 147.341289][T11854] ubi0 error: ubi_attach_mtd_dev: cannot spawn "ubi_bgt0d", error -4 [ 147.367581][ T22] ================================================================== [ 147.375674][ T22] BUG: KFENCE: use-after-free read in kvm_fastop_exception+0xf6a/0x1058 [ 147.375674][ T22] [ 147.375717][ T22] Use-after-free read at 0xffff88823bc88020 (in kfence-#67): [ 147.375733][ T22] kvm_fastop_exception+0xf6a/0x1058 [ 147.375762][ T22] d_lookup+0xd8/0x170 [ 147.375787][ T22] lookup_dcache+0x1e/0x130 [ 147.375809][ T22] __lookup_hash+0x29/0x180 [ 147.375833][ T22] kern_path_locked+0x17e/0x320 [ 147.375860][ T22] handle_remove+0xa2/0x5fe [ 147.375886][ T22] devtmpfsd+0x1b9/0x2a3 [ 147.375908][ T22] kthread+0x3e5/0x4d0 [ 147.375932][ T22] ret_from_fork+0x1f/0x30 [ 147.375957][ T22] [ 147.375961][ T22] kfence-#67: 0xffff88823bc88000-0xffff88823bc88fff, size=4096, cache=names_cache [ 147.375961][ T22] [ 147.375981][ T22] allocated by task 22 on cpu 1 at 147.367544s: [ 147.376016][ T22] getname_kernel+0x4e/0x370 [ 147.376046][ T22] kern_path_locked+0x71/0x320 [ 147.376071][ T22] handle_remove+0xa2/0x5fe [ 147.376096][ T22] devtmpfsd+0x1b9/0x2a3 [ 147.376117][ T22] kthread+0x3e5/0x4d0 [ 147.376138][ T22] ret_from_fork+0x1f/0x30 [ 147.376161][ T22] [ 147.376164][ T22] freed by task 22 on cpu 1 at 147.367562s: [ 147.376201][ T22] putname.part.0+0xe1/0x120 [ 147.376223][ T22] kern_path_locked+0xc2/0x320 [ 147.376247][ T22] handle_remove+0xa2/0x5fe [ 147.376272][ T22] devtmpfsd+0x1b9/0x2a3 [ 147.376292][ T22] kthread+0x3e5/0x4d0 [ 147.376312][ T22] ret_from_fork+0x1f/0x30 [ 147.376334][ T22] [ 147.376339][ T22] CPU: 1 PID: 22 Comm: kdevtmpfs Not tainted 5.14.0-rc5-next-20210816-syzkaller #0 [ 147.376363][ T22] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 147.376375][ T22] RIP: 0010:kvm_fastop_exception+0xf6a/0x1058 [ 147.376405][ T22] Code: d3 ed e9 f7 ae 6c f8 49 8d 0e 48 83 e1 f8 4c 8b 21 41 8d 0e 83 e1 07 c1 e1 03 49 d3 ec e9 4d bc 6c f8 49 8d 4d 00 48 83 e1 f8 <4c> 8b 21 41 8d 4d 00 83 e1 07 c1 e1 03 49 d3 ec e9 3d c6 6c f8 bd [ 147.376425][ T22] RSP: 0018:ffffc90000dcfae8 EFLAGS: 00010282 [ 147.376443][ T22] RAX: 00357974746d7367 RBX: ffff88806f4ba330 RCX: ffff88823bc88020 [ 147.376457][ T22] RDX: ffffed100de9746d RSI: 0000000000000007 RDI: 0000000000000007 [ 147.376471][ T22] RBP: 0000000000000007 R08: 0000000000000000 R09: ffff88806f4ba360 [ 147.376485][ T22] R10: ffffed100de9746c R11: 0000000000000000 R12: ffff88823bc88020 [ 147.376501][ T22] R13: ffff88823bc88020 R14: ffff88806f4ba360 R15: dffffc0000000000 [ 147.376517][ T22] FS: 0000000000000000(0000) GS:ffff8880b9d00000(0000) knlGS:0000000000000000 [ 147.376541][ T22] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 147.376559][ T22] CR2: ffff88823bc88020 CR3: 000000006f3f6000 CR4: 00000000001506e0 [ 147.376572][ T22] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 147.376586][ T22] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 147.376601][ T22] Call Trace: [ 147.376613][ T22] d_lookup+0xd8/0x170 [ 147.376638][ T22] lookup_dcache+0x1e/0x130 [ 147.376663][ T22] __lookup_hash+0x29/0x180 [ 147.376689][ T22] kern_path_locked+0x17e/0x320 [ 147.376716][ T22] ? filename_lookup+0x80/0x80 [ 147.376744][ T22] ? rcu_read_lock_sched_held+0xd/0x70 [ 147.376774][ T22] handle_remove+0xa2/0x5fe [ 147.376800][ T22] ? lock_downgrade+0x6e0/0x6e0 [ 147.376823][ T22] ? cacheinfo_cpu_online.cold+0x3e/0x3e [ 147.376853][ T22] ? finish_task_switch.isra.0+0x217/0xa20 [ 147.376877][ T22] ? trace_hardirqs_on+0x5b/0x1c0 [ 147.376901][ T22] ? finish_task_switch.isra.0+0x217/0xa20 [ 147.376924][ T22] ? __switch_to+0x5cc/0x1060 [ 147.376949][ T22] ? rcu_read_lock_sched_held+0xd/0x70 [ 147.376978][ T22] ? lock_acquire+0x442/0x510 [ 147.377001][ T22] ? rcu_read_lock_sched_held+0xd/0x70 [ 147.377030][ T22] ? lock_release+0x522/0x720 [ 147.377058][ T22] ? devtmpfsd+0xaa/0x2a3 [ 147.377080][ T22] ? lock_downgrade+0x6e0/0x6e0 [ 147.377104][ T22] ? do_raw_spin_lock+0x120/0x2b0 [ 147.377130][ T22] ? rwlock_bug.part.0+0x90/0x90 [ 147.377158][ T22] devtmpfsd+0x1b9/0x2a3 [ 147.377182][ T22] ? dmar_validate_one_drhd+0x24d/0x24d [ 147.377209][ T22] kthread+0x3e5/0x4d0 [ 147.377234][ T22] ? set_kthread_struct+0x130/0x130 [ 147.377261][ T22] ret_from_fork+0x1f/0x30 [ 147.377292][ T22] ================================================================== [ 147.377301][ T22] Kernel panic - not syncing: panic_on_warn set ... [ 147.377311][ T22] CPU: 1 PID: 22 Comm: kdevtmpfs Not tainted 5.14.0-rc5-next-20210816-syzkaller #0 [ 147.377334][ T22] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 147.377346][ T22] Call Trace: [ 147.377353][ T22] dump_stack_lvl+0xcd/0x134 [ 147.377375][ T22] panic+0x2b0/0x6dd [ 147.377394][ T22] ? __warn_printk+0xf3/0xf3 [ 147.377417][ T22] ? kfence_report_error.cold+0x2f3/0xa56 [ 147.377451][ T22] kfence_report_error.cold+0x304/0xa56 [ 147.377485][ T22] ? kvm_fastop_exception+0xf6a/0x1058 [ 147.377515][ T22] ? ret_from_fork+0x1f/0x30 [ 147.377540][ T22] ? kfence_print_object+0x2e0/0x2e0 [ 147.377567][ T22] ? deref_stack_reg+0x150/0x150 [ 147.377595][ T22] ? kvm_fastop_exception+0xf6a/0x1058 [ 147.377626][ T22] ? d_lookup+0xd8/0x170 [ 147.377650][ T22] ? lookup_dcache+0x1e/0x130 [ 147.377676][ T22] ? __lookup_hash+0x29/0x180 [ 147.377700][ T22] ? kern_path_locked+0x17e/0x320 [ 147.377727][ T22] ? handle_remove+0xa2/0x5fe [ 147.377754][ T22] ? devtmpfsd+0x1b9/0x2a3 [ 147.377777][ T22] ? kthread+0x3e5/0x4d0 [ 147.377802][ T22] ? ret_from_fork+0x1f/0x30 [ 147.377846][ T22] ? unwind_next_frame+0x3da/0x1ce0 [ 147.377877][ T22] ? ret_from_fork+0x1f/0x30 [ 147.377906][ T22] kfence_handle_page_fault+0x2ed/0x670 [ 147.377931][ T22] ? rcu_read_lock_sched_held+0xd/0x70 [ 147.377961][ T22] page_fault_oops+0x1c5/0x6b0 [ 147.377984][ T22] ? __sanitizer_cov_trace_const_cmp2+0x22/0x80 [ 147.378010][ T22] ? is_prefetch.constprop.0+0xb7/0x530 [ 147.378035][ T22] ? dump_pagetable+0xc0/0xc0 [ 147.378062][ T22] ? pgtable_bad+0x90/0x90 [ 147.378084][ T22] ? search_bpf_extables+0x1d1/0x2f0 [ 147.378107][ T22] ? kvm_fastop_exception+0xf6a/0x1058 [ 147.378138][ T22] kernelmode_fixup_or_oops+0x219/0x280 [ 147.378166][ T22] __bad_area_nosemaphore+0x36d/0x400 [ 147.378192][ T22] ? spurious_kernel_fault+0x38d/0x5b0 [ 147.378219][ T22] do_kern_addr_fault+0x5b/0x70 [ 147.378244][ T22] exc_page_fault+0x155/0x180 [ 147.378267][ T22] asm_exc_page_fault+0x1e/0x30 [ 147.378293][ T22] RIP: 0010:kvm_fastop_exception+0xf6a/0x1058 [ 147.378326][ T22] Code: d3 ed e9 f7 ae 6c f8 49 8d 0e 48 83 e1 f8 4c 8b 21 41 8d 0e 83 e1 07 c1 e1 03 49 d3 ec e9 4d bc 6c f8 49 8d 4d 00 48 83 e1 f8 <4c> 8b 21 41 8d 4d 00 83 e1 07 c1 e1 03 49 d3 ec e9 3d c6 6c f8 bd [ 147.378348][ T22] RSP: 0018:ffffc90000dcfae8 EFLAGS: 00010282 [ 147.378368][ T22] RAX: 00357974746d7367 RBX: ffff88806f4ba330 RCX: ffff88823bc88020 [ 147.378385][ T22] RDX: ffffed100de9746d RSI: 0000000000000007 RDI: 0000000000000007 [ 147.378401][ T22] RBP: 0000000000000007 R08: 0000000000000000 R09: ffff88806f4ba360 [ 147.378417][ T22] R10: ffffed100de9746c R11: 0000000000000000 R12: ffff88823bc88020 [ 147.378437][ T22] R13: ffff88823bc88020 R14: ffff88806f4ba360 R15: dffffc0000000000 [ 147.378461][ T22] ? __d_lookup+0x372/0x720 [ 147.378489][ T22] d_lookup+0xd8/0x170 [ 147.378513][ T22] lookup_dcache+0x1e/0x130 [ 147.378538][ T22] __lookup_hash+0x29/0x180 [ 147.378563][ T22] kern_path_locked+0x17e/0x320 [ 147.378583][ T22] ? filename_lookup+0x80/0x80 [ 147.378609][ T22] ? rcu_read_lock_sched_held+0xd/0x70 [ 147.378633][ T22] handle_remove+0xa2/0x5fe [ 147.378654][ T22] ? lock_downgrade+0x6e0/0x6e0 [ 147.378673][ T22] ? cacheinfo_cpu_online.cold+0x3e/0x3e [ 147.378697][ T22] ? finish_task_switch.isra.0+0x217/0xa20 [ 147.378715][ T22] ? trace_hardirqs_on+0x5b/0x1c0 [ 147.378735][ T22] ? finish_task_switch.isra.0+0x217/0xa20 [ 147.378757][ T22] ? __switch_to+0x5cc/0x1060 [ 147.378777][ T22] ? rcu_read_lock_sched_held+0xd/0x70 [ 147.378800][ T22] ? lock_acquire+0x442/0x510 [ 147.378818][ T22] ? rcu_read_lock_sched_held+0xd/0x70 [ 147.378840][ T22] ? lock_release+0x522/0x720 [ 147.378862][ T22] ? devtmpfsd+0xaa/0x2a3 [ 147.378883][ T22] ? lock_downgrade+0x6e0/0x6e0 [ 147.378902][ T22] ? do_raw_spin_lock+0x120/0x2b0 [ 147.378920][ T22] ? rwlock_bug.part.0+0x90/0x90 [ 147.378941][ T22] devtmpfsd+0x1b9/0x2a3 [ 147.378958][ T22] ? dmar_validate_one_drhd+0x24d/0x24d [ 147.378977][ T22] kthread+0x3e5/0x4d0 [ 147.378995][ T22] ? set_kthread_struct+0x130/0x130 [ 147.379015][ T22] ret_from_fork+0x1f/0x30 [ 147.380375][ T22] Kernel Offset: disabled [ 148.201886][ T22] Rebooting in 86400 seconds..