8577edbc559354f305d4e05c26a2f708bb008ca01368edece7ac1108379664aea7622db8fe0f786d6a4177494b3766d3f6f8e4c69729d1cdef558344c8bab4dfc9bfc6bc56bfa"}) ioctl$BLKTRACESTART(r5, 0x1274, 0x0) 08:17:33 executing program 0: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)=ANY=[@ANYBLOB="02000000010000005087297c328c5dc5", @ANYRES32=0x0, @ANYBLOB="040000000000000010000200000000002000000000000000"], 0x2c, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r3, 0x0) chdir(&(0x7f0000000100)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') 08:17:33 executing program 5: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x305, &(0x7f0000000000)=ANY=[]}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1000000000000304, 0x400000000100) 08:17:33 executing program 1: r0 = socket$inet(0x2, 0x3, 0x2) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000240)='/dev/md0\x00', 0x0, 0x0) ioctl$void(r0, 0x5451) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) mkdir(&(0x7f00000005c0)='./file0\x00', 0x100000000020) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x7f, 0x4, 0x0, 0x0, 0x9, 0xfc, 0x0, 0x9d7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0x7) lstat(&(0x7f00000003c0)='./file0\x00', &(0x7f00000006c0)) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x591800, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/nullb0\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, 0x0) r4 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000180)=ANY=[], &(0x7f0000000140)) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}}, 0x98) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000040)={0x0, 0x3a8e}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f0000000600)={r5, 0x6, 0x140a09e5, 0x3, 0x9961, 0x3}, &(0x7f0000000540)=0x14) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r3, 0x84, 0x19, &(0x7f0000000580)={r6, 0x100}, 0xffffffffffffffe9) ioctl$DRM_IOCTL_GET_SAREA_CTX(r3, 0xc010641d, &(0x7f0000000300)={0x0, &(0x7f0000000480)=""/112}) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm-monitor\x00', 0x200000, 0x0) r7 = dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_CONGESTION(r7, 0x6, 0xd, &(0x7f0000000180)='lp\x00', 0x3) ioctl$VIDIOC_TRY_FMT(r7, 0xc0d05640, &(0x7f0000000400)={0xa, @raw_data="d456e651514154be56c23a0150374fec800b3363d0f8209aea95ae10a4bfe2bc4a059b555ffe32ee49657c21fdaeec9ff08b45f3c5b652502dd578edc616a43da8fa7411c10cf0be3062500d3923e6f93300ce6e6ca32a13179605ca95c9250023e974040392fcffaac49faad6d6549cb1f2e1c7492ba9a8e2d26787e1872027fbe8577edbc559354f305d4e05c26a2f708bb008ca01368edece7ac1108379664aea7622db8fe0f786d6a4177494b3766d3f6f8e4c69729d1cdef558344c8bab4dfc9bfc6bc56bfa"}) ioctl$GIO_UNIMAP(r7, 0x4b66, &(0x7f0000000840)={0x2, &(0x7f0000000280)=[{}, {}]}) clock_gettime(0x0, &(0x7f0000000a40)) select(0x40, &(0x7f0000000200)={0x4, 0x7, 0x3ff, 0x3, 0xffffffffffffffe1, 0x6, 0x4b4, 0x80000001}, &(0x7f00000009c0)={0x4ebe, 0x5, 0x1, 0x7, 0x1, 0x8, 0x7, 0xff}, &(0x7f0000000a00)={0x0, 0xffffffff, 0x80000001, 0x1f, 0xfffffffffffffffd, 0x80, 0x8, 0x8000}, &(0x7f0000000a80)) ioprio_set$pid(0x7, 0x0, 0x9) ioctl$BLKPG(r1, 0x932, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0x7fff) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r8 = request_key(&(0x7f0000000740)='encrypted\x00', &(0x7f0000000b00)={'syz', 0x2}, &(0x7f0000000b40)='./cgroup\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000680)='asymmetric\x00', &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, r8) request_key(&(0x7f00000004c0)='pkcs7_test\x00', &(0x7f0000000500)={'syz', 0x1}, &(0x7f0000000540)='wlan0\x00', 0x0) [ 564.649369][ T8973] BPF:[2] ARRAY (anon) 08:17:33 executing program 0: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r3) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [{0x2, 0x4, r3}], {}, [], {0x10, 0x2}}, 0x2c, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r7, 0x0) chdir(&(0x7f0000000100)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') [ 564.690771][ T8973] BPF:type_id=5 index_type_id=1 nr_elems=63 [ 564.729572][ T8973] BPF: 08:17:33 executing program 4: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [{}], {}, [], {0x10, 0x2}, {0x20, 0x2}}, 0x2c, 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r3, 0x0) chdir(&(0x7f0000000100)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') 08:17:33 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [{}], {}, [], {0x10, 0x2}}, 0x2c, 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r3, 0x0) lstat(&(0x7f0000000600)='./file0/file0\x00', 0x0) [ 564.752574][ T8973] BPF:Invalid index [ 564.765058][ T8973] BPF: [ 564.765058][ T8973] 08:17:33 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x16, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000340)}, 0x42) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0xffffffffa0008000, 0xffffffffffffff3e, 0x0, &(0x7f0000000040)="a34747e865af5cf11e34bdff7a7a5ba0051aae5804d5a05d9b9ff68e12bb4d43a20375ea905795449b957e956aa6", 0x0, 0x401, 0x0, 0x0, 0xfffffffffffffff3}, 0x28) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f0000000240)={0x1ff, 0xc, 0x4, 0x0, 0x27e5, {}, {0x4, 0x8, 0x4, 0x8, 0x7, 0x6, "96669900"}, 0x7, 0x0, @fd=r0, 0x9, 0x0, r2}) r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@struct={0x0, 0x0, 0x0, 0x4, 0x0, 0x9}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x1, 0x3f}}]}}, &(0x7f0000000080)=""/236, 0x3e, 0xec, 0x8}, 0x20) ioctl$EVIOCGLED(r3, 0x80404519, &(0x7f0000000580)=""/250) r4 = socket(0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) dup(0xffffffffffffffff) r5 = dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_CONGESTION(r5, 0x6, 0xd, &(0x7f0000000180)='lp\x00', 0x3) ioctl$VIDIOC_TRY_FMT(r5, 0xc0d05640, &(0x7f0000000400)={0xa, @raw_data="d456e651514154be56c23a0150374fec800b3363d0f8209aea95ae10a4bfe2bc4a059b555ffe32ee49657c21fdaeec9ff08b45f3c5b652502dd578edc616a43da8fa7411c10cf0be3062500d3923e6f93300ce6e6ca32a13179605ca95c9250023e974040392fcffaac49faad6d6549cb1f2e1c7492ba9a8e2d26787e1872027fbe8577edbc559354f305d4e05c26a2f708bb008ca01368edece7ac1108379664aea7622db8fe0f786d6a4177494b3766d3f6f8e4c69729d1cdef558344c8bab4dfc9bfc6bc56bfa"}) ioctl$BLKTRACESTART(r5, 0x1274, 0x0) 08:17:33 executing program 5: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x305, &(0x7f0000000000)=ANY=[]}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1000000000000304, 0x400000000100) 08:17:33 executing program 0: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [{}], {}, [], {0x10, 0x2}}, 0x2c, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r3, 0x0) getpeername$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000040)=0x14) chdir(&(0x7f0000000100)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') 08:17:33 executing program 1: r0 = socket$inet(0x2, 0x3, 0x2) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000240)='/dev/md0\x00', 0x0, 0x0) ioctl$void(r0, 0x5451) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) mkdir(&(0x7f00000005c0)='./file0\x00', 0x100000000020) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x7f, 0x4, 0x0, 0x0, 0x9, 0xfc, 0x0, 0x9d7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0x7) lstat(&(0x7f00000002c0)='./file1\x00', &(0x7f0000000340)) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x591800, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/nullb0\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, 0x0) r4 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000180)=ANY=[], &(0x7f0000000140)) r5 = socket(0xa, 0x1, 0x0) r6 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f0000000780)=ANY=[@ANYBLOB="b59e4127d6cf869ecd034dc4b6b83bb6995c44a78b7b3077d2c78c54ef30d5d1b03ba5e747ef745e535df73374741496455d86a9514cff05687fcc1ffd1782c7d42bccb33ca1458ee98e50432ff728f37091cb0ab5dd621580a30c0e6857a3eea4f36b42f73d5e894b9038c6a6f5dc3fdfa32238d31f", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r5, 0x84, 0x11, &(0x7f0000000100)={r7}, 0x8) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000003c0)={r7, 0x4}, &(0x7f00000006c0)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000000)={r8, @in={{0x2, 0x0, @empty}}, 0x1}, 0x9c) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000040)={0x0, 0x3a8e}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f0000000600)={r9, 0x6, 0x140a09e5, 0x3, 0x9961, 0x3}, &(0x7f0000000540)=0x14) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r3, 0x84, 0x19, &(0x7f0000000580)={r10, 0x100}, 0xffffffffffffffe9) ioctl$DRM_IOCTL_GET_SAREA_CTX(r3, 0xc010641d, &(0x7f0000000300)={0x0, &(0x7f0000000480)=""/112}) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm-monitor\x00', 0x200000, 0x0) r11 = dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_CONGESTION(r11, 0x6, 0xd, &(0x7f0000000180)='lp\x00', 0x3) ioctl$VIDIOC_TRY_FMT(r11, 0xc0d05640, &(0x7f0000000400)={0xa, @raw_data="d456e651514154be56c23a0150374fec800b3363d0f8209aea95ae10a4bfe2bc4a059b555ffe32ee49657c21fdaeec9ff08b45f3c5b652502dd578edc616a43da8fa7411c10cf0be3062500d3923e6f93300ce6e6ca32a13179605ca95c9250023e974040392fcffaac49faad6d6549cb1f2e1c7492ba9a8e2d26787e1872027fbe8577edbc559354f305d4e05c26a2f708bb008ca01368edece7ac1108379664aea7622db8fe0f786d6a4177494b3766d3f6f8e4c69729d1cdef558344c8bab4dfc9bfc6bc56bfa"}) ioctl$GIO_UNIMAP(r11, 0x4b66, &(0x7f0000000840)={0x2, &(0x7f0000000280)=[{}, {}]}) clock_gettime(0x6, &(0x7f0000000a40)={0x0, 0x0}) select(0x40, &(0x7f0000000200)={0x4, 0x7, 0x3ff, 0x3, 0xffffffffffffffe1, 0x6, 0x4b4, 0x80000001}, &(0x7f00000009c0)={0x4ebe, 0x5, 0x1, 0x7, 0x1, 0x8, 0x7, 0x100}, &(0x7f0000000a00)={0x0, 0xffffffff, 0x80000001, 0x1f, 0xfffffffffffffffd, 0x1, 0x8, 0x8000}, &(0x7f0000000a80)={r12, r13/1000+10000}) ioprio_set$pid(0x7, 0x0, 0x9) ioctl$BLKPG(r1, 0x932, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0x7fff) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r14 = add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r14, 0x0) r15 = request_key(&(0x7f0000000740)='syzkaller\x00', &(0x7f0000000b00)={'syz', 0x3}, &(0x7f0000000880)='\x00\x00\x00\x00\x02\x00\x00\x00\x00\x16\x8e\xa8\x1b\x8c\x88\x94\x1b\xe0\x01\x17\xb2\x14\x18\x84\xf2\x8f1\x18\r\xc0\xef\xe8W\x0f\xc0[\xdd\x11\xfa\x8f\xef\x8aW\xa6\xbev\x13\xb1((\xa2[^\xe9\xfd1^\x95\x0e\xd1\x840\a3:\\\xef\x81\a\x8e\xf8\xdc\x00\x80\x00'/88, r14) add_key(&(0x7f0000000680)='asymmetric\x00', &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, r15) request_key(&(0x7f00000004c0)='pkcs7_test\x00', &(0x7f0000000500)={'syz', 0x1}, &(0x7f0000000540)='wlan0\x00', 0x0) 08:17:33 executing program 4: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [{}], {}, [], {0x10, 0x2}, {0x20, 0x2}}, 0x2c, 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r3, 0x0) chdir(&(0x7f0000000100)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') 08:17:33 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [{}], {}, [], {0x10, 0x2}}, 0x2c, 0x0) r2 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r3, 0x0) lstat(&(0x7f0000000600)='./file0/file0\x00', 0x0) [ 565.179623][ T9103] BPF:[2] ARRAY (anon) [ 565.217738][ T9103] BPF:type_id=5 index_type_id=1 nr_elems=63 [ 565.244953][ T9103] BPF: [ 565.248099][ T9103] BPF:Invalid index 08:17:33 executing program 0: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)=ANY=[@ANYBLOB="090000000100"/16, @ANYRES32=0x0, @ANYBLOB="040000000000000010000200000000002000000000000000"], 0x2c, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) mount$9p_xen(&(0x7f0000000000)='syz\x00', &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000180)='9p\x00', 0x100082, &(0x7f0000000200)={'trans=xen,', {[{@cache_loose='cache=loose'}, {@cache_none='cache=none'}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}]}}) chown(&(0x7f00000001c0)='./file0\x00', r3, 0x0) chdir(&(0x7f0000000100)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') [ 565.269912][ T9103] BPF: [ 565.269912][ T9103] 08:17:34 executing program 4: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lsetxattr$system_posix_acl(0x0, &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [{}], {}, [], {0x10, 0x2}, {0x20, 0x2}}, 0x2c, 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r3, 0x0) chdir(&(0x7f0000000100)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') 08:17:34 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x16, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000340)}, 0x42) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0xffffffffa0008000, 0xffffffffffffff3e, 0x0, &(0x7f0000000040)="a34747e865af5cf11e34bdff7a7a5ba0051aae5804d5a05d9b9ff68e12bb4d43a20375ea905795449b957e956aa6", 0x0, 0x401, 0x0, 0x0, 0xfffffffffffffff3}, 0x28) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f0000000240)={0x1ff, 0xc, 0x4, 0x0, 0x27e5, {}, {0x4, 0x8, 0x4, 0x8, 0x7, 0x6, "96669900"}, 0x7, 0x0, @fd=r0, 0x9, 0x0, r2}) r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@struct={0x0, 0x0, 0x0, 0x4, 0x0, 0x9}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x1, 0x3f}}]}}, &(0x7f0000000080)=""/236, 0x3e, 0xec, 0x8}, 0x20) ioctl$EVIOCGLED(r3, 0x80404519, &(0x7f0000000580)=""/250) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) dup(0xffffffffffffffff) r5 = dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_CONGESTION(r5, 0x6, 0xd, &(0x7f0000000180)='lp\x00', 0x3) ioctl$VIDIOC_TRY_FMT(r5, 0xc0d05640, &(0x7f0000000400)={0xa, @raw_data="d456e651514154be56c23a0150374fec800b3363d0f8209aea95ae10a4bfe2bc4a059b555ffe32ee49657c21fdaeec9ff08b45f3c5b652502dd578edc616a43da8fa7411c10cf0be3062500d3923e6f93300ce6e6ca32a13179605ca95c9250023e974040392fcffaac49faad6d6549cb1f2e1c7492ba9a8e2d26787e1872027fbe8577edbc559354f305d4e05c26a2f708bb008ca01368edece7ac1108379664aea7622db8fe0f786d6a4177494b3766d3f6f8e4c69729d1cdef558344c8bab4dfc9bfc6bc56bfa"}) ioctl$BLKTRACESTART(r5, 0x1274, 0x0) 08:17:34 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [{}], {}, [], {0x10, 0x2}}, 0x2c, 0x0) r2 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r3, 0x0) lstat(&(0x7f0000000600)='./file0/file0\x00', 0x0) 08:17:34 executing program 1: r0 = socket$inet(0x2, 0x3, 0x2) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000240)='/dev/md0\x00', 0x0, 0x0) ioctl$void(r0, 0x5451) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) mkdir(&(0x7f00000005c0)='./file0\x00', 0x100000000020) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x7f, 0x4, 0x0, 0x0, 0x9, 0xfc, 0x0, 0x9d7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0x7) lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f00000006c0)) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x591800, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/nullb0\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, 0x0) r4 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000180)=ANY=[], &(0x7f0000000140)) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}}, 0x98) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000040)={0x0, 0x3a8e}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f0000000600)={r5, 0x6, 0x140a09e5, 0x3, 0x9961, 0x3}, &(0x7f0000000540)=0x14) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r3, 0x84, 0x19, &(0x7f0000000580)={r6, 0x100}, 0xffffffffffffffe9) ioctl$DRM_IOCTL_GET_SAREA_CTX(r3, 0xc010641d, &(0x7f0000000300)={0x0, &(0x7f0000000480)=""/112}) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm-monitor\x00', 0x200000, 0x0) r7 = dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_CONGESTION(r7, 0x6, 0xd, &(0x7f0000000180)='lp\x00', 0x3) ioctl$VIDIOC_TRY_FMT(r7, 0xc0d05640, &(0x7f0000000400)={0xa, @raw_data="d456e651514154be56c23a0150374fec800b3363d0f8209aea95ae10a4bfe2bc4a059b555ffe32ee49657c21fdaeec9ff08b45f3c5b652502dd578edc616a43da8fa7411c10cf0be3062500d3923e6f93300ce6e6ca32a13179605ca95c9250023e974040392fcffaac49faad6d6549cb1f2e1c7492ba9a8e2d26787e1872027fbe8577edbc559354f305d4e05c26a2f708bb008ca01368edece7ac1108379664aea7622db8fe0f786d6a4177494b3766d3f6f8e4c69729d1cdef558344c8bab4dfc9bfc6bc56bfa"}) ioctl$GIO_UNIMAP(r7, 0x4b66, &(0x7f0000000840)={0x2, &(0x7f0000000280)=[{}, {}]}) clock_gettime(0x0, &(0x7f0000000a40)={0x0, 0x0}) select(0x40, &(0x7f0000000200)={0x4, 0x7, 0x3ff, 0x3, 0xffffffffffffffe1, 0x6, 0x4b4, 0x80000001}, &(0x7f00000009c0)={0x4ebe, 0x5, 0x1, 0x7, 0x1, 0x8, 0x7, 0x100}, &(0x7f0000000a00)={0x0, 0xffffffff, 0x80000001, 0x1f, 0xfffffffffffffffd, 0x1, 0x8, 0x8000}, &(0x7f0000000a80)={r8, r9/1000+10000}) ioprio_set$pid(0x7, 0x0, 0x9) ioctl$BLKPG(r1, 0x932, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0x7fff) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r10 = request_key(&(0x7f0000000740)='encrypted\x00', &(0x7f0000000b00)={'syz', 0x2}, &(0x7f0000000b40)='./cgroup\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000680)='asymmetric\x00', &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, r10) request_key(&(0x7f00000004c0)='pkcs7_test\x00', &(0x7f0000000500)={'syz', 0x1}, &(0x7f0000000540)='wlan0\x00', 0x0) 08:17:34 executing program 5: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x305, &(0x7f0000000000)=ANY=[]}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1000000000000304, 0x400000000100) 08:17:34 executing program 0: r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) getpeername(r0, &(0x7f0000000200)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000040)=0x80) ioctl$PPPIOCGMRU(r1, 0x80047453, &(0x7f0000000180)) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [{}], {}, [], {0x10, 0x2}}, 0x2c, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket(0x15, 0x4, 0x1) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0xb7de4b961680483, 0x0) chown(&(0x7f00000001c0)='./file0\x00', r5, 0x0) chdir(&(0x7f0000000100)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') [ 565.668461][ T9229] BPF:[2] ARRAY (anon) [ 565.672680][ T9229] BPF:type_id=5 index_type_id=1 nr_elems=63 [ 565.730502][ T9229] BPF: 08:17:34 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [{}], {}, [], {0x10, 0x2}}, 0x2c, 0x0) r2 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r3, 0x0) lstat(&(0x7f0000000600)='./file0/file0\x00', 0x0) [ 565.774625][ T9229] BPF:Invalid index [ 565.783634][ T9229] BPF: [ 565.783634][ T9229] 08:17:34 executing program 4: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lsetxattr$system_posix_acl(0x0, &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [{}], {}, [], {0x10, 0x2}, {0x20, 0x2}}, 0x2c, 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r3, 0x0) chdir(&(0x7f0000000100)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') 08:17:34 executing program 1: r0 = socket$inet(0x2, 0x3, 0x2) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000240)='/dev/md0\x00', 0x0, 0x0) ioctl$void(r0, 0x5451) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) mkdir(&(0x7f00000005c0)='./file0\x00', 0x100000000020) r2 = perf_event_open(&(0x7f000001d000)={0x3, 0x70, 0x7, 0x0, 0x7f, 0x0, 0x0, 0x1, 0x410a1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x7f, 0x4, 0x0, 0x0, 0x9, 0xfc, 0x0, 0x9d7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x2, @perf_config_ext={0x8, 0x7}, 0x0, 0x0, 0x0, 0x0, 0x9, 0xb1b}, 0x0, 0xffefffffffbfffff, 0xffffffffffffffff, 0x5) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0x7) lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x591800, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/nullb0\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, 0x0) r4 = dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_CONGESTION(r4, 0x6, 0xd, &(0x7f0000000180)='lp\x00', 0x3) ioctl$VIDIOC_TRY_FMT(r4, 0xc0d05640, &(0x7f0000000400)={0xa, @raw_data="d456e651514154be56c23a0150374fec800b3363d0f8209aea95ae10a4bfe2bc4a059b555ffe32ee49657c21fdaeec9ff08b45f3c5b652502dd578edc616a43da8fa7411c10cf0be3062500d3923e6f93300ce6e6ca32a13179605ca95c9250023e974040392fcffaac49faad6d6549cb1f2e1c7492ba9a8e2d26787e1872027fbe8577edbc559354f305d4e05c26a2f708bb008ca01368edece7ac1108379664aea7622db8fe0f786d6a4177494b3766d3f6f8e4c69729d1cdef558344c8bab4dfc9bfc6bc56bfa"}) ioctl$DRM_IOCTL_RES_CTX(r4, 0xc0106426, 0x0) r5 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000180)=ANY=[], &(0x7f0000000140)) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}}, 0x98) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000040)={0x0, 0x3a8e}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f0000000600)={r6, 0x6, 0x140a09e5, 0x3, 0x9961, 0x3}, &(0x7f0000000540)=0x14) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r3, 0x84, 0x19, &(0x7f0000000580)={r7, 0x100}, 0xffffffffffffffe9) ioctl$DRM_IOCTL_GET_SAREA_CTX(r3, 0xc010641d, &(0x7f0000000300)={0x0, &(0x7f0000000480)=""/112}) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm-monitor\x00', 0x200000, 0x0) r8 = dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_CONGESTION(r8, 0x6, 0xd, &(0x7f0000000180)='lp\x00', 0x3) ioctl$VIDIOC_TRY_FMT(r8, 0xc0d05640, &(0x7f0000000400)={0x4, @vbi={0x3c, 0x0, 0x100, 0x34324d59, [0x10021, 0x424], [0xffffffff, 0x200], 0x1}}) ioctl$GIO_UNIMAP(r8, 0x4b66, &(0x7f0000000840)={0x2, &(0x7f0000000280)=[{}, {}]}) clock_gettime(0x0, &(0x7f0000000a40)={0x0, 0x0}) select(0x40, &(0x7f0000000200)={0x4, 0x7, 0x3ff, 0x3, 0xffffffffffffffe1, 0x6, 0x4b4, 0x80000001}, &(0x7f00000009c0)={0x4ebe, 0x5, 0x1, 0x7, 0x1, 0x8, 0x7, 0x100}, &(0x7f0000000a00)={0x0, 0xffffffff, 0x80000001, 0x1f, 0xfffffffffffffffd, 0x1, 0x8, 0x8000}, &(0x7f0000000a80)={r9, r10/1000+10000}) ioprio_set$pid(0x7, 0x0, 0x9) ioctl$BLKPG(r1, 0x932, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0x7fff) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r11 = request_key(&(0x7f0000000740)='encrypted\x00', &(0x7f0000000b00)={'syz', 0x2}, &(0x7f0000000b40)='./cgroup\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000680)='asymmetric\x00', &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, r11) request_key(&(0x7f00000004c0)='pkcs7_test\x00', &(0x7f0000000500)={'syz', 0x1}, &(0x7f0000000540)='wlan0\x00', 0x0) 08:17:34 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x16, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000340)}, 0x42) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0xffffffffa0008000, 0xffffffffffffff3e, 0x0, &(0x7f0000000040)="a34747e865af5cf11e34bdff7a7a5ba0051aae5804d5a05d9b9ff68e12bb4d43a20375ea905795449b957e956aa6", 0x0, 0x401, 0x0, 0x0, 0xfffffffffffffff3}, 0x28) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f0000000240)={0x1ff, 0xc, 0x4, 0x0, 0x27e5, {}, {0x4, 0x8, 0x4, 0x8, 0x7, 0x6, "96669900"}, 0x7, 0x0, @fd=r0, 0x9, 0x0, r2}) r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@struct={0x0, 0x0, 0x0, 0x4, 0x0, 0x9}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x1, 0x3f}}]}}, &(0x7f0000000080)=""/236, 0x3e, 0xec, 0x8}, 0x20) ioctl$EVIOCGLED(r3, 0x80404519, &(0x7f0000000580)=""/250) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) dup(0xffffffffffffffff) r5 = dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_CONGESTION(r5, 0x6, 0xd, &(0x7f0000000180)='lp\x00', 0x3) ioctl$VIDIOC_TRY_FMT(r5, 0xc0d05640, &(0x7f0000000400)={0xa, @raw_data="d456e651514154be56c23a0150374fec800b3363d0f8209aea95ae10a4bfe2bc4a059b555ffe32ee49657c21fdaeec9ff08b45f3c5b652502dd578edc616a43da8fa7411c10cf0be3062500d3923e6f93300ce6e6ca32a13179605ca95c9250023e974040392fcffaac49faad6d6549cb1f2e1c7492ba9a8e2d26787e1872027fbe8577edbc559354f305d4e05c26a2f708bb008ca01368edece7ac1108379664aea7622db8fe0f786d6a4177494b3766d3f6f8e4c69729d1cdef558344c8bab4dfc9bfc6bc56bfa"}) ioctl$BLKTRACESTART(r5, 0x1274, 0x0) 08:17:34 executing program 0: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)=ANY=[@ANYBLOB="02000000010000000000000002000500", @ANYRES32=0x0, @ANYBLOB="040000000000000010b58fb907d7dd21b9f1bfb9b00b6700"], 0x2c, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$TIPC_NL_PEER_REMOVE(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000180)={0x20, r2, 0x20d, 0x0, 0x0, {}, [@TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x3}]}]}, 0x20}}, 0x0) sendmsg$TIPC_NL_LINK_GET(r1, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000400)=ANY=[@ANYBLOB="94000000", @ANYRES16=r2, @ANYBLOB="020029bd7000fbdbdf2508000000800001001400020008000100050000000000000080000000380004001400010002004e22ac14143a0000000000000000200002000a004e2300000007ebf02cbd68eab5b58a1942173c6b35d5030000000d0001007564703a73797a30000000000d0001007564703a73797a30000000000d0001007564703a73797a30000000004a7c27db2ec67eac8ed1b53685116842b31d83ee308cb817ff7aef3b592aabb1487cecbfcdd71fc3c61848160cdf94f1881c0c95c574fca81422a4f27ceb548737a434959d1a5527f3c2"], 0x94}, 0x1, 0x0, 0x0, 0x800}, 0x8850) r4 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r6, 0x0) chdir(&(0x7f0000000100)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') 08:17:34 executing program 5: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x305, &(0x7f0000000000)=ANY=[]}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x1000000000000304, 0x400000000100) 08:17:34 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [{}], {}, [], {0x10, 0x2}}, 0x2c, 0x0) r2 = socket(0x10, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r3, 0x0) lstat(&(0x7f0000000600)='./file0/file0\x00', 0x0) [ 566.132122][ T9354] BPF:[2] ARRAY (anon) 08:17:34 executing program 4: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lsetxattr$system_posix_acl(0x0, &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [{}], {}, [], {0x10, 0x2}, {0x20, 0x2}}, 0x2c, 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r3, 0x0) chdir(&(0x7f0000000100)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') [ 566.168623][ T9354] BPF:type_id=5 index_type_id=1 nr_elems=63 [ 566.205146][ T9354] BPF: [ 566.208329][ T9354] BPF:Invalid index [ 566.219233][ T9354] BPF: [ 566.219233][ T9354] 08:17:34 executing program 5: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x305, &(0x7f0000000000)=ANY=[]}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x1000000000000304, 0x400000000100) 08:17:34 executing program 1: r0 = socket$inet(0x2, 0x3, 0x2) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000240)='/dev/md0\x00', 0x0, 0x0) ioctl$void(r0, 0x5451) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) mkdir(&(0x7f00000005c0)='./file0\x00', 0x100000000020) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x7f, 0x4, 0x0, 0x0, 0x9, 0xfc, 0x0, 0x9d7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0x7) lstat(&(0x7f00000002c0)='./file1\x00', &(0x7f0000000340)) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x591800, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/nullb0\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, 0x0) r4 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000180)=ANY=[], &(0x7f0000000140)) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x0, 0x0, 0x18}, 0x9c) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000040)={0x0, 0x3a8e}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f0000000600)={r5, 0x6, 0x140a09e5, 0x3, 0x9961, 0x3}, &(0x7f0000000540)=0x14) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r3, 0x84, 0x19, &(0x7f0000000580)={r6, 0x100}, 0xffffffffffffffe9) ioctl$DRM_IOCTL_GET_SAREA_CTX(r3, 0xc010641d, &(0x7f0000000300)={0x0, &(0x7f0000000480)=""/112}) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm-monitor\x00', 0x200000, 0x0) r7 = dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_CONGESTION(r7, 0x6, 0xd, &(0x7f0000000180)='lp\x00', 0x3) ioctl$VIDIOC_TRY_FMT(r7, 0xc0d05640, &(0x7f0000000400)={0xa, @raw_data="d456e651514154be56c23a0150374fec800b3363d0f8209aea95ae10a4bfe2bc4a059b555ffe32ee49657c21fdaeec9ff08b45f3c5b652502dd578edc616a43da8fa7411c10cf0be3062500d3923e6f93300ce6e6ca32a13179605ca95c9250023e974040392fcffaac49faad6d6549cb1f2e1c7492ba9a8e2d26787e1872027fbe8577edbc559354f305d4e05c26a2f708bb008ca01368edece7ac1108379664aea7622db8fe0f786d6a4177494b3766d3f6f8e4c69729d1cdef558344c8bab4dfc9bfc6bc56bfa"}) ioctl$GIO_UNIMAP(r7, 0x4b66, &(0x7f0000000840)={0x2, &(0x7f0000000280)=[{}, {}]}) clock_gettime(0x0, &(0x7f0000000a40)={0x0, 0x0}) select(0x40, &(0x7f0000000200)={0x4, 0x7, 0x3ff, 0x3, 0xffffffffffffffe1, 0x6, 0x4b4, 0x80000001}, &(0x7f00000009c0)={0x4ebe, 0x5, 0x1, 0x7, 0x1, 0x8, 0x7, 0x100}, &(0x7f0000000a00)={0x0, 0xffffffff, 0x80000001, 0x1f, 0xfffffffffffffffd, 0x1, 0x8, 0x8000}, &(0x7f0000000a80)={r8, r9/1000+10000}) ioprio_set$pid(0x7, 0x0, 0x9) ioctl$BLKPG(r1, 0x932, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0x7fff) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r10 = request_key(&(0x7f0000000740)='encrypted\x00', &(0x7f0000000b00)={'syz', 0x2}, &(0x7f0000000b40)='./cgroup\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000680)='asymmetric\x00', &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, r10) request_key(&(0x7f00000004c0)='pkcs7_test\x00', &(0x7f0000000500)={'syz', 0x1}, &(0x7f0000000540)='wlan0\x00', 0x0) 08:17:35 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x16, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000340)}, 0x42) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0xffffffffa0008000, 0xffffffffffffff3e, 0x0, &(0x7f0000000040)="a34747e865af5cf11e34bdff7a7a5ba0051aae5804d5a05d9b9ff68e12bb4d43a20375ea905795449b957e956aa6", 0x0, 0x401, 0x0, 0x0, 0xfffffffffffffff3}, 0x28) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f0000000240)={0x1ff, 0xc, 0x4, 0x0, 0x27e5, {}, {0x4, 0x8, 0x4, 0x8, 0x7, 0x6, "96669900"}, 0x7, 0x0, @fd=r0, 0x9, 0x0, r2}) r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@struct={0x0, 0x0, 0x0, 0x4, 0x0, 0x9}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x1, 0x3f}}]}}, &(0x7f0000000080)=""/236, 0x3e, 0xec, 0x8}, 0x20) ioctl$EVIOCGLED(r3, 0x80404519, &(0x7f0000000580)=""/250) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) dup(0xffffffffffffffff) r5 = dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_CONGESTION(r5, 0x6, 0xd, &(0x7f0000000180)='lp\x00', 0x3) ioctl$VIDIOC_TRY_FMT(r5, 0xc0d05640, &(0x7f0000000400)={0xa, @raw_data="d456e651514154be56c23a0150374fec800b3363d0f8209aea95ae10a4bfe2bc4a059b555ffe32ee49657c21fdaeec9ff08b45f3c5b652502dd578edc616a43da8fa7411c10cf0be3062500d3923e6f93300ce6e6ca32a13179605ca95c9250023e974040392fcffaac49faad6d6549cb1f2e1c7492ba9a8e2d26787e1872027fbe8577edbc559354f305d4e05c26a2f708bb008ca01368edece7ac1108379664aea7622db8fe0f786d6a4177494b3766d3f6f8e4c69729d1cdef558344c8bab4dfc9bfc6bc56bfa"}) ioctl$BLKTRACESTART(r5, 0x1274, 0x0) 08:17:35 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [{}], {}, [], {0x10, 0x2}}, 0x2c, 0x0) r2 = socket(0x10, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r3, 0x0) lstat(&(0x7f0000000600)='./file0/file0\x00', 0x0) 08:17:35 executing program 4: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', 0x0, &(0x7f00000003c0)={{}, {}, [{}], {}, [], {0x10, 0x2}, {0x20, 0x2}}, 0x2c, 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r3, 0x0) chdir(&(0x7f0000000100)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') 08:17:35 executing program 5: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x305, &(0x7f0000000000)=ANY=[]}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x1000000000000304, 0x400000000100) 08:17:35 executing program 0: r0 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvme-fabrics\x00', 0x212880, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(r0, 0xc008551c, &(0x7f0000000040)={0xffffff80, 0x14, [0x9, 0x401, 0xff, 0x8000, 0x0]}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [{}], {}, [], {0x10, 0x2}}, 0x2c, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r4, 0x0) chdir(&(0x7f0000000100)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') 08:17:35 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1000000000000304, 0x400000000100) [ 566.617787][ T9482] BPF:[2] ARRAY (anon) 08:17:35 executing program 1: r0 = socket$inet(0x2, 0x3, 0x2) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000240)='/dev/md0\x00', 0x0, 0x0) ioctl$void(r0, 0x5451) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) mkdir(&(0x7f00000005c0)='./file0\x00', 0x100000000020) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x7f, 0x4, 0x0, 0x0, 0x9, 0xfc, 0x0, 0x9d7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0x7) lstat(&(0x7f00000002c0)='./file1\x00', &(0x7f0000000340)) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x591800, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/nullb0\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, 0x0) r4 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000180)=ANY=[], &(0x7f0000000140)) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000780)={0x0, @in6={{0xa, 0x4e23, 0x25, @mcast1, 0xffffffc0}}, 0x0, 0x1000, 0x1, 0x0, 0x40}, 0x43) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000040)={0x0, 0x3a8e}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f0000000600)={r5, 0x6, 0x140a09e5, 0x3, 0x9961, 0x3}, &(0x7f0000000540)=0x14) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r3, 0x84, 0x19, &(0x7f0000000580)={r6, 0x100}, 0xffffffffffffffe9) ioctl$DRM_IOCTL_GET_SAREA_CTX(r3, 0xc010641d, &(0x7f0000000300)={0x0, &(0x7f0000000480)=""/112}) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm-monitor\x00', 0x200000, 0x0) r7 = dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_CONGESTION(r7, 0x6, 0xd, &(0x7f0000000180)='lp\x00', 0x3) ioctl$VIDIOC_TRY_FMT(r7, 0xc0d05640, &(0x7f0000000400)={0xa, @raw_data="d456e651514154be56c23a0150374fec800b3363d0f8209aea95ae10a4bfe2bc4a059b555ffe32ee49657c21fdaeec9ff08b45f3c5b652502dd578edc616a43da8fa7411c10cf0be3062500d3923e6f93300ce6e6ca32a13179605ca95c9250023e974040392fcffaac49faad6d6549cb1f2e1c7492ba9a8e2d26787e1872027fbe8577edbc559354f305d4e05c26a2f708bb008ca01368edece7ac1108379664aea7622db8fe0f786d6a4177494b3766d3f6f8e4c69729d1cdef558344c8bab4dfc9bfc6bc56bfa"}) ioctl$GIO_UNIMAP(r7, 0x4b66, &(0x7f0000000840)={0x2, &(0x7f0000000280)=[{}, {}]}) clock_gettime(0x0, &(0x7f0000000a40)={0x0, 0x0}) select(0x40, &(0x7f0000000200)={0x4, 0x7, 0x3ff, 0x3, 0xffffffffffffffe1, 0x6, 0x4b4, 0x80000001}, &(0x7f00000009c0)={0x4ebe, 0x5, 0x1, 0x7, 0x1, 0x8, 0x7, 0x100}, &(0x7f0000000a00)={0x0, 0xffffffff, 0x80000001, 0x1f, 0xfffffffffffffffd, 0x1, 0x8, 0x8000}, &(0x7f0000000a80)={r8, r9/1000+10000}) ioprio_set$pid(0x7, 0x0, 0x9) ioctl$BLKPG(r1, 0x932, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0x7fff) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r10 = request_key(&(0x7f0000000740)='encrypted\x00', &(0x7f0000000b00)={'syz', 0x2}, &(0x7f0000000b40)='./cgroup\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000680)='asymmetric\x00', &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, r10) request_key(&(0x7f00000004c0)='pkcs7_test\x00', &(0x7f0000000500)={'syz', 0x1}, &(0x7f0000000540)='wlan0\x00', 0x0) 08:17:35 executing program 4: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', 0x0, &(0x7f00000003c0)={{}, {}, [{}], {}, [], {0x10, 0x2}, {0x20, 0x2}}, 0x2c, 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r3, 0x0) chdir(&(0x7f0000000100)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') [ 566.650514][ T9482] BPF:type_id=5 index_type_id=1 nr_elems=63 [ 566.699478][ T9482] BPF: [ 566.713462][ T9482] BPF:Invalid index [ 566.732918][ T9482] BPF: [ 566.732918][ T9482] 08:17:35 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [{}], {}, [], {0x10, 0x2}}, 0x2c, 0x0) r2 = socket(0x10, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r3, 0x0) lstat(&(0x7f0000000600)='./file0/file0\x00', 0x0) 08:17:35 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1000000000000304, 0x400000000100) 08:17:35 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x16, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000340)}, 0x42) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0xffffffffa0008000, 0xffffffffffffff3e, 0x0, &(0x7f0000000040)="a34747e865af5cf11e34bdff7a7a5ba0051aae5804d5a05d9b9ff68e12bb4d43a20375ea905795449b957e956aa6", 0x0, 0x401, 0x0, 0x0, 0xfffffffffffffff3}, 0x28) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f0000000240)={0x1ff, 0xc, 0x4, 0x0, 0x27e5, {}, {0x4, 0x8, 0x4, 0x8, 0x7, 0x6, "96669900"}, 0x7, 0x0, @fd=r0, 0x9, 0x0, r2}) r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@struct={0x0, 0x0, 0x0, 0x4, 0x0, 0x9}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x1, 0x3f}}]}}, &(0x7f0000000080)=""/236, 0x3e, 0xec, 0x8}, 0x20) ioctl$EVIOCGLED(r3, 0x80404519, &(0x7f0000000580)=""/250) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, 0x0, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) dup(0xffffffffffffffff) r5 = dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_CONGESTION(r5, 0x6, 0xd, &(0x7f0000000180)='lp\x00', 0x3) ioctl$VIDIOC_TRY_FMT(r5, 0xc0d05640, &(0x7f0000000400)={0xa, @raw_data="d456e651514154be56c23a0150374fec800b3363d0f8209aea95ae10a4bfe2bc4a059b555ffe32ee49657c21fdaeec9ff08b45f3c5b652502dd578edc616a43da8fa7411c10cf0be3062500d3923e6f93300ce6e6ca32a13179605ca95c9250023e974040392fcffaac49faad6d6549cb1f2e1c7492ba9a8e2d26787e1872027fbe8577edbc559354f305d4e05c26a2f708bb008ca01368edece7ac1108379664aea7622db8fe0f786d6a4177494b3766d3f6f8e4c69729d1cdef558344c8bab4dfc9bfc6bc56bfa"}) ioctl$BLKTRACESTART(r5, 0x1274, 0x0) 08:17:35 executing program 4: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', 0x0, &(0x7f00000003c0)={{}, {}, [{}], {}, [], {0x10, 0x2}, {0x20, 0x2}}, 0x2c, 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r3, 0x0) chdir(&(0x7f0000000100)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') 08:17:35 executing program 0: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) open(&(0x7f0000000000)='./file0/file0\x00', 0x28000, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000580)=ANY=[@ANYBLOB="02000000010000000000000002000000", @ANYRES32=0x0, @ANYBLOB="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"], 0x2c, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r3, 0x0) move_pages(0x0, 0xd4, &(0x7f0000000000), &(0x7f000026bfec), &(0x7f0000002000), 0x0) chdir(&(0x7f0000000100)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') 08:17:35 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1000000000000304, 0x400000000100) 08:17:35 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [{}], {}, [], {0x10, 0x2}}, 0x2c, 0x0) socket(0x10, 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r2, 0x0) lstat(&(0x7f0000000600)='./file0/file0\x00', 0x0) 08:17:35 executing program 1: r0 = socket$inet(0x2, 0x3, 0x2) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000240)='/dev/md0\x00', 0x0, 0x0) ioctl$void(r0, 0x5451) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) mkdir(&(0x7f00000005c0)='./file0\x00', 0x100000000020) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x7f, 0x4, 0x0, 0x0, 0x9, 0xfc, 0x0, 0x9d7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0x7) lstat(&(0x7f00000002c0)='./file1\x00', &(0x7f0000000340)) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x591800, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/nullb0\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000180)=ANY=[], &(0x7f0000000140)) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000780)={0x0, @in6={{0xa, 0x4e24, 0xf2, @mcast2, 0x1}}, 0x0, 0xfffe, 0x0, 0x7, 0x38}, 0x9c) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000040)={0x0, 0x3a8e}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f0000000600)={r5, 0x6, 0x140a09e5, 0x3, 0x9961, 0x3}, &(0x7f0000000540)=0x14) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r3, 0x84, 0x19, &(0x7f0000000580)={r6, 0x100}, 0xffffffffffffffe9) syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x7, 0x101000) r7 = dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_CONGESTION(r7, 0x6, 0xd, &(0x7f0000000180)='lp\x00', 0x3) ioctl$VIDIOC_TRY_FMT(r7, 0xc0d05640, &(0x7f0000000400)={0xa, @raw_data="d456e651514154be56c23a0150374fec800b3363d0f8209aea95ae10a4bfe2bc4a059b555ffe32ee49657c21fdaeec9ff08b45f3c5b652502dd578edc616a43da8fa7411c10cf0be3062500d3923e6f93300ce6e6ca32a13179605ca95c9250023e974040392fcffaac49faad6d6549cb1f2e1c7492ba9a8e2d26787e1872027fbe8577edbc559354f305d4e05c26a2f708bb008ca01368edece7ac1108379664aea7622db8fe0f786d6a4177494b3766d3f6f8e4c69729d1cdef558344c8bab4dfc9bfc6bc56bfa"}) ioctl$DRM_IOCTL_GET_SAREA_CTX(r7, 0xc010641d, &(0x7f0000000080)={0x0, &(0x7f00000006c0)=""/96}) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm-monitor\x00', 0x200000, 0x0) r8 = dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_CONGESTION(r8, 0x6, 0xd, &(0x7f0000000180)='lp\x00', 0x3) ioctl$VIDIOC_TRY_FMT(r8, 0xc0d05640, &(0x7f0000000400)={0xa, @raw_data="d456e651514154be56c23a0150374fec800b3363d0f8209aea95ae10a4bfe2bc4a059b555ffe32ee49657c21fdaeec9ff08b45f3c5b652502dd578edc616a43da8fa7411c10cf0be3062500d3923e6f93300ce6e6ca32a13179605ca95c9250023e974040392fcffaac49faad6d6549cb1f2e1c7492ba9a8e2d26787e1872027fbe8577edbc559354f305d4e05c26a2f708bb008ca01368edece7ac1108379664aea7622db8fe0f786d6a4177494b3766d3f6f8e4c69729d1cdef558344c8bab4dfc9bfc6bc56bfa"}) ioctl$GIO_UNIMAP(r8, 0x4b66, &(0x7f0000000840)={0x2, &(0x7f0000000280)=[{}, {}]}) clock_gettime(0x0, &(0x7f0000000a40)={0x0, 0x0}) select(0x40, &(0x7f0000000200)={0x4, 0x7, 0x3ff, 0x3, 0xffffffffffffffe1, 0x6, 0x4b4, 0x80000001}, &(0x7f00000009c0)={0x4ebe, 0x5, 0x1, 0x7, 0x1, 0x8, 0x7, 0x100}, &(0x7f0000000a00)={0x0, 0xffffffff, 0x80000001, 0x1f, 0xfffffffffffffffd, 0x1, 0x8, 0x8000}, &(0x7f0000000a80)={r9, r10/1000+10000}) ioprio_set$pid(0x7, 0x0, 0x9) ioctl$BLKPG(r1, 0x932, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0x7fff) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r11 = request_key(&(0x7f0000000740)='encrypted\x00', &(0x7f0000000b00)={'syz', 0x2}, &(0x7f00000003c0)='\x00\x00\x00\x00\x00\x00\x00\xa8\xa5,~\xee3\xbf\xa6L\xa2\x9e\x8eS\x00\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000680)='asymmetric\x00', &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, r11) request_key(&(0x7f00000004c0)='pkcs7_test\x00', &(0x7f0000000500)={'syz', 0x1}, &(0x7f0000000540)='wlan0\x00', 0x0) 08:17:35 executing program 4: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', 0x0, 0x0, 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r3, 0x0) chdir(&(0x7f0000000100)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') 08:17:35 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x16, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000340)}, 0x42) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0xffffffffa0008000, 0xffffffffffffff3e, 0x0, &(0x7f0000000040)="a34747e865af5cf11e34bdff7a7a5ba0051aae5804d5a05d9b9ff68e12bb4d43a20375ea905795449b957e956aa6", 0x0, 0x401, 0x0, 0x0, 0xfffffffffffffff3}, 0x28) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f0000000240)={0x1ff, 0xc, 0x4, 0x0, 0x27e5, {}, {0x4, 0x8, 0x4, 0x8, 0x7, 0x6, "96669900"}, 0x7, 0x0, @fd=r0, 0x9, 0x0, r2}) r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@struct={0x0, 0x0, 0x0, 0x4, 0x0, 0x9}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x1, 0x3f}}]}}, &(0x7f0000000080)=""/236, 0x3e, 0xec, 0x8}, 0x20) ioctl$EVIOCGLED(r3, 0x80404519, &(0x7f0000000580)=""/250) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, 0x0, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) dup(0xffffffffffffffff) r5 = dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_CONGESTION(r5, 0x6, 0xd, &(0x7f0000000180)='lp\x00', 0x3) ioctl$VIDIOC_TRY_FMT(r5, 0xc0d05640, &(0x7f0000000400)={0xa, @raw_data="d456e651514154be56c23a0150374fec800b3363d0f8209aea95ae10a4bfe2bc4a059b555ffe32ee49657c21fdaeec9ff08b45f3c5b652502dd578edc616a43da8fa7411c10cf0be3062500d3923e6f93300ce6e6ca32a13179605ca95c9250023e974040392fcffaac49faad6d6549cb1f2e1c7492ba9a8e2d26787e1872027fbe8577edbc559354f305d4e05c26a2f708bb008ca01368edece7ac1108379664aea7622db8fe0f786d6a4177494b3766d3f6f8e4c69729d1cdef558344c8bab4dfc9bfc6bc56bfa"}) ioctl$BLKTRACESTART(r5, 0x1274, 0x0) 08:17:35 executing program 5: sendmsg(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1000000000000304, 0x400000000100) 08:17:35 executing program 0: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [{}], {}, [], {0x10, 0x2}}, 0x2c, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) ioctl$VIDIOC_SUBDEV_G_CROP(0xffffffffffffffff, 0xc038563b, &(0x7f0000000000)={0x0, 0x0, {0x81, 0x7, 0x8, 0x80000000}}) chown(&(0x7f00000001c0)='./file0\x00', r3, 0x0) chdir(&(0x7f0000000100)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') 08:17:36 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [{}], {}, [], {0x10, 0x2}}, 0x2c, 0x0) socket(0x10, 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r2, 0x0) lstat(&(0x7f0000000600)='./file0/file0\x00', 0x0) [ 567.522718][ T9782] BPF:[2] ARRAY (anon) 08:17:36 executing program 4: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', 0x0, 0x0, 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r3, 0x0) chdir(&(0x7f0000000100)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') 08:17:36 executing program 1: r0 = socket$inet(0x2, 0x3, 0x2) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000240)='/dev/md0\x00', 0x0, 0x0) ioctl$void(r0, 0x5451) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) mkdir(&(0x7f00000005c0)='./file0\x00', 0x100000000020) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x7f, 0x4, 0x0, 0x0, 0x9, 0xfc, 0x0, 0x9d7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0x7) lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000780)) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x591800, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/nullb0\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, 0x0) r4 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000180)=ANY=[], &(0x7f0000000140)) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}}, 0x98) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000040)={0x0, 0x3a8e}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f0000000600)={r5, 0x6, 0x140a09e5, 0x3, 0x9961, 0x3}, &(0x7f0000000540)=0x14) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r3, 0x84, 0x19, &(0x7f0000000580)={r6, 0x100}, 0xffffffffffffffe9) ioctl$DRM_IOCTL_GET_SAREA_CTX(r3, 0xc010641d, &(0x7f0000000300)={0x0, &(0x7f0000000480)=""/112}) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm-monitor\x00', 0x200000, 0x0) r7 = dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_CONGESTION(r7, 0x6, 0xd, &(0x7f0000000180)='lp\x00', 0x3) ioctl$VIDIOC_TRY_FMT(r7, 0xc0d05640, &(0x7f0000000400)={0xa, @raw_data="d456e651514154be56c23a0150374fec800b3363d0f8209aea95ae10a4bfe2bc4a059b555ffe32ee49657c21fdaeec9ff08b45f3c5b652502dd578edc616a43da8fa7411c10cf0be3062500d3923e6f93300ce6e6ca32a13179605ca95c9250023e974040392fcffaac49faad6d6549cb1f2e1c7492ba9a8e2d26787e1872027fbe8577edbc559354f305d4e05c26a2f708bb008ca01368edece7ac1108379664aea7622db8fe0f786d6a4177494b3766d3f6f8e4c69729d1cdef558344c8bab4dfc9bfc6bc56bfa"}) ioctl$GIO_UNIMAP(r7, 0x4b66, &(0x7f0000000840)={0x2, &(0x7f0000000280)=[{}, {}]}) clock_gettime(0x0, &(0x7f0000000a40)={0x0, 0x0}) select(0x40, &(0x7f0000000200)={0x4, 0x7, 0x3ff, 0x3, 0xffffffffffffffe1, 0x6, 0x4b4, 0x80000001}, &(0x7f00000009c0)={0x4ebe, 0x5, 0x1, 0x7, 0x1, 0x8, 0x7, 0x100}, &(0x7f0000000a00)={0x0, 0xffffffff, 0x80000001, 0x1f, 0xfffffffffffffffd, 0x1, 0x8, 0x8000}, &(0x7f0000000a80)={r8, r9/1000+10000}) ioprio_set$pid(0x7, 0x0, 0x9) ioctl$BLKPG(r1, 0x932, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0x7fff) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r10 = request_key(&(0x7f0000000740)='encrypted\x00', &(0x7f0000000b00)={'syz', 0x2}, &(0x7f0000000b40)='./cgroup\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000680)='asymmetric\x00', &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, r10) request_key(&(0x7f00000004c0)='pkcs7_test\x00', &(0x7f0000000500)={'syz', 0x1}, &(0x7f0000000540)='wlan0\x00', 0x0) 08:17:36 executing program 5: sendmsg(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1000000000000304, 0x400000000100) [ 567.547039][ T9782] BPF:type_id=5 index_type_id=1 nr_elems=63 [ 567.573179][ T9782] BPF: [ 567.576407][ T9782] BPF:Invalid index [ 567.611049][ T9782] BPF: [ 567.611049][ T9782] 08:17:36 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [{}], {}, [], {0x10, 0x2}}, 0x2c, 0x0) socket(0x10, 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r2, 0x0) lstat(&(0x7f0000000600)='./file0/file0\x00', 0x0) 08:17:36 executing program 0: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000000)="2e0000002e00815be00f80ecdb4cb9040e4865160800030010000000000004140e000a001500cd5edc2976d153b4", 0x2e}], 0x1}, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) r3 = getgid() setresgid(0x0, r3, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r5) lsetxattr$system_posix_acl(&(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000440)=ANY=[@ANYPTR64=&(0x7f0000000540)=ANY=[@ANYRESHEX, @ANYPTR=&(0x7f0000000280)=ANY=[@ANYPTR64, @ANYPTR64, @ANYRES32=r2, @ANYRES64=r3, @ANYRES64=r0], @ANYRESDEC=r5, @ANYRESHEX, @ANYBLOB="90b647321443f66ff3ee48a3a81e9e77c387a9cd53e020f646eb4dc58eef45e8f95ce9180952143849c006577f5731ab2a7ad8a85f436de1916058a725b5c84a4adacccfa05cd3099d0589f3116faa", @ANYRES64], @ANYRESDEC=r1, @ANYBLOB="0400000000000000100002000000000020000000000000009d23f15446c93b5cdfd9d85ef15e002536a7d4"], 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCX25CALLACCPTAPPRV(0xffffffffffffffff, 0x89e8) dup(r6) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ubi_ctrl\x00', 0x200000, 0x0) r7 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f00001c0000/0x2000)=nil, 0x2000, 0x0, 0x6011, r7, 0x0) r8 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f00001c0000/0x2000)=nil, 0x2000, 0x0, 0x6011, r8, 0x0) r9 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f00001c0000/0x2000)=nil, 0x2000, 0x0, 0x6011, r9, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x8) r10 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r10, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r11, 0x0) chdir(&(0x7f0000000100)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') 08:17:36 executing program 5: sendmsg(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1000000000000304, 0x400000000100) 08:17:36 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x16, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000340)}, 0x42) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0xffffffffa0008000, 0xffffffffffffff3e, 0x0, &(0x7f0000000040)="a34747e865af5cf11e34bdff7a7a5ba0051aae5804d5a05d9b9ff68e12bb4d43a20375ea905795449b957e956aa6", 0x0, 0x401, 0x0, 0x0, 0xfffffffffffffff3}, 0x28) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f0000000240)={0x1ff, 0xc, 0x4, 0x0, 0x27e5, {}, {0x4, 0x8, 0x4, 0x8, 0x7, 0x6, "96669900"}, 0x7, 0x0, @fd=r0, 0x9, 0x0, r2}) r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@struct={0x0, 0x0, 0x0, 0x4, 0x0, 0x9}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x1, 0x3f}}]}}, &(0x7f0000000080)=""/236, 0x3e, 0xec, 0x8}, 0x20) ioctl$EVIOCGLED(r3, 0x80404519, &(0x7f0000000580)=""/250) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, 0x0, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) dup(0xffffffffffffffff) r5 = dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_CONGESTION(r5, 0x6, 0xd, &(0x7f0000000180)='lp\x00', 0x3) ioctl$VIDIOC_TRY_FMT(r5, 0xc0d05640, &(0x7f0000000400)={0xa, @raw_data="d456e651514154be56c23a0150374fec800b3363d0f8209aea95ae10a4bfe2bc4a059b555ffe32ee49657c21fdaeec9ff08b45f3c5b652502dd578edc616a43da8fa7411c10cf0be3062500d3923e6f93300ce6e6ca32a13179605ca95c9250023e974040392fcffaac49faad6d6549cb1f2e1c7492ba9a8e2d26787e1872027fbe8577edbc559354f305d4e05c26a2f708bb008ca01368edece7ac1108379664aea7622db8fe0f786d6a4177494b3766d3f6f8e4c69729d1cdef558344c8bab4dfc9bfc6bc56bfa"}) ioctl$BLKTRACESTART(r5, 0x1274, 0x0) 08:17:36 executing program 4: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', 0x0, 0x0, 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r3, 0x0) chdir(&(0x7f0000000100)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') 08:17:36 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [{}], {}, [], {0x10, 0x2}}, 0x2c, 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, 0x0, &(0x7f0000cab000)) chown(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) lstat(&(0x7f0000000600)='./file0/file0\x00', 0x0) 08:17:36 executing program 1: r0 = socket$inet(0x2, 0x3, 0x2) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000240)='/dev/md0\x00', 0x0, 0x0) ioctl$void(r0, 0x5451) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) mkdir(&(0x7f00000005c0)='./file0\x00', 0x100000000020) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x7f, 0x4, 0x0, 0x0, 0x9, 0xfc, 0x0, 0x9d7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0x7) lstat(&(0x7f00000002c0)='./file1\x00', &(0x7f0000000340)) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x591800, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/nullb0\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, 0x0) r4 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000180)=ANY=[], &(0x7f0000000140)) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}}, 0x98) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000040)={0x0, 0x3a8e}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f0000000600)={r5, 0x6, 0x140a09e5, 0x3, 0x9961, 0x3}, &(0x7f0000000540)=0x14) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r3, 0x84, 0x19, &(0x7f0000000580)={r6, 0x100}, 0xffffffffffffffe9) ioctl$DRM_IOCTL_GET_SAREA_CTX(r3, 0xc010641d, &(0x7f0000000300)={0x0, &(0x7f0000000480)=""/112}) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm-monitor\x00', 0x200000, 0x0) r7 = dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_CONGESTION(r7, 0x6, 0xd, &(0x7f0000000180)='lp\x00', 0x3) ioctl$VIDIOC_TRY_FMT(r7, 0xc0d05640, &(0x7f0000000400)={0xa, @raw_data="d456e651514154be56c23a0150374fec800b3363d0f8209aea95ae10a4bfe2bc4a059b555ffe32ee49657c21fdaeec9ff08b45f3c5b652502dd578edc616a43da8fa7411c10cf0be3062500d3923e6f93300ce6e6ca32a13179605ca95c9250023e974040392fcffaac49faad6d6549cb1f2e1c7492ba9a8e2d26787e1872027fbe8577edbc559354f305d4e05c26a2f708bb008ca01368edece7ac1108379664aea7622db8fe0f786d6a4177494b3766d3f6f8e4c69729d1cdef558344c8bab4dfc9bfc6bc56bfa"}) ioctl$GIO_UNIMAP(r7, 0x4b66, &(0x7f0000000840)={0x2, &(0x7f0000000280)=[{}, {}]}) clock_gettime(0x0, &(0x7f0000000a40)={0x0, 0x0}) select(0x40, &(0x7f0000000200)={0x4, 0x7, 0x3ff, 0x3, 0xffffffffffffffe1, 0x6, 0x4b4, 0x80000001}, &(0x7f00000009c0)={0x4ebe, 0x5, 0x1, 0x7, 0x1, 0x8, 0x7, 0x100}, &(0x7f0000000a00)={0x0, 0xffffffff, 0x80000001, 0x1f, 0xfffffffffffffffd, 0x1, 0x8, 0x8000}, &(0x7f0000000a80)={r8, r9/1000+10000}) ioprio_set$pid(0x7, 0x0, 0x9) ioctl$BLKPG(r1, 0x932, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0x7fff) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r10 = request_key(&(0x7f0000000740)='encrypted\x00', &(0x7f0000000b00)={'syz', 0x2}, &(0x7f0000000b40)='./cgroup\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000680)='asymmetric\x00', &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, r10) request_key(&(0x7f00000004c0)='pkcs7_test\x00', &(0x7f0000000500)={'syz', 0x1}, &(0x7f0000000540)='wlan0\x00', 0x0) [ 568.059284][ T9912] BPF:[2] ARRAY (anon) 08:17:36 executing program 5: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1000000000000304, 0x400000000100) [ 568.096349][ T9912] BPF:type_id=5 index_type_id=1 nr_elems=63 [ 568.102422][ T9912] BPF: 08:17:36 executing program 0: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [{}], {}, [], {0x10, 0x2}}, 0x2c, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r3, 0x0) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0/file0\x00', 0x1, 0x8, &(0x7f00000006c0)=[{&(0x7f0000000200)="fc3d1e272f494c689a9dd62246dc573390db45217a3572cb5df62fb5fbdc6cc5bc92f67ada6c8c13399b5dd8714ee9209d8e81bd378a0bbfeb9a943d3c37ad6abf80387ad276282060f82c6a9cc8ed3371a887516d1893e2b6fba032c31ebbde3793277f3158", 0x66}, {&(0x7f0000000400)="33548755919bab626df92a730504f8010381d7fc131bb56fd8f9825989cfef40940c42a6fa66486138d9602830b737ffba59d41b935887d69cf50d982324f873cd9c4dcb2bd0189eb8c2fd191a46e9152171a651dc3bcc752d8bf737f754f08df031fba099c1a6e62180eddaff41459c524a727196e0cf5d352dc8316f17b7ba8f55fcf2a7562d73e50e15a0ee127bbbf837b842ad48d3a41a3dfcbd1aa557d2c4b5dff754ed7c17e0aa9b87a2cfedb151d12e69f29b8b44d3534eb787fb8a0d57055fbaafce37a715012116a5c6e46dd5ea4040", 0xd4, 0x7}, {&(0x7f0000000180)="e3279c9278", 0x5, 0x7}, {&(0x7f0000000280)="738d54b3c6f0c23ceb46016352969d0b8a7eb168958703f76ca72920a7a515fa307b5e53d034d245a87d28edcc381ba05339807f222208d8e2985cf4ad868bd687a7808c34f1d572210d", 0x4a, 0x7}, {&(0x7f0000000500)="faa734462cb2c1b8b3489da572f81660ecccf6feae26c33aaaa735d67419e0d478297b515920d8e22eb54c6ba2f27087e8270e878cd5cd0986e77297eb35fa3f6b6bd8d97606dfc1a8c6b85981e57185a567420b28df0ba60332fe1a901e1ab41db361f6c0e5586609bdc5a8879541308d33464fd252ef17d91c3536290017f6f0890adef483614d", 0x88, 0x8}, {&(0x7f00000005c0)="6610a2f4ab8b919990974b17cf641382530181db225b6919ba4ece22541a45d85ecec315f3a4bf6f4cd1530c5028980b94bff5ef509c130918437a913e98b81841fd4a0e5ec43dfed3d86ce5b39d1fef66bc8f97ee2d0c4493929ec67c4df6522a5ef96c19b66044108f021b74e6015e4dafc8e184615b713a0e40690e9d392ae91cdc5e2fe65e76e074917f30cdf22a6efa5b7628ae33faf68f32fcc671207c4ecda29d80565222dc6406b16086586149806b8197567c166115c98e6dfd33963318cb940890ae059a1b7de14cb208bc0e7ab200652f2052d84251fe29eaa9bdd2771acd7c3c", 0xe6, 0x3ff}, {&(0x7f0000000340)="0b6ebc856b3ea3c3e0e049d4bccff7d0e63977dd640a203a20b3987c698dc401991b93d8d464c2424b29e5943dbf25928768611722ca34d72411f10710cf9deee9f39ccb812f99fb923401b04b613da5b0ec3f5b", 0x54, 0x3}, {&(0x7f0000000840)="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", 0x1000, 0x8}], 0x90000, &(0x7f0000001840)={[], [{@appraise_type='appraise_type=imasig'}]}) chdir(&(0x7f0000000100)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') [ 568.154122][ T9912] BPF:Invalid index [ 568.185857][ T9912] BPF: [ 568.185857][ T9912] 08:17:36 executing program 4: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [], {}, [], {0x10, 0x2}, {0x20, 0x2}}, 0x24, 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r3, 0x0) chdir(&(0x7f0000000100)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') 08:17:36 executing program 5: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1000000000000304, 0x400000000100) 08:17:36 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [{}], {}, [], {0x10, 0x2}}, 0x2c, 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, 0x0, &(0x7f0000cab000)) chown(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) lstat(&(0x7f0000000600)='./file0/file0\x00', 0x0) 08:17:37 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x16, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000340)}, 0x42) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0xffffffffa0008000, 0xffffffffffffff3e, 0x0, &(0x7f0000000040)="a34747e865af5cf11e34bdff7a7a5ba0051aae5804d5a05d9b9ff68e12bb4d43a20375ea905795449b957e956aa6", 0x0, 0x401, 0x0, 0x0, 0xfffffffffffffff3}, 0x28) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f0000000240)={0x1ff, 0xc, 0x4, 0x0, 0x27e5, {}, {0x4, 0x8, 0x4, 0x8, 0x7, 0x6, "96669900"}, 0x7, 0x0, @fd=r0, 0x9, 0x0, r2}) r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@struct={0x0, 0x0, 0x0, 0x4, 0x0, 0x9}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x1, 0x3f}}]}}, &(0x7f0000000080)=""/236, 0x3e, 0xec, 0x8}, 0x20) ioctl$EVIOCGLED(r3, 0x80404519, &(0x7f0000000580)=""/250) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) dup(0xffffffffffffffff) r5 = dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_CONGESTION(r5, 0x6, 0xd, &(0x7f0000000180)='lp\x00', 0x3) ioctl$VIDIOC_TRY_FMT(r5, 0xc0d05640, &(0x7f0000000400)={0xa, @raw_data="d456e651514154be56c23a0150374fec800b3363d0f8209aea95ae10a4bfe2bc4a059b555ffe32ee49657c21fdaeec9ff08b45f3c5b652502dd578edc616a43da8fa7411c10cf0be3062500d3923e6f93300ce6e6ca32a13179605ca95c9250023e974040392fcffaac49faad6d6549cb1f2e1c7492ba9a8e2d26787e1872027fbe8577edbc559354f305d4e05c26a2f708bb008ca01368edece7ac1108379664aea7622db8fe0f786d6a4177494b3766d3f6f8e4c69729d1cdef558344c8bab4dfc9bfc6bc56bfa"}) ioctl$BLKTRACESTART(r5, 0x1274, 0x0) 08:17:37 executing program 0: mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000480)=ANY=[@ANYBLOB="060801100000000000f69600f6ff0000d53267381d3dd5648a902fba7bc3b3ff9fff18cc29d139ffbc8fb97b1204000000d8eab8511c52c9ed1f4d9f7ea378dc0ba86700d34a84f75902ebff73b2ca8b380723d2b9aab632b93742ab23e216be12af14939e4dc724e8c2309862388c6cdf0fa589c4e2d900", @ANYRES32=0x0, @ANYBLOB="040000000000000005000200b68f91130000d34f92c545e21091f99d12eaf0a7002810000000000000"], 0x2c, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000000000)=0xc) chdir(&(0x7f0000000100)='./file0\x00') recvmsg$kcm(r0, &(0x7f0000000440)={&(0x7f0000000240)=@phonet, 0x80, &(0x7f0000000400)=[{&(0x7f00000002c0)=""/96, 0x60}, {&(0x7f0000000340)=""/129, 0x81}], 0x2, &(0x7f0000000840)=""/4096, 0x1000}, 0x40000020) symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') 08:17:37 executing program 1: r0 = socket$inet(0x2, 0x3, 0x2) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000240)='/dev/md0\x00', 0x0, 0x0) ioctl$void(r0, 0x5451) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) mkdir(&(0x7f00000005c0)='./file0\x00', 0x100000000020) r2 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x7f, 0x4, 0x0, 0x0, 0x9, 0xfc, 0x0, 0x9d7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0x7) lstat(&(0x7f00000002c0)='./file1\x00', &(0x7f0000000340)) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x591800, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/nullb0\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) r4 = dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_CONGESTION(r4, 0x6, 0xd, &(0x7f0000000180)='lp\x00', 0x3) ioctl$VIDIOC_TRY_FMT(r4, 0xc0d05640, &(0x7f0000000400)={0xa, @raw_data="d456e651514154be56c23a0150374fec800b3363d0f8209aea95ae10a4bfe2bc4a059b555ffe32ee49657c21fdaeec9ff08b45f3c5b652502dd578edc616a43da8fa7411c10cf0be3062500d3923e6f93300ce6e6ca32a13179605ca95c9250023e974040392fcffaac49faad6d6549cb1f2e1c7492ba9a8e2d26787e1872027fbe8577edbc559354f305d4e05c26a2f708bb008ca01368edece7ac1108379664aea7622db8fe0f786d6a4177494b3766d3f6f8e4c69729d1cdef558344c8bab4dfc9bfc6bc56bfa"}) ioctl$TIOCGPGRP(r3, 0x540f, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, 0x0) r5 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000180)=ANY=[], &(0x7f0000000140)) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}}, 0x98) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000040)={0x0, 0x3a8e}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f0000000600)={r6, 0x6, 0x140a09e5, 0x3, 0x9961, 0x3}, &(0x7f0000000540)=0x14) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r3, 0x84, 0x19, &(0x7f0000000580)={r7, 0x100}, 0xffffffffffffffe9) ioctl$DRM_IOCTL_GET_SAREA_CTX(r3, 0xc010641d, &(0x7f0000000300)={0x0, &(0x7f0000000480)=""/112}) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm-monitor\x00', 0x200000, 0x0) r8 = dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_CONGESTION(r8, 0x6, 0xd, &(0x7f0000000180)='lp\x00', 0x3) ioctl$VIDIOC_TRY_FMT(r8, 0xc0d05640, &(0x7f0000000400)={0xa, @raw_data="d456e651514154be56c23a0150374fec800b3363d0f8209aea95ae10a4bfe2bc4a059b555ffe32ee49657c21fdaeec9ff08b45f3c5b652502dd578edc616a43da8fa7411c10cf0be3062500d3923e6f93300ce6e6ca32a13179605ca95c9250023e974040392fcffaac49faad6d6549cb1f2e1c7492ba9a8e2d26787e1872027fbe8577edbc559354f305d4e05c26a2f708bb008ca01368edece7ac1108379664aea7622db8fe0f786d6a4177494b3766d3f6f8e4c69729d1cdef558344c8bab4dfc9bfc6bc56bfa"}) ioctl$GIO_UNIMAP(r8, 0x4b66, &(0x7f0000000840)={0x2, &(0x7f0000000280)=[{}, {}]}) clock_gettime(0x0, &(0x7f0000000a40)={0x0, 0x0}) select(0x40, &(0x7f0000000200)={0x4, 0x7, 0x3ff, 0x3, 0xffffffffffffffe1, 0x6, 0x4b4, 0x80000001}, &(0x7f00000009c0)={0x4ebe, 0x5, 0x1, 0x7, 0x1, 0x8, 0x7, 0x100}, &(0x7f0000000a00)={0x0, 0xffffffff, 0x80000001, 0x1f, 0xfffffffffffffffd, 0x1, 0x8, 0x8000}, &(0x7f0000000a80)={r9, r10/1000+10000}) ioprio_set$pid(0x7, 0x0, 0x9) ioctl$BLKPG(r1, 0x932, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0x7fff) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r11 = request_key(&(0x7f0000000740)='encrypted\x00', &(0x7f0000000b00)={'syz', 0x2}, &(0x7f0000000b40)='./cgroup\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000680)='asymmetric\x00', &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, r11) request_key(&(0x7f00000004c0)='pkcs7_test\x00', &(0x7f0000000500)={'syz', 0x1}, &(0x7f0000000540)='wlan0\x00', 0x0) [ 568.523187][T10040] BPF:[2] ARRAY (anon) [ 568.540456][T10040] BPF:type_id=5 index_type_id=1 nr_elems=63 08:17:37 executing program 5: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1000000000000304, 0x400000000100) [ 568.575495][T10040] BPF: [ 568.578618][T10040] BPF:Invalid index [ 568.604815][T10040] BPF: [ 568.604815][T10040] 08:17:37 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [{}], {}, [], {0x10, 0x2}}, 0x2c, 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, 0x0, &(0x7f0000cab000)) chown(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) lstat(&(0x7f0000000600)='./file0/file0\x00', 0x0) 08:17:37 executing program 4: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [], {}, [], {0x10, 0x2}, {0x20, 0x2}}, 0x24, 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r3, 0x0) chdir(&(0x7f0000000100)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') 08:17:37 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x16, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000340)}, 0x42) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0xffffffffa0008000, 0xffffffffffffff3e, 0x0, &(0x7f0000000040)="a34747e865af5cf11e34bdff7a7a5ba0051aae5804d5a05d9b9ff68e12bb4d43a20375ea905795449b957e956aa6", 0x0, 0x401, 0x0, 0x0, 0xfffffffffffffff3}, 0x28) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f0000000240)={0x1ff, 0xc, 0x4, 0x0, 0x27e5, {}, {0x4, 0x8, 0x4, 0x8, 0x7, 0x6, "96669900"}, 0x7, 0x0, @fd=r0, 0x9, 0x0, r2}) r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@struct={0x0, 0x0, 0x0, 0x4, 0x0, 0x9}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x1, 0x3f}}]}}, &(0x7f0000000080)=""/236, 0x3e, 0xec, 0x8}, 0x20) ioctl$EVIOCGLED(r3, 0x80404519, &(0x7f0000000580)=""/250) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) dup(0xffffffffffffffff) r5 = dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_CONGESTION(r5, 0x6, 0xd, &(0x7f0000000180)='lp\x00', 0x3) ioctl$VIDIOC_TRY_FMT(r5, 0xc0d05640, &(0x7f0000000400)={0xa, @raw_data="d456e651514154be56c23a0150374fec800b3363d0f8209aea95ae10a4bfe2bc4a059b555ffe32ee49657c21fdaeec9ff08b45f3c5b652502dd578edc616a43da8fa7411c10cf0be3062500d3923e6f93300ce6e6ca32a13179605ca95c9250023e974040392fcffaac49faad6d6549cb1f2e1c7492ba9a8e2d26787e1872027fbe8577edbc559354f305d4e05c26a2f708bb008ca01368edece7ac1108379664aea7622db8fe0f786d6a4177494b3766d3f6f8e4c69729d1cdef558344c8bab4dfc9bfc6bc56bfa"}) ioctl$BLKTRACESTART(r5, 0x1274, 0x0) 08:17:37 executing program 5: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x305, &(0x7f0000000000)=ANY=[]}, 0x0) r0 = syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1000000000000304, 0x400000000100) 08:17:37 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [{}], {}, [], {0x10, 0x2}}, 0x2c, 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) chown(&(0x7f00000001c0)='./file0\x00', r3, 0x0) lstat(&(0x7f0000000600)='./file0/file0\x00', 0x0) 08:17:37 executing program 4: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [], {}, [], {0x10, 0x2}, {0x20, 0x2}}, 0x24, 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r3, 0x0) chdir(&(0x7f0000000100)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') 08:17:37 executing program 1: r0 = socket$inet(0x2, 0x3, 0x2) openat$md(0xffffffffffffff9c, &(0x7f0000000240)='/dev/md0\x00', 0x0, 0x0) ioctl$void(r0, 0x5451) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) mkdir(&(0x7f00000005c0)='./file0\x00', 0x100000000020) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x7f, 0x4, 0x0, 0x0, 0x9, 0xfc, 0x0, 0x9d7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x7) lstat(&(0x7f00000002c0)='./file1\x00', &(0x7f0000000340)) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x591800, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/nullb0\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x0, &(0x7f0000000140)={0xa, 0x4e22, 0x0, @local, 0x5}, 0x1c) close(r3) r4 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000180)=ANY=[], &(0x7f0000000140)) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000000)={0x0, @in6={{0xa, 0x4e24, 0xffff0e52, @remote, 0x1ff}}, 0x0, 0x0, 0xfffffffd}, 0x9c) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000040)={0x0, 0x3a8e}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f0000000600)={r5, 0x6, 0x140a09e5, 0x3, 0x9961, 0x3}, &(0x7f0000000540)=0x14) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r2, 0x84, 0x19, &(0x7f0000000580)={r6, 0x100}, 0xffffffffffffffe9) ioctl$DRM_IOCTL_GET_SAREA_CTX(r2, 0xc010641d, &(0x7f0000000300)={0x0, &(0x7f0000000480)=""/112}) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm-monitor\x00', 0x200000, 0x0) dup(0xffffffffffffffff) [ 569.121175][T10190] BPF:[2] ARRAY (anon) [ 569.147228][T10190] BPF:type_id=5 index_type_id=1 nr_elems=63 [ 569.167716][T10190] BPF: 08:17:37 executing program 4: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [{}], {}, [], {}, {0x20, 0x2}}, 0x2c, 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r3, 0x0) chdir(&(0x7f0000000100)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') 08:17:37 executing program 5: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x305, &(0x7f0000000000)=ANY=[]}, 0x0) r0 = syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1000000000000304, 0x400000000100) [ 569.191377][T10190] BPF:Invalid index [ 569.235003][T10190] BPF: [ 569.235003][T10190] 08:17:38 executing program 0: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)=ANY=[@ANYBLOB="07000000000100000000000010000004", @ANYRES32=0x0, @ANYBLOB="040000000000000010000200000000002000000000000000"], 0x2c, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r3, 0x0) chdir(&(0x7f0000000100)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') 08:17:38 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [{}], {}, [], {0x10, 0x2}}, 0x2c, 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) chown(&(0x7f00000001c0)='./file0\x00', r3, 0x0) lstat(&(0x7f0000000600)='./file0/file0\x00', 0x0) 08:17:38 executing program 1: r0 = socket$inet(0x2, 0x3, 0x2) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000240)='/dev/md0\x00', 0x0, 0x0) ioctl$void(r0, 0x5451) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) mkdir(&(0x7f00000005c0)='./file0\x00', 0x100000000020) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1217, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x7f, 0x4, 0x0, 0x0, 0x9, 0xfc, 0x0, 0x9d7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0x7) lstat(&(0x7f00000002c0)='./file1\x00', &(0x7f0000000340)) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x591800, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/nullb0\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, 0x0) r4 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000180)=ANY=[], &(0x7f0000000140)) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}}, 0x98) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000040)={0x0, 0x3a8e}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f0000000600)={r5, 0x6, 0x140a09e5, 0x3, 0x9961, 0x3}, &(0x7f0000000540)=0x14) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r3, 0x84, 0x19, &(0x7f0000000580)={r6, 0x100}, 0xffffffffffffffe9) r7 = dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_CONGESTION(r7, 0x6, 0xd, &(0x7f0000000180)='lp\x00', 0x3) ioctl$VIDIOC_TRY_FMT(r7, 0xc0d05640, &(0x7f0000000400)={0xa, @raw_data="d456e651514154be56c23a0150374fec800b3363d0f8209aea95ae10a4bfe2bc4a059b555ffe32ee49657c21fdaeec9ff08b45f3c5b652502dd578edc616a43da8fa7411c10cf0be3062500d3923e6f93300ce6e6ca32a13179605ca95c9250023e974040392fcffaac49faad6d6549cb1f2e1c7492ba9a8e2d26787e1872027fbe8577edbc559354f305d4e05c26a2f708bb008ca01368edece7ac1108379664aea7622db8fe0f786d6a4177494b3766d3f6f8e4c69729d1cdef558344c8bab4dfc9bfc6bc56bfa"}) r8 = dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_CONGESTION(r8, 0x6, 0xd, &(0x7f0000000180)='lp\x00', 0x3) ioctl$VIDIOC_TRY_FMT(r8, 0xc0d05640, &(0x7f0000000400)={0xa, @raw_data="d456e651514154be56c23a0150374fec800b3363d0f8209aea95ae10a4bfe2bc4a059b555ffe32ee49657c21fdaeec9ff08b45f3c5b652502dd578edc616a43da8fa7411c10cf0be3062500d3923e6f93300ce6e6ca32a13179605ca95c9250023e974040392fcffaac49faad6d6549cb1f2e1c7492ba9a8e2d26787e1872027fbe8577edbc559354f305d4e05c26a2f708bb008ca01368edece7ac1108379664aea7622db8fe0f786d6a4177494b3766d3f6f8e4c69729d1cdef558344c8bab4dfc9bfc6bc56bfa"}) ioctl$DRM_IOCTL_GET_SAREA_CTX(r8, 0xc010641d, &(0x7f0000000300)={0x0, &(0x7f00000006c0)=""/112}) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm-monitor\x00', 0x200000, 0x0) r9 = dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_CONGESTION(r9, 0x6, 0xd, &(0x7f0000000180)='lp\x00', 0x3) ioctl$VIDIOC_TRY_FMT(r9, 0xc0d05640, &(0x7f0000000400)={0xa, @raw_data="d456e651514154be56c23a0150374fec800b3363d0f8209aea95ae10a4bfe2bc4a059b555ffe32ee49657c21fdaeec9ff08b45f3c5b652502dd578edc616a43da8fa7411c10cf0be3062500d3923e6f93300ce6e6ca32a13179605ca95c9250023e974040392fcffaac49faad6d6549cb1f2e1c7492ba9a8e2d26787e1872027fbe8577edbc559354f305d4e05c26a2f708bb008ca01368edece7ac1108379664aea7622db8fe0f786d6a4177494b3766d3f6f8e4c69729d1cdef558344c8bab4dfc9bfc6bc56bfa"}) ioctl$GIO_UNIMAP(r9, 0x4b66, &(0x7f0000000840)={0x2, &(0x7f0000000280)=[{}, {}]}) clock_gettime(0x0, &(0x7f0000000a40)={0x0, 0x0}) select(0x40, &(0x7f0000000200)={0x4, 0x7, 0x3ff, 0x3, 0xffffffffffffffe1, 0x6, 0x4b4, 0x80000001}, &(0x7f00000009c0)={0x4ebe, 0x5, 0x1, 0x7, 0x1, 0x8, 0x7, 0x100}, &(0x7f0000000a00)={0x0, 0xffffffff, 0x80000001, 0x1f, 0xfffffffffffffffd, 0x1, 0x8, 0x8000}, &(0x7f0000000a80)={r10, r11/1000+10000}) ioprio_set$pid(0x7, 0x0, 0x9) ioctl$BLKPG(r1, 0x932, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0x7fff) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r12 = request_key(&(0x7f0000000740)='encrypted\x00', &(0x7f0000000b00)={'syz', 0x2}, &(0x7f0000000b40)='./cgroup\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000680)='asymmetric\x00', &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, r12) request_key(&(0x7f00000004c0)='pkcs7_test\x00', &(0x7f0000000500)={'syz', 0x1}, &(0x7f0000000540)='wlan0\x00', 0x0) 08:17:38 executing program 4: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [{}], {}, [], {}, {0x20, 0x2}}, 0x2c, 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r3, 0x0) chdir(&(0x7f0000000100)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') 08:17:38 executing program 5: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x305, &(0x7f0000000000)=ANY=[]}, 0x0) r0 = syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1000000000000304, 0x400000000100) 08:17:38 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x16, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000340)}, 0x42) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0xffffffffa0008000, 0xffffffffffffff3e, 0x0, &(0x7f0000000040)="a34747e865af5cf11e34bdff7a7a5ba0051aae5804d5a05d9b9ff68e12bb4d43a20375ea905795449b957e956aa6", 0x0, 0x401, 0x0, 0x0, 0xfffffffffffffff3}, 0x28) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f0000000240)={0x1ff, 0xc, 0x4, 0x0, 0x27e5, {}, {0x4, 0x8, 0x4, 0x8, 0x7, 0x6, "96669900"}, 0x7, 0x0, @fd=r0, 0x9, 0x0, r2}) r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@struct={0x0, 0x0, 0x0, 0x4, 0x0, 0x9}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x1, 0x3f}}]}}, &(0x7f0000000080)=""/236, 0x3e, 0xec, 0x8}, 0x20) ioctl$EVIOCGLED(r3, 0x80404519, &(0x7f0000000580)=""/250) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) dup(0xffffffffffffffff) r5 = dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_CONGESTION(r5, 0x6, 0xd, &(0x7f0000000180)='lp\x00', 0x3) ioctl$VIDIOC_TRY_FMT(r5, 0xc0d05640, &(0x7f0000000400)={0xa, @raw_data="d456e651514154be56c23a0150374fec800b3363d0f8209aea95ae10a4bfe2bc4a059b555ffe32ee49657c21fdaeec9ff08b45f3c5b652502dd578edc616a43da8fa7411c10cf0be3062500d3923e6f93300ce6e6ca32a13179605ca95c9250023e974040392fcffaac49faad6d6549cb1f2e1c7492ba9a8e2d26787e1872027fbe8577edbc559354f305d4e05c26a2f708bb008ca01368edece7ac1108379664aea7622db8fe0f786d6a4177494b3766d3f6f8e4c69729d1cdef558344c8bab4dfc9bfc6bc56bfa"}) ioctl$BLKTRACESTART(r5, 0x1274, 0x0) 08:17:38 executing program 5: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x305, &(0x7f0000000000)=ANY=[]}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1000000000000304, 0x400000000100) [ 569.635156][T10313] BPF:[2] ARRAY (anon) 08:17:38 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [{}], {}, [], {0x10, 0x2}}, 0x2c, 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) chown(&(0x7f00000001c0)='./file0\x00', r3, 0x0) lstat(&(0x7f0000000600)='./file0/file0\x00', 0x0) 08:17:38 executing program 1: r0 = socket$inet(0x2, 0x3, 0x2) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000240)='/dev/md0\x00', 0x0, 0x0) ioctl$void(r0, 0x5451) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) mkdir(&(0x7f00000005c0)='./file0\x00', 0x100000000020) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x7f, 0x4, 0x0, 0x0, 0x9, 0xfc, 0x0, 0x9d7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x1, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0x7) lstat(&(0x7f00000002c0)='./file1\x00', &(0x7f0000000340)) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x591800, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/nullb0\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, 0x0) r4 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000180)=ANY=[], &(0x7f0000000140)) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}}, 0x98) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000040)={0x0, 0x3a8e}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f0000000600)={r5, 0x6, 0x140a09e5, 0x3, 0x9961, 0x3}, &(0x7f0000000540)=0x14) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r3, 0x84, 0x19, &(0x7f0000000580)={r6, 0x100}, 0xffffffffffffffe9) ioctl$DRM_IOCTL_GET_SAREA_CTX(r3, 0xc010641d, &(0x7f0000000300)={0x0, &(0x7f0000000480)=""/112}) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm-monitor\x00', 0x200000, 0x0) r7 = dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_CONGESTION(r7, 0x6, 0xd, &(0x7f0000000180)='lp\x00', 0x3) ioctl$VIDIOC_TRY_FMT(r7, 0xc0d05640, &(0x7f0000000400)={0xa, @raw_data="d456e651514154be56c23a0150374fec800b3363d0f8209aea95ae10a4bfe2bc4a059b555ffe32ee49657c21fdaeec9ff08b45f3c5b652502dd578edc616a43da8fa7411c10cf0be3062500d3923e6f93300ce6e6ca32a13179605ca95c9250023e974040392fcffaac49faad6d6549cb1f2e1c7492ba9a8e2d26787e1872027fbe8577edbc559354f305d4e05c26a2f708bb008ca01368edece7ac1108379664aea7622db8fe0f786d6a4177494b3766d3f6f8e4c69729d1cdef558344c8bab4dfc9bfc6bc56bfa"}) ioctl$GIO_UNIMAP(r7, 0x4b66, &(0x7f0000000840)={0x2, &(0x7f0000000280)=[{}, {}]}) clock_gettime(0x0, &(0x7f0000000a40)={0x0, 0x0}) select(0x40, &(0x7f0000000200)={0x4, 0x0, 0x3ff, 0x3, 0xffffffffffffffe1, 0x20005, 0x4b4, 0x80000001}, &(0x7f00000003c0)={0x4ebe, 0x5, 0x1, 0x7, 0x1, 0x8, 0x7, 0xfe}, &(0x7f0000000a00)={0x1, 0xffffffff, 0x80000001, 0x1f, 0xfffffffffffffffd, 0x1, 0x8, 0x28000}, &(0x7f0000000a80)={r8, r9/1000+10000}) ioctl$BLKPG(r1, 0x932, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0x7fff) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x31, 0x0, 0x0) r10 = request_key(&(0x7f0000000740)='encrypted\x00', &(0x7f0000000b00)={'syz', 0x2}, &(0x7f0000000b40)='./cgroup\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000680)='asymmetric\x00', &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, r10) request_key(&(0x7f00000004c0)='pkcs7_test\x00', &(0x7f0000000500)={'syz', 0x1}, &(0x7f0000000540)='wlan0\x00', 0x0) [ 569.664743][T10313] BPF:type_id=5 index_type_id=1 nr_elems=63 [ 569.670698][T10313] BPF: [ 569.673475][T10313] BPF:Invalid index 08:17:38 executing program 4: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [{}], {}, [], {}, {0x20, 0x2}}, 0x2c, 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r3, 0x0) chdir(&(0x7f0000000100)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') 08:17:38 executing program 0: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [{}], {}, [], {0x10, 0x2}}, 0x2c, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) fsetxattr$trusted_overlay_redirect(r2, &(0x7f0000000000)='trusted.overlay.redirect\x00', &(0x7f0000000040)='./file0/file0\x00', 0xe, 0x3) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) r5 = syz_open_dev$media(&(0x7f0000000740)='/dev/media#\x00', 0x6af6, 0x40800) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r5, &(0x7f00000008c0)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000880)={&(0x7f0000000840)={0x30, 0x0, 0x4, 0x70bd2a, 0x25dfdbfd, {{}, {}, {0x14, 0x19, {0x0, 0x4, 0x5, 0x80}}}, ["", "", "", "", "", ""]}, 0x30}}, 0x20041401) chown(&(0x7f00000001c0)='./file0\x00', r4, 0x0) chdir(&(0x7f0000000100)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') [ 569.770166][T10313] BPF: [ 569.770166][T10313] 08:17:38 executing program 5: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x305, &(0x7f0000000000)=ANY=[]}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1000000000000304, 0x400000000100) 08:17:38 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x16, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffff1971a4f0ff00000000b7060000000000811e6403000000000045040400010000001704000001000a00b7040000000100006a0af2fe00000000850000001a000000b70000000000000095000000000000009e17890efaee5eab7ff8a8cdc21ce784909b849d5550ad855dab54d8877a6db61d69f2ffcaa10350e11cb97c8adf1bc9a0c4ee6d9674c77404ceb9971e43405d621ffbc9a4fd39b0b56bfe6508ebb3c44eb84049761451ce540c772e2d9f8004e26f7fcc059c062234d5595f6fba87b81d1106fb0289ce67a66afd9ac3d09e29a9d542ca9d85a5c9c88474895d679838def0a83a733dc6a39b63a5ed69d32394c53361d7480884bd8048a967d9b912ef9f1d6fee41f5b29d37acb91c61ccd1df673896450f859ce8122a79c3e4"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000340)}, 0x42) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0xffffffffa0008000, 0xffffffffffffff3e, 0x0, &(0x7f0000000040)="a34747e865af5cf11e34bdff7a7a5ba0051aae5804d5a05d9b9ff68e12bb4d43a20375ea905795449b957e956aa6", 0x0, 0x401, 0x0, 0x0, 0xfffffffffffffff3}, 0x28) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f0000000240)={0x1ff, 0xc, 0x4, 0x0, 0x27e5, {}, {0x4, 0x8, 0x4, 0x8, 0x7, 0x6, "96669900"}, 0x7, 0x0, @fd=r0, 0x9, 0x0, r2}) r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@struct={0x0, 0x0, 0x0, 0x4, 0x0, 0x9}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x1, 0x3f}}]}}, &(0x7f0000000080)=""/236, 0x3e, 0xec, 0x8}, 0x20) ioctl$EVIOCGLED(r3, 0x80404519, &(0x7f0000000580)=""/250) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) dup(0xffffffffffffffff) r5 = dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_CONGESTION(r5, 0x6, 0xd, &(0x7f0000000180)='lp\x00', 0x3) ioctl$VIDIOC_TRY_FMT(r5, 0xc0d05640, &(0x7f0000000400)={0xa, @raw_data="d456e651514154be56c23a0150374fec800b3363d0f8209aea95ae10a4bfe2bc4a059b555ffe32ee49657c21fdaeec9ff08b45f3c5b652502dd578edc616a43da8fa7411c10cf0be3062500d3923e6f93300ce6e6ca32a13179605ca95c9250023e974040392fcffaac49faad6d6549cb1f2e1c7492ba9a8e2d26787e1872027fbe8577edbc559354f305d4e05c26a2f708bb008ca01368edece7ac1108379664aea7622db8fe0f786d6a4177494b3766d3f6f8e4c69729d1cdef558344c8bab4dfc9bfc6bc56bfa"}) ioctl$BLKTRACESTART(r5, 0x1274, 0x0) 08:17:38 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [{}], {}, [], {0x10, 0x2}}, 0x2c, 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(0x0, r3, 0x0) lstat(&(0x7f0000000600)='./file0/file0\x00', 0x0) 08:17:38 executing program 4: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [{}], {}, [], {0x10, 0x2}}, 0x2c, 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r3, 0x0) chdir(&(0x7f0000000100)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') 08:17:38 executing program 0: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000200)={{{@in=@remote, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000000)=0xe8) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [{0x2, 0x0, r0}], {}, [], {0x10, 0x3}}, 0x2c, 0x0) r1 = dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000180)='lp\x00', 0x3) ioctl$VIDIOC_TRY_FMT(r1, 0xc0d05640, &(0x7f0000000400)={0xa, @raw_data="d456e651514154be56c23a0150374fec800b3363d0f8209aea95ae10a4bfe2bc4a059b555ffe32ee49657c21fdaeec9ff08b45f3c5b652502dd578edc616a43da8fa7411c10cf0be3062500d3923e6f93300ce6e6ca32a13179605ca95c9250023e974040392fcffaac49faad6d6549cb1f2e1c7492ba9a8e2d26787e1872027fbe8577edbc559354f305d4e05c26a2f708bb008ca01368edece7ac1108379664aea7622db8fe0f786d6a4177494b3766d3f6f8e4c69729d1cdef558344c8bab4dfc9bfc6bc56bfa"}) ioctl$VIDIOC_ENUM_FMT(r1, 0xc0405602, &(0x7f0000000040)={0xce79, 0x3, 0x0, "e16b8b61ca5ef8b7a8a8228c932303197c0aa5535562bb7c8d4180d658e39ab2", 0x34343459}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r5, 0x0) chdir(&(0x7f0000000100)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') 08:17:38 executing program 1: r0 = socket$inet(0x2, 0x3, 0x2) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000240)='/dev/md0\x00', 0x0, 0x0) ioctl$void(r0, 0x5451) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) mkdir(&(0x7f00000005c0)='./file0\x00', 0x100000000020) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x7f, 0x4, 0x0, 0x0, 0x9, 0xfc, 0x0, 0x9d7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0x7) lstat(&(0x7f00000002c0)='./file1\x00', &(0x7f0000000340)) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x591800, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/nullb0\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, 0x0) r4 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000180)=ANY=[], &(0x7f0000000140)) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}}, 0x98) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000040)={0x0, 0x3a8e}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f0000000600)={r5, 0x6, 0x140a09e5, 0x3, 0x9961, 0x3}, &(0x7f0000000540)=0x14) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r3, 0x84, 0x19, &(0x7f0000000580)={r6, 0x100}, 0xffffffffffffffe9) ioctl$DRM_IOCTL_GET_SAREA_CTX(r3, 0xc010641d, &(0x7f0000000300)={0x0, &(0x7f0000000480)=""/112}) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm-monitor\x00', 0x200000, 0x0) r7 = dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_CONGESTION(r7, 0x6, 0xd, &(0x7f0000000180)='lp\x00', 0x3) ioctl$VIDIOC_TRY_FMT(r7, 0xc0d05640, &(0x7f0000000400)={0xa, @raw_data="d456e651514154be56c23a0150374fec800b3363d0f8209aea95ae10a4bfe2bc4a059b555ffe32ee49657c21fdaeec9ff08b45f3c5b652502dd578edc616a43da8fa7411c10cf0be3062500d3923e6f93300ce6e6ca32a13179605ca95c9250023e974040392fcffaac49faad6d6549cb1f2e1c7492ba9a8e2d26787e1872027fbe8577edbc559354f305d4e05c26a2f708bb008ca01368edece7ac1108379664aea7622db8fe0f786d6a4177494b3766d3f6f8e4c69729d1cdef558344c8bab4dfc9bfc6bc56bfa"}) ioctl$GIO_UNIMAP(r7, 0x4b66, &(0x7f0000000840)={0x2, &(0x7f0000000280)=[{}, {}]}) clock_gettime(0x0, &(0x7f00000003c0)={0x0, 0x0}) select(0x40, &(0x7f0000000200)={0x4, 0x7, 0x3ff, 0x3, 0xffffffffffffffe1, 0x6, 0x4b4, 0x80000001}, &(0x7f00000009c0)={0x4ebe, 0x5, 0x1, 0x7, 0x1, 0x8, 0x7, 0x100}, &(0x7f0000000a00)={0x0, 0xffffffff, 0x80000001, 0x1f, 0xfffffffffffffffd, 0x1, 0x8, 0x8000}, &(0x7f0000000a80)={r8, r9/1000+10000}) ioprio_set$pid(0x7, 0x0, 0x9) ioctl$BLKPG(r1, 0x932, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0x7fff) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r10 = request_key(&(0x7f0000000740)='encrypted\x00', &(0x7f0000000b00)={'syz', 0x2}, &(0x7f0000000b40)='./cgroup\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000680)='asymmetric\x00', &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, r10) request_key(&(0x7f00000004c0)='pkcs7_test\x00', &(0x7f0000000500)={'syz', 0x1}, &(0x7f0000000540)='wlan0\x00', 0x0) [ 570.147267][T10444] BPF:[2] ARRAY (anon) 08:17:38 executing program 5: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x305, &(0x7f0000000000)=ANY=[]}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1000000000000304, 0x400000000100) 08:17:38 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [{}], {}, [], {0x10, 0x2}}, 0x2c, 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(0x0, r3, 0x0) lstat(&(0x7f0000000600)='./file0/file0\x00', 0x0) [ 570.178394][T10444] BPF:type_id=5 index_type_id=1 nr_elems=63 [ 570.207385][T10444] BPF: [ 570.210507][T10444] BPF:Invalid index [ 570.256274][T10444] BPF: [ 570.256274][T10444] 08:17:39 executing program 4: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [{}], {}, [], {0x10, 0x2}}, 0x2c, 0x0) r2 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r3, 0x0) chdir(&(0x7f0000000100)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') 08:17:39 executing program 0: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [{}], {}, [], {0x10, 0x2}}, 0x2c, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(r1, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x24, r2, 0x200, 0x70bd2b, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xf8}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000}, 0x844) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r4, 0x0) chdir(&(0x7f0000000100)='./file0\x00') setresuid(r4, r4, 0x0) symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') 08:17:39 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x16, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000340)}, 0x42) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0xffffffffa0008000, 0xffffffffffffff3e, 0x0, &(0x7f0000000040)="a34747e865af5cf11e34bdff7a7a5ba0051aae5804d5a05d9b9ff68e12bb4d43a20375ea905795449b957e956aa6", 0x0, 0x401, 0x0, 0x0, 0xfffffffffffffff3}, 0x28) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f0000000240)={0x1ff, 0xc, 0x4, 0x0, 0x27e5, {}, {0x4, 0x8, 0x4, 0x8, 0x7, 0x6, "96669900"}, 0x7, 0x0, @fd=r0, 0x9, 0x0, r2}) r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@struct={0x0, 0x0, 0x0, 0x4, 0x0, 0x9}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x1, 0x3f}}]}}, &(0x7f0000000080)=""/236, 0x3e, 0xec, 0x8}, 0x20) ioctl$EVIOCGLED(r3, 0x80404519, &(0x7f0000000580)=""/250) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) dup(0xffffffffffffffff) r5 = dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_CONGESTION(r5, 0x6, 0xd, &(0x7f0000000180)='lp\x00', 0x3) ioctl$VIDIOC_TRY_FMT(r5, 0xc0d05640, &(0x7f0000000400)={0xa, @raw_data="d456e651514154be56c23a0150374fec800b3363d0f8209aea95ae10a4bfe2bc4a059b555ffe32ee49657c21fdaeec9ff08b45f3c5b652502dd578edc616a43da8fa7411c10cf0be3062500d3923e6f93300ce6e6ca32a13179605ca95c9250023e974040392fcffaac49faad6d6549cb1f2e1c7492ba9a8e2d26787e1872027fbe8577edbc559354f305d4e05c26a2f708bb008ca01368edece7ac1108379664aea7622db8fe0f786d6a4177494b3766d3f6f8e4c69729d1cdef558344c8bab4dfc9bfc6bc56bfa"}) ioctl$BLKTRACESTART(r5, 0x1274, 0x0) 08:17:39 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [{}], {}, [], {0x10, 0x2}}, 0x2c, 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(0x0, r3, 0x0) lstat(&(0x7f0000000600)='./file0/file0\x00', 0x0) 08:17:39 executing program 5: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x305, &(0x7f0000000000)=ANY=[]}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1000000000000304, 0x400000000100) 08:17:39 executing program 1: r0 = socket$inet(0x2, 0x3, 0x2) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000240)='/dev/md0\x00', 0x0, 0x0) ioctl$void(r0, 0x5451) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) mkdir(&(0x7f00000005c0)='./file0\x00', 0x100000000020) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x7f, 0x4, 0x0, 0x0, 0x9, 0xfc, 0x0, 0x9d7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0x7) lstat(&(0x7f00000002c0)='./file1\x00', &(0x7f0000000340)) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x591800, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/nullb0\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, 0x0) r4 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000180)=ANY=[], &(0x7f0000000140)) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}}, 0x98) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000040)={0x0, 0x3a8e}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f0000000600)={r5, 0x6, 0x140a09e5, 0x3, 0x9961, 0x3}, &(0x7f0000000540)=0x14) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r3, 0x84, 0x19, &(0x7f0000000580)={r6, 0x100}, 0xffffffffffffffe9) ioctl$DRM_IOCTL_GET_SAREA_CTX(r3, 0xc010641d, &(0x7f0000000300)={0x0, &(0x7f0000000480)=""/112}) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm-monitor\x00', 0x200000, 0x0) r7 = dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_CONGESTION(r7, 0x6, 0xd, &(0x7f0000000180)='lp\x00', 0x3) ioctl$VIDIOC_TRY_FMT(r7, 0xc0d05640, &(0x7f0000000400)={0xa, @raw_data="d456e651514154be56c23a0150374fec800b3363d0f8209aea95ae10a4bfe2bc4a059b555ffe32ee49657c21fdaeec9ff08b45f3c5b652502dd578edc616a43da8fa7411c10cf0be3062500d3923e6f93300ce6e6ca32a13179605ca95c9250023e974040392fcffaac49faad6d6549cb1f2e1c7492ba9a8e2d26787e1872027fbe8577edbc559354f305d4e05c26a2f708bb008ca01368edece7ac1108379664aea7622db8fe0f786d6a4177494b3766d3f6f8e4c69729d1cdef558344c8bab4dfc9bfc6bc56bfa"}) ioctl$GIO_UNIMAP(r7, 0x4b66, &(0x7f0000000840)={0x2, &(0x7f0000000280)=[{}, {}]}) clock_gettime(0x0, &(0x7f0000000a40)={0x0, 0x0}) select(0x40, &(0x7f0000000200)={0x4, 0x7, 0x3ff, 0x3, 0xffffffffffffffe1, 0x6, 0x4b4, 0x80000001}, &(0x7f00000009c0)={0x4ebe, 0x5, 0x1, 0x7, 0x1, 0x8, 0x7, 0x100}, &(0x7f0000000a00)={0x0, 0xffffffff, 0x80000001, 0x1f, 0xfffffffffffffffd, 0x1, 0x8, 0x8000}, &(0x7f0000000a80)={r8, r9/1000+10000}) ioprio_set$pid(0x7, 0x0, 0x9) ioctl$BLKPG(r1, 0x932, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0x7fff) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r10 = request_key(&(0x7f0000000740)='encrypted\x00', &(0x7f0000000b00)={'syz', 0x2}, &(0x7f0000000b40)='./cgroup\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000680)='asymmetric\x00', &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, r10) request_key(&(0x7f00000004c0)='pkcs7_test\x00', &(0x7f0000000500)={'syz', 0x1}, &(0x7f0000000540)='wlan0\x00', 0x0) [ 570.618480][T10571] BPF:[2] ARRAY (anon) [ 570.695947][T10571] BPF:type_id=5 index_type_id=1 nr_elems=63 [ 570.714836][T10571] BPF: [ 570.737041][T10571] BPF:Invalid index [ 570.752815][T10571] BPF: [ 570.752815][T10571] 08:17:39 executing program 0: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [{}], {}, [], {0x10, 0x2}}, 0x2c, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r3, 0x0) r4 = getgid() lchown(&(0x7f0000000000)='./file0\x00', r3, r4) chdir(&(0x7f0000000100)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') newfstatat(0xffffffffffffff9c, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000280), 0x800) 08:17:39 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [{}], {}, [], {0x10, 0x2}}, 0x2c, 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) lstat(&(0x7f0000000600)='./file0/file0\x00', 0x0) 08:17:39 executing program 4: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [{}], {}, [], {0x10, 0x2}}, 0x2c, 0x0) r2 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r3, 0x0) chdir(&(0x7f0000000100)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') 08:17:39 executing program 5: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x305, &(0x7f0000000000)=ANY=[]}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1000000000000304, 0x400000000100) 08:17:39 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x16, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000340)}, 0x42) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0xffffffffa0008000, 0xffffffffffffff3e, 0x0, &(0x7f0000000040)="a34747e865af5cf11e34bdff7a7a5ba0051aae5804d5a05d9b9ff68e12bb4d43a20375ea905795449b957e956aa6", 0x0, 0x401, 0x0, 0x0, 0xfffffffffffffff3}, 0x28) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f0000000240)={0x1ff, 0xc, 0x4, 0x0, 0x27e5, {}, {0x4, 0x8, 0x4, 0x8, 0x7, 0x6, "96669900"}, 0x7, 0x0, @fd=r0, 0x9, 0x0, r2}) r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@struct={0x0, 0x0, 0x0, 0x4, 0x0, 0x9}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x1, 0x3f}}]}}, &(0x7f0000000080)=""/236, 0x3e, 0xec, 0x8}, 0x20) ioctl$EVIOCGLED(r3, 0x80404519, &(0x7f0000000580)=""/250) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) dup(0xffffffffffffffff) r5 = dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_CONGESTION(r5, 0x6, 0xd, &(0x7f0000000180)='lp\x00', 0x3) ioctl$VIDIOC_TRY_FMT(r5, 0xc0d05640, &(0x7f0000000400)={0xa, @raw_data="d456e651514154be56c23a0150374fec800b3363d0f8209aea95ae10a4bfe2bc4a059b555ffe32ee49657c21fdaeec9ff08b45f3c5b652502dd578edc616a43da8fa7411c10cf0be3062500d3923e6f93300ce6e6ca32a13179605ca95c9250023e974040392fcffaac49faad6d6549cb1f2e1c7492ba9a8e2d26787e1872027fbe8577edbc559354f305d4e05c26a2f708bb008ca01368edece7ac1108379664aea7622db8fe0f786d6a4177494b3766d3f6f8e4c69729d1cdef558344c8bab4dfc9bfc6bc56bfa"}) ioctl$BLKTRACESTART(r5, 0x1274, 0x0) 08:17:39 executing program 1: r0 = socket$inet(0x2, 0x3, 0x2) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000240)='/dev/md0\x00', 0x0, 0x0) ioctl$void(r0, 0x5451) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) mkdir(&(0x7f00000005c0)='./file0\x00', 0x100000000020) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0xe0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x7f, 0x4, 0x0, 0x0, 0x9, 0xfc, 0x0, 0x9d7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, @perf_bp={0x0}, 0x0, 0x80, 0x8000000, 0x8, 0x0, 0x1, 0x4e0d}, 0x0, 0xfffffffffffffffb, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0x7) lstat(&(0x7f00000002c0)='./file1\x00', &(0x7f0000000340)) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x591800, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/nullb0\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, 0x0) r4 = openat$zero(0xffffffffffffff9c, 0x0, 0x484201, 0x0) close(0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000180)=ANY=[], &(0x7f0000000140)) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}}, 0x98) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000040)={0x0, 0x3a8e}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f0000000600)={r5, 0x6, 0x140a09e5, 0x3, 0x9961, 0x3}, &(0x7f0000000540)=0x14) r6 = socket(0xa, 0x1, 0x0) r7 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r7, 0x84, 0x1d, &(0x7f0000000b80)=ANY=[@ANYBLOB="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", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r6, 0x84, 0x11, &(0x7f0000000100)={r8}, 0x8) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r3, 0x84, 0x19, &(0x7f0000000580)={r8, 0xfd}, 0x8) ioctl$DRM_IOCTL_GET_SAREA_CTX(r3, 0xc010641d, &(0x7f0000000300)={0x0, &(0x7f0000000480)=""/112}) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm-monitor\x00', 0x200000, 0x0) r9 = dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_CONGESTION(r9, 0x6, 0xd, &(0x7f0000000180)='lp\x00', 0x3) ioctl$VIDIOC_TRY_FMT(r9, 0xc0d05640, &(0x7f0000000400)={0xa, @raw_data="d456e651514154be56c23a0150374fec800b3363d0f8209aea95ae10a4bfe2bc4a059b555ffe32ee49657c21fdaeec9ff08b45f3c5b652502dd578edc616a43da8fa7411c10cf0be3062500d3923e6f93300ce6e6ca32a13179605ca95c9250023e974040392fcffaac49faad6d6549cb1f2e1c7492ba9a8e2d26787e1872027fbe8577edbc559354f305d4e05c26a2f708bb008ca01368edece7ac1108379664aea7622db8fe0f786d6a4177494b3766d3f6f8e4c69729d1cdef558344c8bab4dfc9bfc6bc56bfa"}) ioctl$GIO_UNIMAP(r9, 0x4b66, &(0x7f0000000840)={0x2, &(0x7f0000000280)=[{}, {}]}) clock_gettime(0x0, &(0x7f0000000a40)={0x0, 0x0}) select(0x40, &(0x7f0000000200)={0x4, 0x7, 0x3ff, 0x3, 0xffffffffffffffe1, 0x6, 0x4b4, 0x80000001}, &(0x7f00000009c0)={0x4ebe, 0x5, 0x1, 0x7, 0x1, 0x8, 0x7, 0x100}, &(0x7f0000000a00)={0x0, 0xffffffff, 0x80000001, 0x1f, 0xfffffffffffffffd, 0x1, 0x8, 0x8000}, &(0x7f0000000a80)={r10, r11/1000+10000}) ioprio_set$pid(0x7, 0x0, 0x9) ioctl$BLKPG(r1, 0x932, 0x0) r12 = dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_CONGESTION(r12, 0x6, 0xd, &(0x7f0000000180)='lp\x00', 0x3) ioctl$VIDIOC_TRY_FMT(r12, 0xc0d05640, &(0x7f0000000400)={0xa, @raw_data="d456e651514154be56c23a0150374fec800b3363d0f8209aea95ae10a4bfe2bc4a059b555ffe32ee49657c21fdaeec9ff08b45f3c5b652502dd578edc616a43da8fa7411c10cf0be3062500d3923e6f93300ce6e6ca32a13179605ca95c9250023e974040392fcffaac49faad6d6549cb1f2e1c7492ba9a8e2d26787e1872027fbe8577edbc559354f305d4e05c26a2f708bb008ca01368edece7ac1108379664aea7622db8fe0f786d6a4177494b3766d3f6f8e4c69729d1cdef558344c8bab4dfc9bfc6bc56bfa"}) ioctl$TIOCGPTPEER(r12, 0x5441, 0xe9) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r13 = request_key(&(0x7f0000000740)='encrypted\x00', &(0x7f0000000b00)={'syz', 0x2}, &(0x7f0000000b40)='./cgroup\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000680)='asymmetric\x00', &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, r13) request_key(&(0x7f00000004c0)='pkcs7_test\x00', &(0x7f0000000500)={'syz', 0x1}, &(0x7f0000000540)='wlan0\x00', 0x0) 08:17:39 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [{}], {}, [], {0x10, 0x2}}, 0x2c, 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) lstat(&(0x7f0000000600)='./file0/file0\x00', 0x0) 08:17:39 executing program 5: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x305, &(0x7f0000000000)=ANY=[]}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1000000000000304, 0x400000000100) 08:17:39 executing program 0: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)=ANY=[@ANYBLOB="020000040100000000003c68639c0000", @ANYRES32=0x0, @ANYBLOB="040000000000000010000200000000002000000000000000"], 0x2c, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r3, 0x0) chdir(&(0x7f0000000100)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') [ 571.146362][T10705] BPF:[2] ARRAY (anon) [ 571.162496][T10705] BPF:type_id=5 index_type_id=1 nr_elems=63 [ 571.184057][T10705] BPF: 08:17:39 executing program 4: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [{}], {}, [], {0x10, 0x2}}, 0x2c, 0x0) r2 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r3, 0x0) chdir(&(0x7f0000000100)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') [ 571.198492][T10705] BPF:Invalid index [ 571.217518][T10705] BPF: [ 571.217518][T10705] 08:17:39 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [{}], {}, [], {0x10, 0x2}}, 0x2c, 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) lstat(&(0x7f0000000600)='./file0/file0\x00', 0x0) 08:17:39 executing program 1: r0 = socket$inet(0x2, 0x3, 0x2) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000240)='/dev/md0\x00', 0x0, 0x0) ioctl$void(r0, 0x5451) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) mkdir(&(0x7f00000005c0)='./file0\x00', 0x100000000020) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x7f, 0x4, 0x0, 0x0, 0x9, 0xfc, 0x0, 0x9d7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0x7) lstat(&(0x7f00000002c0)='./file1\x00', &(0x7f0000000340)) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x591800, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/nullb0\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, 0x0) r4 = dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_CONGESTION(r4, 0x6, 0xd, &(0x7f0000000180)='lp\x00', 0x3) ioctl$VIDIOC_TRY_FMT(r4, 0xc0d05640, &(0x7f0000000400)={0xa, @raw_data="d456e651514154be56c23a0150374fec800b3363d0f8209aea95ae10a4bfe2bc4a059b555ffe32ee49657c21fdaeec9ff08b45f3c5b652502dd578edc616a43da8fa7411c10cf0be3062500d3923e6f93300ce6e6ca32a13179605ca95c9250023e974040392fcffaac49faad6d6549cb1f2e1c7492ba9a8e2d26787e1872027fbe8577edbc559354f305d4e05c26a2f708bb008ca01368edece7ac1108379664aea7622db8fe0f786d6a4177494b3766d3f6f8e4c69729d1cdef558344c8bab4dfc9bfc6bc56bfa"}) ioctl$DRM_IOCTL_RES_CTX(r4, 0xc0106426, 0x0) r5 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000180)=ANY=[], &(0x7f0000000140)) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}}, 0x98) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000040)={0x0, 0x3a8e}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f0000000600)={r6, 0x6, 0x140a09e5, 0x3, 0x9961, 0x3}, &(0x7f0000000540)=0x14) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r3, 0x84, 0x19, &(0x7f0000000580)={r7, 0x100}, 0xffffffffffffffe9) ioctl$DRM_IOCTL_GET_SAREA_CTX(r3, 0xc010641d, &(0x7f0000000300)={0x0, &(0x7f0000000480)=""/112}) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm-monitor\x00', 0x200000, 0x0) r8 = dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_CONGESTION(r8, 0x6, 0xd, &(0x7f0000000180)='lp\x00', 0x3) ioctl$VIDIOC_TRY_FMT(r8, 0xc0d05640, &(0x7f0000000400)={0xa, @raw_data="d456e651514154be56c23a0150374fec800b3363d0f8209aea95ae10a4bfe2bc4a059b555ffe32ee49657c21fdaeec9ff08b45f3c5b652502dd578edc616a43da8fa7411c10cf0be3062500d3923e6f93300ce6e6ca32a13179605ca95c9250023e974040392fcffaac49faad6d6549cb1f2e1c7492ba9a8e2d26787e1872027fbe8577edbc559354f305d4e05c26a2f708bb008ca01368edece7ac1108379664aea7622db8fe0f786d6a4177494b3766d3f6f8e4c69729d1cdef558344c8bab4dfc9bfc6bc56bfa"}) ioctl$GIO_UNIMAP(r8, 0x4b66, &(0x7f0000000840)={0x2, &(0x7f0000000280)=[{}, {}]}) clock_gettime(0x0, &(0x7f0000000a40)={0x0, 0x0}) select(0x40, &(0x7f0000000200)={0x4, 0x7, 0x3ff, 0x3, 0xffffffffffffffe1, 0x6, 0x4b4, 0x80000001}, &(0x7f00000009c0)={0x4ebe, 0x5, 0x1, 0x7, 0x1, 0x8, 0x7, 0x100}, &(0x7f0000000a00)={0x0, 0xffffffff, 0x80000001, 0x1f, 0xfffffffffffffffd, 0x1, 0x8, 0x8000}, &(0x7f0000000a80)={r9, r10/1000+10000}) ioprio_set$pid(0x7, 0x0, 0x9) ioctl$BLKPG(r1, 0x932, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0x7fff) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r11 = request_key(&(0x7f0000000740)='encrypted\x00', &(0x7f0000000b00)={'syz', 0x2}, &(0x7f0000000b40)='./cgroup\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000680)='asymmetric\x00', &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, r11) request_key(&(0x7f00000004c0)='pkcs7_test\x00', &(0x7f0000000500)={'syz', 0x1}, &(0x7f0000000540)='wlan0\x00', 0x0) 08:17:40 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x16, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000340)}, 0x42) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0xffffffffa0008000, 0xffffffffffffff3e, 0x0, &(0x7f0000000040)="a34747e865af5cf11e34bdff7a7a5ba0051aae5804d5a05d9b9ff68e12bb4d43a20375ea905795449b957e956aa6", 0x0, 0x401, 0x0, 0x0, 0xfffffffffffffff3}, 0x28) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f0000000240)={0x1ff, 0xc, 0x4, 0x0, 0x27e5, {}, {0x4, 0x8, 0x4, 0x8, 0x7, 0x6, "96669900"}, 0x7, 0x0, @fd=r0, 0x9, 0x0, r2}) r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@struct={0x0, 0x0, 0x0, 0x4, 0x0, 0x9}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x1, 0x3f}}]}}, &(0x7f0000000080)=""/236, 0x3e, 0xec, 0x8}, 0x20) ioctl$EVIOCGLED(r3, 0x80404519, &(0x7f0000000580)=""/250) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, 0x0, &(0x7f0000000200)) dup(0xffffffffffffffff) r5 = dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_CONGESTION(r5, 0x6, 0xd, &(0x7f0000000180)='lp\x00', 0x3) ioctl$VIDIOC_TRY_FMT(r5, 0xc0d05640, &(0x7f0000000400)={0xa, @raw_data="d456e651514154be56c23a0150374fec800b3363d0f8209aea95ae10a4bfe2bc4a059b555ffe32ee49657c21fdaeec9ff08b45f3c5b652502dd578edc616a43da8fa7411c10cf0be3062500d3923e6f93300ce6e6ca32a13179605ca95c9250023e974040392fcffaac49faad6d6549cb1f2e1c7492ba9a8e2d26787e1872027fbe8577edbc559354f305d4e05c26a2f708bb008ca01368edece7ac1108379664aea7622db8fe0f786d6a4177494b3766d3f6f8e4c69729d1cdef558344c8bab4dfc9bfc6bc56bfa"}) ioctl$BLKTRACESTART(r5, 0x1274, 0x0) 08:17:40 executing program 5: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x305, &(0x7f0000000000)=ANY=[]}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1000000000000304, 0x400000000100) 08:17:40 executing program 0: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)=ANY=[@ANYBLOB="02000000010000000000000002000000", @ANYRES32=0x0, @ANYBLOB="ffffffffffa44ca9050e97b2b45df7ef5dc1fff942100002"], 0x2c, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r3, 0x0) chdir(&(0x7f0000000100)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') 08:17:40 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [{}], {}, [], {0x10, 0x2}}, 0x2c, 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r3, 0x0) lstat(0x0, 0x0) 08:17:40 executing program 5: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x305, &(0x7f0000000000)=ANY=[]}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1000000000000304, 0x400000000100) [ 571.666916][T10835] BPF:[2] ARRAY (anon) [ 571.688794][T10835] BPF:type_id=5 index_type_id=1 nr_elems=63 [ 571.722888][T10835] BPF: 08:17:40 executing program 4: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [{}], {}, [], {0x10, 0x2}}, 0x2c, 0x0) r2 = socket(0x10, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r3, 0x0) chdir(&(0x7f0000000100)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') [ 571.744595][T10835] BPF:Invalid index [ 571.774704][T10835] BPF: [ 571.774704][T10835] 08:17:40 executing program 1: r0 = socket$inet(0x2, 0x3, 0x2) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000240)='/dev/md0\x00', 0x0, 0x0) ioctl$void(r0, 0x5451) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) mkdir(&(0x7f00000005c0)='./file0\x00', 0x100000000020) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x7f, 0x4, 0x0, 0x0, 0x9, 0xfc, 0x0, 0x9d7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0x7) lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x591800, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/nullb0\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, 0x0) r4 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000180)=ANY=[], &(0x7f0000000140)) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}}, 0x98) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000040)={0x0, 0x3a8e}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f0000000600)={r5, 0x6, 0x140a09e5, 0x3, 0x9961, 0x3}, &(0x7f0000000540)=0x14) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r3, 0x84, 0x19, &(0x7f0000000580)={r6, 0x100}, 0xffffffffffffffe9) ioctl$DRM_IOCTL_GET_SAREA_CTX(r3, 0xc010641d, &(0x7f0000000300)={0x0, &(0x7f0000000480)=""/112}) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm-monitor\x00', 0x200000, 0x0) r7 = dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_CONGESTION(r7, 0x6, 0xd, &(0x7f0000000180)='lp\x00', 0x3) ioctl$VIDIOC_TRY_FMT(r7, 0xc0d05640, &(0x7f0000000400)={0xa, @raw_data="d456e651514154be56c23a0150374fec800b3363d0f8209aea95ae10a4bfe2bc4a059b555ffe32ee49657c21fdaeec9ff08b45f3c5b652502dd578edc616a43da8fa7411c10cf0be3062500d3923e6f93300ce6e6ca32a13179605ca95c9250023e974040392fcffaac49faad6d6549cb1f2e1c7492ba9a8e2d26787e1872027fbe8577edbc559354f305d4e05c26a2f708bb008ca01368edece7ac1108379664aea7622db8fe0f786d6a4177494b3766d3f6f8e4c69729d1cdef558344c8bab4dfc9bfc6bc56bfa"}) ioctl$GIO_UNIMAP(r7, 0x4b66, &(0x7f0000000840)={0x3, &(0x7f00000006c0)=[{}, {}, {}]}) clock_gettime(0x0, &(0x7f0000000a40)={0x0, 0x0}) select(0x40, &(0x7f0000000200)={0x4, 0x7, 0x3ff, 0x3, 0xffffffffffffffe1, 0x6, 0x4b0, 0x80000001}, &(0x7f00000009c0)={0x4ebe, 0x5, 0x1, 0x7, 0x1, 0x8, 0x7, 0x100}, &(0x7f0000000a00)={0x0, 0xffffffff, 0x80000001, 0x1f, 0xfffffffffffffffd, 0x1, 0x8, 0x8000}, &(0x7f0000000a80)={r8, r9/1000+10000}) ioprio_set$pid(0x7, 0x0, 0x9) ioctl$BLKPG(r1, 0x932, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0x7fff) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r10 = request_key(&(0x7f0000000740)='encrypted\x00', &(0x7f0000000b00)={'syz', 0x2}, &(0x7f0000000b40)='./cgroup\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000680)='asymmetric\x00', &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, r10) request_key(&(0x7f00000004c0)='pkcs7_test\x00', &(0x7f0000000500)={'syz', 0x3}, &(0x7f00000003c0)='wlan0\x00', 0x0) 08:17:40 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [{}], {}, [], {0x10, 0x2}}, 0x2c, 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r3, 0x0) lstat(0x0, 0x0) 08:17:40 executing program 5: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x305, &(0x7f0000000000)=ANY=[]}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1000000000000304, 0x400000000100) 08:17:40 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x16, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000340)}, 0x42) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0xffffffffa0008000, 0xffffffffffffff3e, 0x0, &(0x7f0000000040)="a34747e865af5cf11e34bdff7a7a5ba0051aae5804d5a05d9b9ff68e12bb4d43a20375ea905795449b957e956aa6", 0x0, 0x401, 0x0, 0x0, 0xfffffffffffffff3}, 0x28) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f0000000240)={0x1ff, 0xc, 0x4, 0x0, 0x27e5, {}, {0x4, 0x8, 0x4, 0x8, 0x7, 0x6, "96669900"}, 0x7, 0x0, @fd=r0, 0x9, 0x0, r2}) r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@struct={0x0, 0x0, 0x0, 0x4, 0x0, 0x9}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x1, 0x3f}}]}}, &(0x7f0000000080)=""/236, 0x3e, 0xec, 0x8}, 0x20) ioctl$EVIOCGLED(r3, 0x80404519, &(0x7f0000000580)=""/250) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, 0x0, &(0x7f0000000200)) dup(0xffffffffffffffff) r5 = dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_CONGESTION(r5, 0x6, 0xd, &(0x7f0000000180)='lp\x00', 0x3) ioctl$VIDIOC_TRY_FMT(r5, 0xc0d05640, &(0x7f0000000400)={0xa, @raw_data="d456e651514154be56c23a0150374fec800b3363d0f8209aea95ae10a4bfe2bc4a059b555ffe32ee49657c21fdaeec9ff08b45f3c5b652502dd578edc616a43da8fa7411c10cf0be3062500d3923e6f93300ce6e6ca32a13179605ca95c9250023e974040392fcffaac49faad6d6549cb1f2e1c7492ba9a8e2d26787e1872027fbe8577edbc559354f305d4e05c26a2f708bb008ca01368edece7ac1108379664aea7622db8fe0f786d6a4177494b3766d3f6f8e4c69729d1cdef558344c8bab4dfc9bfc6bc56bfa"}) ioctl$BLKTRACESTART(r5, 0x1274, 0x0) 08:17:40 executing program 0: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [{}], {}, [], {0x10, 0x2}}, 0x2c, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='overlay\x00', 0x1, &(0x7f0000000200)={[{@upperdir={'upperdir', 0x3d, './file0/file0'}}, {@metacopy_off='metacopy=off'}], [{@fsname={'fsname', 0x3d, 'system.posix_acl_access\x00'}}]}) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r3, 0x0) chdir(&(0x7f0000000100)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') 08:17:40 executing program 4: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [{}], {}, [], {0x10, 0x2}}, 0x2c, 0x0) r2 = socket(0x10, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r3, 0x0) chdir(&(0x7f0000000100)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') [ 572.169839][T10961] overlayfs: unrecognized mount option "fsname=system.posix_acl_access" or missing value [ 572.194185][T10963] BPF:[2] ARRAY (anon) 08:17:40 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [{}], {}, [], {0x10, 0x2}}, 0x2c, 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r3, 0x0) lstat(0x0, 0x0) [ 572.223413][T10963] BPF:type_id=5 index_type_id=1 nr_elems=63 [ 572.248809][T10963] BPF: 08:17:40 executing program 1: r0 = socket$inet(0x2, 0x80000, 0x2) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000240)='/dev/md0\x00', 0x0, 0x0) ioctl$void(r0, 0x5451) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) mkdir(&(0x7f00000005c0)='./file0\x00', 0x100000000020) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x3, 0x7f, 0x4, 0x0, 0x0, 0x9, 0xfc, 0x0, 0x9d7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0x7) lstat(&(0x7f00000002c0)='./file1\x00', &(0x7f0000000340)) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x591800, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/nullb0\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, 0x0) r4 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000180)=ANY=[], &(0x7f0000000140)) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}}, 0x98) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000040)={0x0, 0x3a8e}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f0000000600)={r5, 0x6, 0x140a09e5, 0x3, 0x9961, 0x3}, &(0x7f0000000540)=0x14) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r3, 0x84, 0x19, &(0x7f0000000580)={r6, 0x100}, 0xffffffffffffffe9) ioctl$DRM_IOCTL_GET_SAREA_CTX(r3, 0xc010641d, &(0x7f0000000300)={0x0, &(0x7f0000000480)=""/112}) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm-monitor\x00', 0x200000, 0x0) r7 = dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_CONGESTION(r7, 0x6, 0xd, &(0x7f0000000180)='lp\x00', 0x3) ioctl$VIDIOC_TRY_FMT(r7, 0xc0d05640, &(0x7f0000000400)={0xa, @raw_data="d456e651514154be56c23a0150374fec800b3363d0f8209aea95ae10a4bfe2bc4a059b555ffe32ee49657c21fdaeec9ff08b45f3c5b652502dd578edc616a43da8fa7411c10cf0be3062500d3923e6f93300ce6e6ca32a13179605ca95c9250023e974040392fcffaac49faad6d6549cb1f2e1c7492ba9a8e2d26787e1872027fbe8577edbc559354f305d4e05c26a2f708bb008ca01368edece7ac1108379664aea7622db8fe0f786d6a4177494b3766d3f6f8e4c69729d1cdef558344c8bab4dfc9bfc6bc56bfa"}) ioctl$GIO_UNIMAP(r7, 0x4b66, &(0x7f0000000840)={0x2, &(0x7f0000000280)=[{}, {}]}) clock_gettime(0x0, &(0x7f0000000a40)={0x0, 0x0}) select(0x40, &(0x7f0000000200)={0x4, 0x7, 0x3ff, 0x3, 0xffffffffffffffe1, 0x6, 0x4b4, 0x80000001}, &(0x7f00000009c0)={0x4ebe, 0x5, 0x1, 0x7, 0x1, 0x8, 0x7, 0x100}, &(0x7f0000000a00)={0x0, 0xffffffff, 0x80000001, 0x1f, 0xfffffffffffffffd, 0x1, 0x8, 0x8000}, &(0x7f0000000a80)={r8, r9/1000+10000}) ioprio_set$pid(0x0, 0x0, 0x1000) ioctl$BLKPG(r1, 0x932, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0x7fff) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r10 = request_key(&(0x7f0000000740)='encrypted\x00', &(0x7f0000000b00)={'syz', 0x2}, &(0x7f0000000b40)='./cgroup\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000680)='asymmetric\x00', &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, r10) request_key(&(0x7f00000004c0)='blacklist\x00', &(0x7f0000000500)={'syz', 0x1}, &(0x7f00000003c0)='wlan0\x00', 0x0) [ 572.273714][T10963] BPF:Invalid index [ 572.314613][T10963] BPF: [ 572.314613][T10963] 08:17:40 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x305, &(0x7f0000000000)=ANY=[]}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1000000000000304, 0x400000000100) 08:17:41 executing program 0: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [{}], {}, [], {0x10, 0x2}}, 0x2c, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) r1 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x6, 0x60300) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r3, 0x0) chdir(&(0x7f0000000100)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') 08:17:41 executing program 5: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x305, &(0x7f0000000000)=ANY=[]}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1000000000000304, 0x400000000100) 08:17:41 executing program 4: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [{}], {}, [], {0x10, 0x2}}, 0x2c, 0x0) r2 = socket(0x10, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r3, 0x0) chdir(&(0x7f0000000100)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') 08:17:41 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x16, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000340)}, 0x42) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0xffffffffa0008000, 0xffffffffffffff3e, 0x0, &(0x7f0000000040)="a34747e865af5cf11e34bdff7a7a5ba0051aae5804d5a05d9b9ff68e12bb4d43a20375ea905795449b957e956aa6", 0x0, 0x401, 0x0, 0x0, 0xfffffffffffffff3}, 0x28) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f0000000240)={0x1ff, 0xc, 0x4, 0x0, 0x27e5, {}, {0x4, 0x8, 0x4, 0x8, 0x7, 0x6, "96669900"}, 0x7, 0x0, @fd=r0, 0x9, 0x0, r2}) r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@struct={0x0, 0x0, 0x0, 0x4, 0x0, 0x9}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x1, 0x3f}}]}}, &(0x7f0000000080)=""/236, 0x3e, 0xec, 0x8}, 0x20) ioctl$EVIOCGLED(r3, 0x80404519, &(0x7f0000000580)=""/250) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, 0x0, &(0x7f0000000200)) dup(0xffffffffffffffff) r5 = dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_CONGESTION(r5, 0x6, 0xd, &(0x7f0000000180)='lp\x00', 0x3) ioctl$VIDIOC_TRY_FMT(r5, 0xc0d05640, &(0x7f0000000400)={0xa, @raw_data="d456e651514154be56c23a0150374fec800b3363d0f8209aea95ae10a4bfe2bc4a059b555ffe32ee49657c21fdaeec9ff08b45f3c5b652502dd578edc616a43da8fa7411c10cf0be3062500d3923e6f93300ce6e6ca32a13179605ca95c9250023e974040392fcffaac49faad6d6549cb1f2e1c7492ba9a8e2d26787e1872027fbe8577edbc559354f305d4e05c26a2f708bb008ca01368edece7ac1108379664aea7622db8fe0f786d6a4177494b3766d3f6f8e4c69729d1cdef558344c8bab4dfc9bfc6bc56bfa"}) ioctl$BLKTRACESTART(r5, 0x1274, 0x0) 08:17:41 executing program 0: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="02000000010000000000000002000000", @ANYRES32=0x0, @ANYBLOB="040000000000000010fc010000080000200080ffffffffffffff3faa6b664ac5d084d4e6a005ecc140432ed841caba076a93326ed0dc90c0a8b2c599585a18ae4559dc934bd129c5000000007736c99d14b331907a83b2c16b918cb0dea04066f2d4bc15c2b79387c9a9398947644e715783656e8923a908dc6587c8ea1d5aff211f37add739f832cc32144eca93dd2d23e8859a5a546d99f1f8384e44226777a7117b1a5c851225eb76b60c2a4f6222dc5637080109a846bb5a5316d7dbbaaf18ab120bedc0ad319e1447c8916bc6c69b9ae1b0c7"], 0x2c, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000000240)={0x6, 0xc, 0x4, 0x8, 0x4, {}, {0x1, 0x0, 0x84, 0x1f, 0x98, 0xf5, "c961234a"}, 0x5, 0x3, @userptr=0xf2ac, 0x0, 0x0, r1}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvme-fabrics\x00', 0x840, 0x0) r5 = socket(0x10, 0x803, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r5, 0x84, 0x10, &(0x7f0000000040)=@assoc_value={0x0, 0x7f}, &(0x7f0000000180)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r4, 0x84, 0x18, &(0x7f0000000200)={r6, 0x2c87}, 0x8) r7 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r8, 0x0) chdir(&(0x7f0000000100)='./file0\x00') symlink(&(0x7f0000000800)='./file0\x00', &(0x7f00000007c0)='./file0\x00') 08:17:41 executing program 1: r0 = socket$inet(0x2, 0x3, 0x2) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000240)='/dev/md0\x00', 0x0, 0x0) ioctl$void(r0, 0x5451) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) mkdir(&(0x7f00000005c0)='./file0\x00', 0x100000000020) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x7f, 0x4, 0x0, 0x0, 0x9, 0xfc, 0x0, 0x9d7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0x7) lstat(&(0x7f00000002c0)='./file1\x00', &(0x7f0000000340)) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x591800, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/nullb0\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, 0x0) r4 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000180)=ANY=[], &(0x7f0000000140)) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}}, 0x98) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000040)={0x0, 0x3a8e}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f0000000600)={r5, 0x6, 0x140a09e5, 0x3, 0x9961, 0x3}, &(0x7f0000000540)=0x14) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r3, 0x84, 0x19, &(0x7f0000000580)={r6, 0x100}, 0xffffffffffffffe9) ioctl$DRM_IOCTL_GET_SAREA_CTX(r3, 0xc010641d, &(0x7f0000000300)={0x0, &(0x7f0000000480)=""/112}) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm-monitor\x00', 0x200000, 0x0) r7 = dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_CONGESTION(r7, 0x6, 0xd, &(0x7f0000000180)='lp\x00', 0x3) ioctl$VIDIOC_TRY_FMT(r7, 0xc0d05640, &(0x7f0000000400)={0xa, @raw_data="d456e651514154be56c23a0150374fec800b3363d0f8209aea95ae10a4bfe2bc4a059b555ffe32ee49657c21fdaeec9ff08b45f3c5b652502dd578edc616a43da8fa7411c10cf0be3062500d3923e6f93300ce6e6ca32a13179605ca95c9250023e974040392fcffaac49faad6d6549cb1f2e1c7492ba9a8e2d26787e1872027fbe8577edbc559354f305d4e05c26a2f708bb008ca01368edece7ac1108379664aea7622db8fe0f786d6a4177494b3766d3f6f8e4c69729d1cdef558344c8bab4dfc9bfc6bc56bfa"}) ioctl$GIO_UNIMAP(r7, 0x4b66, &(0x7f0000000840)={0x2, &(0x7f0000000280)=[{}, {}]}) clock_gettime(0x0, &(0x7f0000000a40)={0x0, 0x0}) select(0x40, &(0x7f0000000200)={0x4, 0x7, 0x3ff, 0x3, 0xffffffffffffffe1, 0x6, 0x4b4, 0x80000001}, &(0x7f00000009c0)={0x4ebe, 0x5, 0x1, 0x7, 0x1, 0x8, 0x7, 0x100}, &(0x7f0000000a00)={0x0, 0xffffffff, 0x80000001, 0x1f, 0xfffffffffffffffd, 0x1, 0x8, 0x8000}, &(0x7f0000000a80)={r8, r9/1000+10000}) ioprio_set$pid(0x7, 0x0, 0x9) ioctl$BLKPG(r1, 0x932, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0x7fff) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r10 = request_key(&(0x7f0000000740)='encrypted\x00', &(0x7f0000000b00)={'syz', 0x2}, &(0x7f0000000b40)='./cgroup\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000680)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, r10) request_key(&(0x7f00000004c0)='pkcs7_test\x00', &(0x7f0000000500)={'syz', 0x1}, &(0x7f0000000540)='wlan0\x00', 0x0) 08:17:41 executing program 4: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [{}], {}, [], {0x10, 0x2}}, 0x2c, 0x0) socket(0x10, 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r2, 0x0) chdir(&(0x7f0000000100)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') [ 572.850032][T11103] BPF:[2] ARRAY (anon) 08:17:41 executing program 5: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x305, &(0x7f0000000000)=ANY=[]}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1000000000000304, 0x400000000100) [ 572.884269][T11103] BPF:type_id=5 index_type_id=1 nr_elems=63 [ 572.954093][T11103] BPF: [ 572.965768][T11103] BPF:Invalid index [ 572.969801][T11103] BPF: [ 572.969801][T11103] 08:17:41 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x305, &(0x7f0000000000)=ANY=[]}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1000000000000304, 0x400000000100) 08:17:41 executing program 1: r0 = socket$inet(0x2, 0x3, 0x2) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000240)='/dev/md0\x00', 0x0, 0x0) ioctl$void(r0, 0x5451) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) mkdir(&(0x7f00000005c0)='./file0\x00', 0x100000000020) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x7f, 0x4, 0x0, 0x0, 0x9, 0xfc, 0x0, 0x9d7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0x7) lstat(&(0x7f00000002c0)='./file1\x00', &(0x7f0000000340)) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x591800, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/nullb0\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, 0x0) r4 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000180)=ANY=[], &(0x7f0000000140)) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}}, 0x98) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000040)={0x0, 0x3a8e}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f0000000600)={r5, 0x6, 0x140a09e5, 0x3, 0x9961, 0x3}, &(0x7f0000000540)=0x14) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r3, 0x84, 0x19, &(0x7f0000000580)={r6, 0x100}, 0xffffffffffffffe9) ioctl$DRM_IOCTL_GET_SAREA_CTX(r3, 0xc010641d, &(0x7f0000000300)={0x0, &(0x7f0000000480)=""/112}) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm-monitor\x00', 0x200000, 0x0) r7 = dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_CONGESTION(r7, 0x6, 0xd, &(0x7f0000000180)='lp\x00', 0x3) ioctl$VIDIOC_TRY_FMT(r7, 0xc0d05640, &(0x7f0000000400)={0xa, @raw_data="d456e651514154be56c23a0150374fec800b3363d0f8209aea95ae10a4bfe2bc4a059b555ffe32ee49657c21fdaeec9ff08b45f3c5b652502dd578edc616a43da8fa7411c10cf0be3062500d3923e6f93300ce6e6ca32a13179605ca95c9250023e974040392fcffaac49faad6d6549cb1f2e1c7492ba9a8e2d26787e1872027fbe8577edbc559354f305d4e05c26a2f708bb008ca01368edece7ac1108379664aea7622db8fe0f786d6a4177494b3766d3f6f8e4c69729d1cdef558344c8bab4dfc9bfc6bc56bfa"}) ioctl$GIO_UNIMAP(r7, 0x4b66, &(0x7f0000000840)={0x2, &(0x7f0000000280)=[{}, {}]}) clock_gettime(0x0, &(0x7f0000000a40)={0x0, 0x0}) select(0x40, &(0x7f0000000200)={0x4, 0x7, 0x3ff, 0x3, 0xffffffffffffffe1, 0x6, 0x4b4, 0x80000001}, &(0x7f00000009c0)={0x4ebe, 0x5, 0x1, 0x7, 0x1, 0x8, 0x7, 0x100}, &(0x7f0000000a00)={0x0, 0xffffffff, 0x80000001, 0x1f, 0xfffffffffffffffd, 0x1, 0x8, 0x8000}, &(0x7f0000000a80)={r8, r9/1000+10000}) ioprio_set$pid(0x7, 0x0, 0x9) ioctl$BLKPG(r1, 0x932, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0x7fff) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r10 = request_key(&(0x7f0000000740)='encrypted\x00', &(0x7f0000000b00)={'syz', 0x2}, &(0x7f0000000b40)='./cgroup\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000680)='asymmetric\x00', &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, r10) request_key(&(0x7f00000004c0)='pkcs7_test\x00', &(0x7f0000000500)={'syz', 0x1}, &(0x7f0000000540)='wlan0\x00', 0x0) 08:17:41 executing program 0: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [{}], {}, [], {0x10, 0x2}}, 0x2c, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x29) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r3, 0x0) chdir(&(0x7f0000000100)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') 08:17:41 executing program 4: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [{}], {}, [], {0x10, 0x2}}, 0x2c, 0x0) socket(0x10, 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r2, 0x0) chdir(&(0x7f0000000100)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') 08:17:41 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x16, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000340)}, 0x42) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0xffffffffa0008000, 0xffffffffffffff3e, 0x0, &(0x7f0000000040)="a34747e865af5cf11e34bdff7a7a5ba0051aae5804d5a05d9b9ff68e12bb4d43a20375ea905795449b957e956aa6", 0x0, 0x401, 0x0, 0x0, 0xfffffffffffffff3}, 0x28) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f0000000240)={0x1ff, 0xc, 0x4, 0x0, 0x27e5, {}, {0x4, 0x8, 0x4, 0x8, 0x7, 0x6, "96669900"}, 0x7, 0x0, @fd=r0, 0x9, 0x0, r2}) r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@struct={0x0, 0x0, 0x0, 0x4, 0x0, 0x9}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x1, 0x3f}}]}}, &(0x7f0000000080)=""/236, 0x3e, 0xec, 0x8}, 0x20) ioctl$EVIOCGLED(r3, 0x80404519, &(0x7f0000000580)=""/250) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) dup(0xffffffffffffffff) r5 = dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_CONGESTION(r5, 0x6, 0xd, &(0x7f0000000180)='lp\x00', 0x3) ioctl$VIDIOC_TRY_FMT(r5, 0xc0d05640, &(0x7f0000000400)={0xa, @raw_data="d456e651514154be56c23a0150374fec800b3363d0f8209aea95ae10a4bfe2bc4a059b555ffe32ee49657c21fdaeec9ff08b45f3c5b652502dd578edc616a43da8fa7411c10cf0be3062500d3923e6f93300ce6e6ca32a13179605ca95c9250023e974040392fcffaac49faad6d6549cb1f2e1c7492ba9a8e2d26787e1872027fbe8577edbc559354f305d4e05c26a2f708bb008ca01368edece7ac1108379664aea7622db8fe0f786d6a4177494b3766d3f6f8e4c69729d1cdef558344c8bab4dfc9bfc6bc56bfa"}) ioctl$BLKTRACESTART(r5, 0x1274, 0x0) [ 573.381348][T11231] BPF:[2] ARRAY (anon) 08:17:42 executing program 5: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x305, &(0x7f0000000000)=ANY=[]}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1000000000000304, 0x400000000100) 08:17:42 executing program 1: r0 = socket$inet(0x2, 0x3, 0x2) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000240)='/dev/md0\x00', 0x0, 0x0) ioctl$void(r0, 0x5451) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) mkdir(&(0x7f00000005c0)='./file0\x00', 0x100000000020) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x900, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x7f, 0x4, 0x0, 0x0, 0x9, 0xfc, 0x0, 0x9d7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, @perf_config_ext={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0x7) lstat(&(0x7f00000002c0)='./file1\x00', &(0x7f0000000340)) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x591800, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/nullb0\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, 0x0) r4 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000180)=ANY=[], &(0x7f0000000140)) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}}, 0x98) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000040)={0x0, 0x3a8e}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f0000000600)={r5, 0x6, 0x140a09e5, 0x3, 0x9961, 0x3}, &(0x7f0000000540)=0x14) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r3, 0x84, 0x19, &(0x7f0000000580)={r6, 0x100}, 0xffffffffffffffe9) ioctl$DRM_IOCTL_GET_SAREA_CTX(r3, 0xc010641d, &(0x7f0000000300)={0x0, &(0x7f0000000480)=""/112}) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm-monitor\x00', 0x200000, 0x0) r7 = dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_CONGESTION(r7, 0x6, 0xd, &(0x7f0000000180)='lp\x00', 0x3) ioctl$VIDIOC_TRY_FMT(r7, 0xc0d05640, &(0x7f0000000400)={0xa, @raw_data="d456e651514154be56c23a0150374fec800b3363d0f8209aea95ae10a4bfe2bc4a059b555ffe32ee49657c21fdaeec9ff08b45f3c5b652502dd578edc616a43da8fa7411c10cf0be3062500d3923e6f93300ce6e6ca32a13179605ca95c9250023e974040392fcffaac49faad6d6549cb1f2e1c7492ba9a8e2d26787e1872027fbe8577edbc559354f305d4e05c26a2f708bb008ca01368edece7ac1108379664aea7622db8fe0f786d6a4177494b3766d3f6f8e4c69729d1cdef558344c8bab4dfc9bfc6bc56bfa"}) ioctl$GIO_UNIMAP(r7, 0x4b66, &(0x7f0000000840)={0x2, &(0x7f0000000280)=[{}, {}]}) clock_gettime(0x0, &(0x7f0000000a40)={0x0, 0x0}) select(0x40, &(0x7f0000000200)={0x4, 0x7, 0x3ff, 0x3, 0xffffffffffffffe1, 0x6, 0x4b4, 0x80000001}, &(0x7f00000009c0)={0x4ebe, 0x5, 0x1, 0x7, 0x1, 0x8, 0x7, 0x100}, &(0x7f0000000a00)={0x0, 0xffffffff, 0x80000001, 0x1f, 0xfffffffffffffffd, 0x1, 0x8, 0x8000}, &(0x7f0000000a80)={r8, r9/1000+10000}) ioprio_set$pid(0x7, 0x0, 0x9) ioctl$BLKPG(r1, 0x932, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0x7fff) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r10 = request_key(&(0x7f0000000740)='encrypted\x00', &(0x7f0000000b00)={'syz', 0x2}, &(0x7f0000000b40)='./cgroup\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000680)='asymmetric\x00', &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, r10) request_key(&(0x7f00000004c0)='pkcs7_test\x00', &(0x7f0000000500)={'syz', 0x1}, &(0x7f0000000540)='wlan0\x00', 0x0) [ 573.409142][T11231] BPF:type_id=5 index_type_id=1 nr_elems=63 [ 573.448108][T11231] BPF: [ 573.451267][T11231] BPF:Invalid index [ 573.475353][T11231] BPF: [ 573.475353][T11231] 08:17:42 executing program 0: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [{}], {}, [], {0x10, 0x2}}, 0x2c, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$FUSE_GETXATTR(0xffffffffffffffff, &(0x7f0000000000)={0x18, 0xffffffffffffffda, 0x2, {0x1}}, 0x18) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r3, 0x0) chdir(&(0x7f0000000100)='./file0\x00') symlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='./file0/file1\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') 08:17:42 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x16, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000340)}, 0x42) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0xffffffffa0008000, 0xffffffffffffff3e, 0x0, &(0x7f0000000040)="a34747e865af5cf11e34bdff7a7a5ba0051aae5804d5a05d9b9ff68e12bb4d43a20375ea905795449b957e956aa6", 0x0, 0x401, 0x0, 0x0, 0xfffffffffffffff3}, 0x28) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f0000000240)={0x1ff, 0xc, 0x4, 0x0, 0x27e5, {}, {0x4, 0x8, 0x4, 0x8, 0x7, 0x6, "96669900"}, 0x7, 0x0, @fd=r0, 0x9, 0x0, r2}) r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@struct={0x0, 0x0, 0x0, 0x4, 0x0, 0x9}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x1, 0x3f}}]}}, &(0x7f0000000080)=""/236, 0x3e, 0xec, 0x8}, 0x20) ioctl$EVIOCGLED(r3, 0x80404519, &(0x7f0000000580)=""/250) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) dup(0xffffffffffffffff) r5 = dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_CONGESTION(r5, 0x6, 0xd, &(0x7f0000000180)='lp\x00', 0x3) ioctl$VIDIOC_TRY_FMT(r5, 0xc0d05640, &(0x7f0000000400)={0xa, @raw_data="d456e651514154be56c23a0150374fec800b3363d0f8209aea95ae10a4bfe2bc4a059b555ffe32ee49657c21fdaeec9ff08b45f3c5b652502dd578edc616a43da8fa7411c10cf0be3062500d3923e6f93300ce6e6ca32a13179605ca95c9250023e974040392fcffaac49faad6d6549cb1f2e1c7492ba9a8e2d26787e1872027fbe8577edbc559354f305d4e05c26a2f708bb008ca01368edece7ac1108379664aea7622db8fe0f786d6a4177494b3766d3f6f8e4c69729d1cdef558344c8bab4dfc9bfc6bc56bfa"}) ioctl$BLKTRACESTART(r5, 0x1274, 0x0) 08:17:42 executing program 4: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [{}], {}, [], {0x10, 0x2}}, 0x2c, 0x0) socket(0x10, 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r2, 0x0) chdir(&(0x7f0000000100)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') 08:17:42 executing program 1: r0 = socket$inet(0x2, 0x3, 0x2) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000240)='/dev/md0\x00', 0x0, 0x0) ioctl$void(r0, 0x5451) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) mkdir(&(0x7f00000005c0)='./file0\x00', 0x100000000020) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x7f, 0x4, 0x0, 0x0, 0x9, 0xfc, 0x0, 0x9d7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0x7) lstat(&(0x7f00000002c0)='./file1\x00', &(0x7f0000000340)) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x591800, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/nullb0\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, 0x0) r4 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000180)=ANY=[], &(0x7f0000000140)) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}}, 0x98) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000040)={0x0, 0x3a8e}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f0000000600)={r5, 0x6, 0x140a09e5, 0x3, 0x9961, 0x3}, &(0x7f0000000540)=0x14) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r3, 0x84, 0x19, &(0x7f0000000580)={r6, 0x100}, 0xffffffffffffffe9) ioctl$DRM_IOCTL_GET_SAREA_CTX(r3, 0xc010641d, &(0x7f0000000300)={0x0, &(0x7f0000000480)=""/112}) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm-monitor\x00', 0x200000, 0x0) r7 = dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_CONGESTION(r7, 0x6, 0xd, &(0x7f0000000180)='lp\x00', 0x3) ioctl$VIDIOC_TRY_FMT(r7, 0xc0d05640, &(0x7f0000000400)={0xa, @raw_data="d456e651514154be56c23a0150374fec800b3363d0f8209aea95ae10a4bfe2bc4a059b555ffe32ee49657c21fdaeec9ff08b45f3c5b652502dd578edc616a43da8fa7411c10cf0be3062500d3923e6f93300ce6e6ca32a13179605ca95c9250023e974040392fcffaac49faad6d6549cb1f2e1c7492ba9a8e2d26787e1872027fbe8577edbc559354f305d4e05c26a2f708bb008ca01368edece7ac1108379664aea7622db8fe0f786d6a4177494b3766d3f6f8e4c69729d1cdef558344c8bab4dfc9bfc6bc56bfa"}) ioctl$GIO_UNIMAP(r7, 0x4b66, &(0x7f0000000840)={0x2, &(0x7f0000000280)=[{}, {}]}) clock_gettime(0x0, &(0x7f0000000a40)={0x0, 0x0}) select(0x40, &(0x7f0000000200)={0x4, 0x7, 0x3ff, 0x3, 0xffffffffffffffe1, 0x6, 0x4b4, 0x80000001}, &(0x7f00000009c0)={0x4ebe, 0x5, 0x1, 0x7, 0x1, 0x8, 0x7, 0x100}, &(0x7f0000000a00)={0x0, 0xffffffff, 0x80000001, 0x1f, 0xfffffffffffffffd, 0x1, 0x8, 0x2000008000}, &(0x7f0000000a80)={r8, r9/1000+10000}) ioprio_set$pid(0x7, 0x0, 0x9) ioctl$BLKPG(r1, 0x932, 0x0) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0xfd) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r10 = request_key(&(0x7f0000000740)='encrypted\x00', &(0x7f0000000b00)={'syz', 0x2}, &(0x7f0000000b40)='./cgroup\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000680)='asymmetric\x00', &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, r10) request_key(&(0x7f00000004c0)='pkcs7_test\x00', &(0x7f0000000500)={'syz', 0x1}, &(0x7f0000000540)='wlan0\x00', 0x0) 08:17:42 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x305, &(0x7f0000000000)=ANY=[]}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1000000000000304, 0x400000000100) [ 573.830179][T11351] BPF:[2] ARRAY (anon) [ 573.843780][T11351] BPF:type_id=5 index_type_id=1 nr_elems=63 [ 573.887655][T11351] BPF: [ 573.911994][T11351] BPF:Invalid index [ 573.933914][T11351] BPF: [ 573.933914][T11351] 08:17:42 executing program 5: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x305, &(0x7f0000000000)=ANY=[]}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1000000000000304, 0x400000000100) 08:17:42 executing program 0: r0 = dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000180)='lp\x00', 0x3) ioctl$VIDIOC_TRY_FMT(r0, 0xc0d05640, &(0x7f0000000400)={0xa, @raw_data="d456e651514154be56c23a0150374fec800b3363d0f8209aea95ae10a4bfe2bc4a059b555ffe32ee49657c21fdaeec9ff08b45f3c5b652502dd578edc616a43da8fa7411c10cf0be3062500d3923e6f93300ce6e6ca32a13179605ca95c9250023e974040392fcffaac49faad6d6549cb1f2e1c7492ba9a8e2d26787e1872027fbe8577edbc559354f305d4e05c26a2f708bb008ca01368edece7ac1108379664aea7622db8fe0f786d6a4177494b3766d3f6f8e4c69729d1cdef558344c8bab4dfc9bfc6bc56bfa"}) ioctl$EVIOCGBITSND(r0, 0x80404532, &(0x7f0000000200)=""/171) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [{}], {}, [], {0x10, 0x2}}, 0x2c, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r4, 0x0) chdir(&(0x7f0000000100)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') 08:17:42 executing program 4: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [{}], {}, [], {0x10, 0x2}}, 0x2c, 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, 0x0, &(0x7f0000cab000)) chown(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) chdir(&(0x7f0000000100)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') 08:17:42 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x16, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000340)}, 0x42) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0xffffffffa0008000, 0xffffffffffffff3e, 0x0, &(0x7f0000000040)="a34747e865af5cf11e34bdff7a7a5ba0051aae5804d5a05d9b9ff68e12bb4d43a20375ea905795449b957e956aa6", 0x0, 0x401, 0x0, 0x0, 0xfffffffffffffff3}, 0x28) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f0000000240)={0x1ff, 0xc, 0x4, 0x0, 0x27e5, {}, {0x4, 0x8, 0x4, 0x8, 0x7, 0x6, "96669900"}, 0x7, 0x0, @fd=r0, 0x9, 0x0, r2}) r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@struct={0x0, 0x0, 0x0, 0x4, 0x0, 0x9}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x1, 0x3f}}]}}, &(0x7f0000000080)=""/236, 0x3e, 0xec, 0x8}, 0x20) ioctl$EVIOCGLED(r3, 0x80404519, &(0x7f0000000580)=""/250) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) dup(0xffffffffffffffff) r5 = dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_CONGESTION(r5, 0x6, 0xd, &(0x7f0000000180)='lp\x00', 0x3) ioctl$VIDIOC_TRY_FMT(r5, 0xc0d05640, &(0x7f0000000400)={0xa, @raw_data="d456e651514154be56c23a0150374fec800b3363d0f8209aea95ae10a4bfe2bc4a059b555ffe32ee49657c21fdaeec9ff08b45f3c5b652502dd578edc616a43da8fa7411c10cf0be3062500d3923e6f93300ce6e6ca32a13179605ca95c9250023e974040392fcffaac49faad6d6549cb1f2e1c7492ba9a8e2d26787e1872027fbe8577edbc559354f305d4e05c26a2f708bb008ca01368edece7ac1108379664aea7622db8fe0f786d6a4177494b3766d3f6f8e4c69729d1cdef558344c8bab4dfc9bfc6bc56bfa"}) ioctl$BLKTRACESTART(r5, 0x1274, 0x0) 08:17:42 executing program 1: r0 = socket$inet(0x2, 0x3, 0x2) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000240)='/dev/md0\x00', 0x440000, 0x0) ioctl$void(r0, 0x5451) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) mkdir(&(0x7f00000005c0)='./file0\x00', 0x100000000020) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x7f, 0x4, 0x0, 0x0, 0x9, 0xfc, 0x0, 0x9d7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0x7) lstat(&(0x7f00000002c0)='./file1\x00', &(0x7f0000000340)) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x591a00, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/nullb0\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, 0x0) r4 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000180)=ANY=[], &(0x7f0000000140)) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}}, 0x98) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000040)={0x0, 0x3a8e}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f0000000600)={r5, 0x6, 0x140a09e5, 0x3, 0x9961, 0x3}, &(0x7f0000000540)=0x14) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r3, 0x84, 0x19, &(0x7f0000000580)={r6, 0x100}, 0xffffffffffffffe9) ioctl$DRM_IOCTL_GET_SAREA_CTX(r3, 0xc010641d, &(0x7f0000000300)={0x0, &(0x7f0000000480)=""/112}) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm-monitor\x00', 0x200000, 0x0) r7 = dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_CONGESTION(r7, 0x6, 0xd, &(0x7f0000000180)='lp\x00', 0x3) ioctl$VIDIOC_TRY_FMT(r7, 0xc0d05640, &(0x7f0000000400)={0xa, @raw_data="d456e651514154be56c23a0150374fec800b3363d0f8209aea95ae10a4bfe2bc4a059b555ffe32ee49657c21fdaeec9ff08b45f3c5b652502dd578edc616a43da8fa7411c10cf0be3062500d3923e6f93300ce6e6ca32a13179605ca95c9250023e974040392fcffaac49faad6d6549cb1f2e1c7492ba9a8e2d26787e1872027fbe8577edbc559354f305d4e05c26a2f708bb008ca01368edece7ac1108379664aea7622db8fe0f786d6a4177494b3766d3f6f8e4c69729d1cdef558344c8bab4dfc9bfc6bc56bfa"}) ioctl$GIO_UNIMAP(r7, 0x4b66, &(0x7f0000000840)={0x2, &(0x7f0000000280)=[{}, {}]}) clock_gettime(0x6, &(0x7f0000000a40)={0x0, 0x0}) select(0x40, &(0x7f0000000200)={0x4, 0x7, 0x3ff, 0x3, 0xffffffffffffffe1, 0x6, 0x4b4, 0x80000001}, &(0x7f00000009c0)={0x4ebe, 0x5, 0x1, 0x7, 0x1, 0x8, 0x7, 0x100}, &(0x7f0000000a00)={0x0, 0xffffffff, 0x80000001, 0x1f, 0xfffffffffffffffd, 0x1, 0x8, 0x8000}, &(0x7f0000000a80)={r8, r9/1000+10000}) ioprio_set$pid(0x7, 0x0, 0x9) ioctl$BLKPG(r1, 0x932, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0x7fff) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r10 = request_key(&(0x7f0000000740)='encrypted\x00', &(0x7f0000000b00)={'syz', 0x2}, &(0x7f0000000b40)='./cgroup\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000680)='asymmetric\x00', &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, r10) request_key(&(0x7f00000004c0)='pkcs7_test\x00', &(0x7f0000000500)={'syz', 0x1}, &(0x7f0000000540)='wlan0\x00', 0x0) 08:17:43 executing program 0: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [{}], {}, [], {0x10, 0x2}}, 0x2c, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket(0x10, 0x2, 0x0) chown(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) chdir(&(0x7f0000000100)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') [ 574.383707][T11475] BPF:[2] ARRAY (anon) [ 574.395680][T11475] BPF:type_id=5 index_type_id=1 nr_elems=63 [ 574.401621][T11475] BPF: 08:17:43 executing program 4: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [{}], {}, [], {0x10, 0x2}}, 0x2c, 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, 0x0, &(0x7f0000cab000)) chown(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) chdir(&(0x7f0000000100)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') [ 574.434721][T11475] BPF:Invalid index [ 574.438874][T11475] BPF: [ 574.438874][T11475] 08:17:43 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x305, &(0x7f0000000000)=ANY=[]}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') preadv(r0, &(0x7f00000017c0), 0x1000000000000304, 0x400000000100) 08:17:43 executing program 5: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x305, &(0x7f0000000000)=ANY=[]}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1000000000000304, 0x400000000100) 08:17:43 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x16, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000340)}, 0x42) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0xffffffffa0008000, 0xffffffffffffff3e, 0x0, &(0x7f0000000040)="a34747e865af5cf11e34bdff7a7a5ba0051aae5804d5a05d9b9ff68e12bb4d43a20375ea905795449b957e956aa6", 0x0, 0x401, 0x0, 0x0, 0xfffffffffffffff3}, 0x28) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f0000000240)={0x1ff, 0xc, 0x4, 0x0, 0x27e5, {}, {0x4, 0x8, 0x4, 0x8, 0x7, 0x6, "96669900"}, 0x7, 0x0, @fd=r0, 0x9, 0x0, r2}) r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@struct={0x0, 0x0, 0x0, 0x4, 0x0, 0x9}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x1, 0x3f}}]}}, &(0x7f0000000080)=""/236, 0x3e, 0xec, 0x8}, 0x20) ioctl$EVIOCGLED(r3, 0x80404519, &(0x7f0000000580)=""/250) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) dup(0xffffffffffffffff) r5 = dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000180)='lp\x00', 0x3) ioctl$VIDIOC_TRY_FMT(r5, 0xc0d05640, &(0x7f0000000400)={0xa, @raw_data="d456e651514154be56c23a0150374fec800b3363d0f8209aea95ae10a4bfe2bc4a059b555ffe32ee49657c21fdaeec9ff08b45f3c5b652502dd578edc616a43da8fa7411c10cf0be3062500d3923e6f93300ce6e6ca32a13179605ca95c9250023e974040392fcffaac49faad6d6549cb1f2e1c7492ba9a8e2d26787e1872027fbe8577edbc559354f305d4e05c26a2f708bb008ca01368edece7ac1108379664aea7622db8fe0f786d6a4177494b3766d3f6f8e4c69729d1cdef558344c8bab4dfc9bfc6bc56bfa"}) ioctl$BLKTRACESTART(r5, 0x1274, 0x0) 08:17:43 executing program 1: r0 = socket$inet(0x2, 0x3, 0x2) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000240)='/dev/md0\x00', 0x0, 0x0) ioctl$void(r0, 0x5451) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) mkdir(&(0x7f00000005c0)='./file0\x00', 0x100000000020) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x7f, 0x4, 0x0, 0x0, 0x9, 0xfc, 0x0, 0x9d7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0x7) lstat(&(0x7f00000002c0)='./file1\x00', &(0x7f0000000340)) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x591800, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/nullb0\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, 0x0) r4 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000180)=ANY=[], &(0x7f0000000140)) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}}, 0x98) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000040)={0x0, 0x3a8e}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f0000000600)={r5, 0x6, 0x140a09e5, 0x3, 0x9961, 0x3}, &(0x7f0000000540)=0x14) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r3, 0x84, 0x19, &(0x7f0000000580)={r6, 0x100}, 0xffffffffffffffe9) ioctl$DRM_IOCTL_GET_SAREA_CTX(r3, 0xc010641d, &(0x7f0000000300)={0x0, &(0x7f0000000480)=""/112}) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm-monitor\x00', 0x200000, 0x0) r7 = dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_CONGESTION(r7, 0x6, 0xd, &(0x7f0000000180)='lp\x00', 0x3) ioctl$VIDIOC_TRY_FMT(r7, 0xc0d05640, &(0x7f0000000400)={0xa, @raw_data="d456e651514154be56c23a0150374fec800b3363d0f8209aea95ae10a4bfe2bc4a059b555ffe32ee49657c21fdaeec9ff08b45f3c5b652502dd578edc616a43da8fa7411c10cf0be3062500d3923e6f93300ce6e6ca32a13179605ca95c9250023e974040392fcffaac49faad6d6549cb1f2e1c7492ba9a8e2d26787e1872027fbe8577edbc559354f305d4e05c26a2f708bb008ca01368edece7ac1108379664aea7622db8fe0f786d6a4177494b3766d3f6f8e4c69729d1cdef558344c8bab4dfc9bfc6bc56bfa"}) ioctl$GIO_UNIMAP(r7, 0x4b66, &(0x7f0000000840)={0x2, &(0x7f0000000280)=[{}, {}]}) clock_gettime(0x0, &(0x7f0000000a40)) select(0x40, &(0x7f0000000200)={0x4, 0x7, 0x3ff, 0x3, 0xffffffffffffffe1, 0x6, 0x4b0, 0x80000001}, &(0x7f00000009c0)={0x4ebe, 0x5, 0x10005, 0x7, 0x1, 0x8, 0x7, 0x104}, &(0x7f0000000a00)={0x0, 0xffffdfff, 0x80000001, 0x1f, 0xfffffffffffffffd, 0x1, 0x8, 0x8000}, &(0x7f0000000a80)) ioprio_set$pid(0x7, 0x0, 0x9) ioctl$BLKPG(r1, 0x932, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0x7fff) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r8 = request_key(&(0x7f0000000740)='encrypted\x00', &(0x7f0000000b00)={'syz', 0x2}, &(0x7f0000000b40)='./cgroup\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000680)='asymmetric\x00', &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, r8) request_key(&(0x7f00000004c0)='pkcs7_test\x00', &(0x7f0000000500)={'syz', 0x1}, &(0x7f0000000540)='wlan0\x00', 0x0) 08:17:43 executing program 0: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000200)='./file0/file0\x00', &(0x7f0000000240), 0x1000) lsetxattr$system_posix_acl(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [], {0x4, 0x9ea07d95b02fe95c}, [], {0x10, 0x2}}, 0x24, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000340)='./file0/file0\x00', 0x3, 0x3, &(0x7f00000006c0)=[{&(0x7f0000000380), 0x0, 0xd0b}, {&(0x7f0000000500)="bd785435377da53dd60d901d386c6facab84a054f8b93e3909637a62f7a3488fa067ae6760ba40f9daaa3acf7df7a6b2336005d1fd0d9f3c81308c99f8dbab2e6a985ce61acd34fa0842ace3955ac4b684f9b010a66409891542c70581afa102f4c3b8c8e8d3c255c816d55bebe2adc159ccfca2043951caf42ae75f0e447d21a2b07526a3dbf755dbd0f486658ddc546c8835", 0x93, 0x3}, {&(0x7f00000005c0)="0dbf069691da2b851780f52863247a3948d074f2dfe470b34856a68185382bf1cbb5aaf7eff46863b710bbcd56d0e8229b2564362c0f7c31593094a0952900db0216f20dad1e2844d8dbf754bd3ab686171e86661de7bd4b59ccf3b4066e6ad4f82c83f03584ce81fb687a13fbba49e7837b3c1ff9ff444b839704f417b198367582b223e9cc6ca0ab2f457441fa29cf1d21a306b767e0cf339e908654ca7a3e437d464959833ca182cbadba36018050dc49542dfe7633508f8e62492befe11131a06c1dae736a9117fd6d5b", 0xcc, 0x3ff}], 0x840002, &(0x7f0000000840)={[{@hash_tea='hash=tea'}, {@resize_auto='resize=auto'}, {@balloc_test4='block-allocator=test4'}, {@conv='conv'}, {@usrjquota_file='usrjquota=syz'}, {@resize_auto='resize=auto'}, {@acl='acl'}, {@balloc_notest4='block-allocator=notest4'}], [{@uid_gt={'uid>', 0xffffffffffffffff}}, {@dont_measure='dont_measure'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) r1 = dup(r0) r2 = dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000180)='lp\x00', 0x3) ioctl$VIDIOC_TRY_FMT(r2, 0xc0d05640, &(0x7f0000000400)={0xa, @raw_data="d456e651514154be56c23a0150374fec800b3363d0f8209aea95ae10a4bfe2bc4a059b555ffe32ee49657c21fdaeec9ff08b45f3c5b652502dd578edc616a43da8fa7411c10cf0be3062500d3923e6f93300ce6e6ca32a13179605ca95c9250023e974040392fcffaac49faad6d6549cb1f2e1c7492ba9a8e2d26787e1872027fbe8577edbc559354f305d4e05c26a2f708bb008ca01368edece7ac1108379664aea7622db8fe0f786d6a4177494b3766d3f6f8e4c69729d1cdef558344c8bab4dfc9bfc6bc56bfa"}) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r2, 0xc00c642e, &(0x7f0000000000)={0x0, 0x0, r0}) r4 = dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_CONGESTION(r4, 0x6, 0xd, &(0x7f0000000180)='lp\x00', 0x3) ioctl$VIDIOC_TRY_FMT(r4, 0xc0d05640, &(0x7f0000000400)={0xa, @raw_data="d456e651514154be56c23a0150374fec800b3363d0f8209aea95ae10a4bfe2bc4a059b555ffe32ee49657c21fdaeec9ff08b45f3c5b652502dd578edc616a43da8fa7411c10cf0be3062500d3923e6f93300ce6e6ca32a13179605ca95c9250023e974040392fcffaac49faad6d6549cb1f2e1c7492ba9a8e2d26787e1872027fbe8577edbc559354f305d4e05c26a2f708bb008ca01368edece7ac1108379664aea7622db8fe0f786d6a4177494b3766d3f6f8e4c69729d1cdef558344c8bab4dfc9bfc6bc56bfa"}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r1, 0xc00c642d, &(0x7f0000000040)={r3, 0x0, r4}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r5 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r6, 0x0) chdir(&(0x7f0000000100)='./file0\x00') clock_gettime(0x5, &(0x7f0000000380)) symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') 08:17:43 executing program 4: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [{}], {}, [], {0x10, 0x2}}, 0x2c, 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, 0x0, &(0x7f0000cab000)) chown(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) chdir(&(0x7f0000000100)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') 08:17:43 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x305, &(0x7f0000000000)=ANY=[]}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') preadv(r0, &(0x7f00000017c0), 0x1000000000000304, 0x400000000100) [ 574.826344][T11595] BPF:[2] ARRAY (anon) [ 574.843704][T11595] BPF:type_id=5 index_type_id=1 nr_elems=63 [ 574.867976][T11595] BPF: [ 574.870891][T11595] BPF:Invalid index [ 574.916298][T11595] BPF: [ 574.916298][T11595] 08:17:43 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x16, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000340)}, 0x42) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0xffffffffa0008000, 0xffffffffffffff3e, 0x0, &(0x7f0000000040)="a34747e865af5cf11e34bdff7a7a5ba0051aae5804d5a05d9b9ff68e12bb4d43a20375ea905795449b957e956aa6", 0x0, 0x401, 0x0, 0x0, 0xfffffffffffffff3}, 0x28) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f0000000240)={0x1ff, 0xc, 0x4, 0x0, 0x27e5, {}, {0x4, 0x8, 0x4, 0x8, 0x7, 0x6, "96669900"}, 0x7, 0x0, @fd=r0, 0x9, 0x0, r2}) r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@struct={0x0, 0x0, 0x0, 0x4, 0x0, 0x9}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x1, 0x3f}}]}}, &(0x7f0000000080)=""/236, 0x3e, 0xec, 0x8}, 0x20) ioctl$EVIOCGLED(r3, 0x80404519, &(0x7f0000000580)=""/250) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) dup(0xffffffffffffffff) r5 = dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000180)='lp\x00', 0x3) ioctl$VIDIOC_TRY_FMT(r5, 0xc0d05640, &(0x7f0000000400)={0xa, @raw_data="d456e651514154be56c23a0150374fec800b3363d0f8209aea95ae10a4bfe2bc4a059b555ffe32ee49657c21fdaeec9ff08b45f3c5b652502dd578edc616a43da8fa7411c10cf0be3062500d3923e6f93300ce6e6ca32a13179605ca95c9250023e974040392fcffaac49faad6d6549cb1f2e1c7492ba9a8e2d26787e1872027fbe8577edbc559354f305d4e05c26a2f708bb008ca01368edece7ac1108379664aea7622db8fe0f786d6a4177494b3766d3f6f8e4c69729d1cdef558344c8bab4dfc9bfc6bc56bfa"}) ioctl$BLKTRACESTART(r5, 0x1274, 0x0) 08:17:43 executing program 5: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x305, &(0x7f0000000000)=ANY=[]}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1000000000000304, 0x400000000100) 08:17:43 executing program 0: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [{}], {}, [], {0x10, 0x2}}, 0x2c, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$media(&(0x7f0000000600)='/dev/media#\x00', 0x0, 0x80) setsockopt$inet_sctp6_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000640)=@assoc_value={0x0, 0x7}, 0x8) r2 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r4, 0x0) chdir(&(0x7f0000000100)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') 08:17:43 executing program 1: r0 = socket$inet(0x2, 0x3, 0x2) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000240)='/dev/md0\x00', 0x0, 0x0) ioctl$void(r0, 0x5451) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) mkdir(&(0x7f00000005c0)='./file0\x00', 0x100000000020) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x7f, 0x4, 0x0, 0x0, 0x9, 0xfc, 0x0, 0x9d7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0x7) lstat(&(0x7f00000002c0)='./file1\x00', &(0x7f0000000340)) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x591800, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/nullb0\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, 0x0) r4 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000180)=ANY=[], &(0x7f0000000140)) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x4e24, @rand_addr=0xc2}}}, 0x9c) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000040)={0x0, 0x3a8e}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f0000000600)={r5, 0x6, 0x140a09e5, 0x3, 0x9961, 0x3}, &(0x7f0000000540)=0x14) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r3, 0x84, 0x19, &(0x7f0000000580)={r6, 0x100}, 0xffffffffffffffe9) ioctl$DRM_IOCTL_GET_SAREA_CTX(r3, 0xc010641d, &(0x7f0000000300)={0x0, &(0x7f0000000480)=""/112}) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm-monitor\x00', 0x28a302, 0x0) r7 = dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_CONGESTION(r7, 0x6, 0xd, &(0x7f0000000180)='lp\x00', 0x3) ioctl$VIDIOC_TRY_FMT(r7, 0xc0d05640, &(0x7f0000000400)={0xa, @raw_data="d456e651514154be56c23a0150374fec800b3363d0f8209aea95ae10a4bfe2bc4a059b555ffe32ee49657c21fdaeec9ff08b45f3c5b652502dd578edc616a43da8fa7411c10cf0be3062500d3923e6f93300ce6e6ca32a13179605ca95c9250023e974040392fcffaac49faad6d6549cb1f2e1c7492ba9a8e2d26787e1872027fbe8577edbc559354f305d4e05c26a2f708bb008ca01368edece7ac1108379664aea7622db8fe0f786d6a4177494b3766d3f6f8e4c69729d1cdef558344c8bab4dfc9bfc6bc56bfa"}) ioctl$GIO_UNIMAP(r7, 0x4b66, &(0x7f0000000840)={0x2, &(0x7f0000000280)=[{}, {}]}) clock_gettime(0x0, &(0x7f0000000a40)={0x0, 0x0}) select(0x40, &(0x7f0000000200)={0x4, 0x7, 0x3ff, 0x3, 0xffffffffffffffe1, 0x6, 0x4b4, 0x80000001}, &(0x7f00000009c0)={0x4ebe, 0x5, 0x1, 0x7, 0x1, 0x8, 0x7, 0x100}, &(0x7f0000000a00)={0x0, 0xffffffff, 0x80000001, 0x1f, 0xfffffffffffffffd, 0x1, 0x8, 0x8000}, &(0x7f0000000a80)={r8, r9/1000+10000}) ioprio_set$pid(0x7, 0x0, 0x9) ioctl$BLKPG(r1, 0x932, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0x7fff) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r10 = request_key(&(0x7f0000000740)='encrypted\x00', &(0x7f0000000b00)={'syz', 0x2}, &(0x7f0000000b40)='./cgroup\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000680)='asymmetric\x00', &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, r10) request_key(&(0x7f00000004c0)='pkcs7_test\x00', &(0x7f0000000500)={'syz', 0x1}, &(0x7f0000000540)='wlan0\x00', 0x0) 08:17:43 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x305, &(0x7f0000000000)=ANY=[]}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') preadv(r0, &(0x7f00000017c0), 0x1000000000000304, 0x400000000100) 08:17:43 executing program 4: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [{}], {}, [], {0x10, 0x2}}, 0x2c, 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) chown(&(0x7f00000001c0)='./file0\x00', r3, 0x0) chdir(&(0x7f0000000100)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') [ 575.336801][T11723] BPF:[2] ARRAY (anon) [ 575.358767][T11723] BPF:type_id=5 index_type_id=1 nr_elems=63 [ 575.391176][T11723] BPF: 08:17:44 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x305, &(0x7f0000000000)=ANY=[]}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x1000000000000304, 0x400000000100) [ 575.406092][T11723] BPF:Invalid index [ 575.428770][T11723] BPF: [ 575.428770][T11723] 08:17:44 executing program 0: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r0 = dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000180)='lp\x00', 0x3) ioctl$VIDIOC_TRY_FMT(r0, 0xc0d05640, &(0x7f0000000400)={0xa, @raw_data="d456e651514154be56c23a0150374fec800b3363d0f8209aea95ae10a4bfe2bc4a059b555ffe32ee49657c21fdaeec9ff08b45f3c5b652502dd578edc616a43da8fa7411c10cf0be3062500d3923e6f93300ce6e6ca32a13179605ca95c9250023e974040392fcffaac49faad6d6549cb1f2e1c7492ba9a8e2d26787e1872027fbe8577edbc559354f305d4e05c26a2f708bb008ca01368edece7ac1108379664aea7622db8fe0f786d6a4177494b3766d3f6f8e4c69729d1cdef558344c8bab4dfc9bfc6bc56bfa"}) statx(r0, &(0x7f0000000000)='./file0\x00', 0x4000, 0xfff, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r2 = getgid() setresgid(0x0, r2, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000040)={{}, {}, [{}], {}, [{0x8, 0x2, r1}, {0x8, 0x0, r2}], {0x10, 0x2}}, 0x3c, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup2(r6, r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) chdir(&(0x7f00000002c0)='./bus\x00') r8 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) getdents64(r8, 0x0, 0x0) getdents64(r8, &(0x7f0000000140)=""/165, 0x407) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r9 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r10, 0x0) chdir(&(0x7f0000000100)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') 08:17:44 executing program 5: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x305, &(0x7f0000000000)=ANY=[]}, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x1000000000000304, 0x400000000100) 08:17:44 executing program 4: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [{}], {}, [], {0x10, 0x2}}, 0x2c, 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) chown(&(0x7f00000001c0)='./file0\x00', r3, 0x0) chdir(&(0x7f0000000100)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') 08:17:44 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x16, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffff1971a4f0ff00000000b7060000000000811e6403000000000045040400010000001704000001000a00b7040000000100006a0af2fe00000000850000001a000000b70000000000000095000000000000009e17890efaee5eab7ff8a8cdc21ce784909b849d5550ad855dab54d8877a6db61d69f2ffcaa10350e11cb97c8adf1bc9a0c4ee6d9674c77404ceb9971e43405d621ffbc9a4fd39b0b56bfe6508ebb3c44eb84049761451ce540c772e2d9f8004e26f7fcc059c062234d5595f6fba87b81d1106fb0289ce67a66afd9ac3d09e29a9d542ca9d85a5c9c88474895d679838def0a83a733dc6a39b63a5ed69d32394c53361d7480884bd8048a967d9b912ef9f1d6fee41f5b29d37acb91c61ccd1df673896450f859ce8122a79c3e4"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000340)}, 0x42) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0xffffffffa0008000, 0xffffffffffffff3e, 0x0, &(0x7f0000000040)="a34747e865af5cf11e34bdff7a7a5ba0051aae5804d5a05d9b9ff68e12bb4d43a20375ea905795449b957e956aa6", 0x0, 0x401, 0x0, 0x0, 0xfffffffffffffff3}, 0x28) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f0000000240)={0x1ff, 0xc, 0x4, 0x0, 0x27e5, {}, {0x4, 0x8, 0x4, 0x8, 0x7, 0x6, "96669900"}, 0x7, 0x0, @fd=r0, 0x9, 0x0, r2}) r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@struct={0x0, 0x0, 0x0, 0x4, 0x0, 0x9}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x1, 0x3f}}]}}, &(0x7f0000000080)=""/236, 0x3e, 0xec, 0x8}, 0x20) ioctl$EVIOCGLED(r3, 0x80404519, &(0x7f0000000580)=""/250) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) dup(0xffffffffffffffff) r5 = dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000180)='lp\x00', 0x3) ioctl$VIDIOC_TRY_FMT(r5, 0xc0d05640, &(0x7f0000000400)={0xa, @raw_data="d456e651514154be56c23a0150374fec800b3363d0f8209aea95ae10a4bfe2bc4a059b555ffe32ee49657c21fdaeec9ff08b45f3c5b652502dd578edc616a43da8fa7411c10cf0be3062500d3923e6f93300ce6e6ca32a13179605ca95c9250023e974040392fcffaac49faad6d6549cb1f2e1c7492ba9a8e2d26787e1872027fbe8577edbc559354f305d4e05c26a2f708bb008ca01368edece7ac1108379664aea7622db8fe0f786d6a4177494b3766d3f6f8e4c69729d1cdef558344c8bab4dfc9bfc6bc56bfa"}) ioctl$BLKTRACESTART(r5, 0x1274, 0x0) 08:17:44 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x305, &(0x7f0000000000)=ANY=[]}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x1000000000000304, 0x400000000100) 08:17:44 executing program 1: r0 = socket$inet(0x2, 0x3, 0x2) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000240)='/dev/md0\x00', 0x0, 0x0) ioctl$void(r0, 0x5451) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) mkdir(&(0x7f00000005c0)='./file0\x00', 0x100000000020) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1000007f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x7f, 0x4, 0x0, 0x0, 0x9, 0xfc, 0x0, 0x9d7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, @perf_bp={0x0}, 0x400, 0x0, 0x0, 0x3, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0x7) lstat(&(0x7f00000002c0)='./file1\x00', &(0x7f0000000340)) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x589e02, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/nullb0\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) r4 = dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_CONGESTION(r4, 0x6, 0xd, &(0x7f0000000180)='lp\x00', 0x3) ioctl$VIDIOC_TRY_FMT(r4, 0xc0d05640, &(0x7f0000000400)={0xa, @raw_data="d456e651514154be56c23a0150374fec800b3363d0f8209aea95ae10a4bfe2bc4a059b555ffe32ee49657c21fdaeec9ff08b45f3c5b652502dd578edc616a43da8fa7411c10cf0be3062500d3923e6f93300ce6e6ca32a13179605ca95c9250023e974040392fcffaac49faad6d6549cb1f2e1c7492ba9a8e2d26787e1872027fbe8577edbc559354f305d4e05c26a2f708bb008ca01368edece7ac1108379664aea7622db8fe0f786d6a4177494b3766d3f6f8e4c69729d1cdef558344c8bab4dfc9bfc6bc56bfa"}) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) r6 = dup(r5) ioctl$BLKROTATIONAL(r6, 0x127e, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, 0x0) r7 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000180)=ANY=[], &(0x7f0000000140)) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r7, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}}, 0x98) r8 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r8, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r8, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r9 = socket(0xa, 0x1, 0x0) r10 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r10, 0x84, 0x1d, &(0x7f00000007c0)=ANY=[@ANYBLOB="b4b1fd4b3a5dc03c4dfd8be0919de8d75a1cac006a9b660251a4dffdd64359113ea920a2733c075a9ddd5578c83d03000000000000004fdefc8c43f7dc143bfb28ec1f36", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r9, 0x84, 0x11, &(0x7f0000000100)={r11}, 0x8) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000500)={r11, 0x1}, &(0x7f0000000780)=0x8) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r8, 0x84, 0x66, &(0x7f00000003c0)={r12, 0x3a8e}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f0000000600)={r13, 0x6, 0x140a09e5, 0x3, 0x9961, 0x3}, &(0x7f0000000540)=0x14) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r3, 0x84, 0x19, &(0x7f0000000580)={r14, 0x100}, 0xffffffffffffffe9) ioctl$DRM_IOCTL_GET_SAREA_CTX(r3, 0xc010641d, &(0x7f0000000300)={0x0, &(0x7f0000000480)=""/112}) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm-monitor\x00', 0x200000, 0x0) r15 = dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_CONGESTION(r15, 0x6, 0xd, &(0x7f0000000180)='lp\x00', 0x3) ioctl$VIDIOC_TRY_FMT(r15, 0xc0d05640, &(0x7f0000000400)={0xa, @raw_data="d456e651514154be56c23a0150374fec800b3363d0f8209aea95ae10a4bfe2bc4a059b555ffe32ee49657c21fdaeec9ff08b45f3c5b652502dd578edc616a43da8fa7411c10cf0be3062500d3923e6f93300ce6e6ca32a13179605ca95c9250023e974040392fcffaac49faad6d6549cb1f2e1c7492ba9a8e2d26787e1872027fbe8577edbc559354f305d4e05c26a2f708bb008ca01368edece7ac1108379664aea7622db8fe0f786d6a4177494b3766d3f6f8e4c69729d1cdef558344c8bab4dfc9bfc6bc56bfa"}) ioctl$GIO_UNIMAP(r15, 0x4b66, &(0x7f0000000840)={0x2, &(0x7f0000000280)=[{}, {}]}) clock_gettime(0x0, &(0x7f0000000a40)={0x0, 0x0}) select(0x40, &(0x7f0000000200)={0x4, 0x7, 0x3ff, 0x3, 0xffffffffffffffe1, 0x6, 0x4b4, 0x80000001}, &(0x7f00000009c0)={0x4ebe, 0x5, 0x1, 0x7, 0x1, 0x8, 0x7, 0x100}, &(0x7f0000000a00)={0x0, 0xffffffff, 0x80000001, 0x1f, 0xfffffffffffffffd, 0x1, 0x8, 0x8000}, &(0x7f0000000a80)={r16, r17/1000+10000}) ioprio_set$pid(0x7, 0x0, 0x9) ioctl$BLKPG(r1, 0x932, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0x7fff) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r18 = request_key(&(0x7f0000000740)='encrypted\x00', &(0x7f0000000b00)={'syz', 0x2}, &(0x7f0000000b40)='./cgroup\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000680)='asymmetric\x00', &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, r18) request_key(&(0x7f00000004c0)='user\x00', &(0x7f00000006c0)={'syz', 0x1}, &(0x7f0000000700)='\x04', 0x0) [ 575.748595][T11845] BPF:[2] ARRAY (anon) 08:17:44 executing program 5: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x305, &(0x7f0000000000)=ANY=[]}, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x1000000000000304, 0x400000000100) [ 575.773321][T11845] BPF:type_id=5 index_type_id=1 nr_elems=63 [ 575.814674][T11845] BPF: [ 575.817603][T11845] BPF:Invalid index [ 575.833493][T11845] BPF: [ 575.833493][T11845] 08:17:44 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x305, &(0x7f0000000000)=ANY=[]}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x1000000000000304, 0x400000000100) 08:17:44 executing program 4: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [{}], {}, [], {0x10, 0x2}}, 0x2c, 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) chown(&(0x7f00000001c0)='./file0\x00', r3, 0x0) chdir(&(0x7f0000000100)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') 08:17:44 executing program 5: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x305, &(0x7f0000000000)=ANY=[]}, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x1000000000000304, 0x400000000100) 08:17:44 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x16, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000340)}, 0x42) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0xffffffffa0008000, 0xffffffffffffff3e, 0x0, &(0x7f0000000040)="a34747e865af5cf11e34bdff7a7a5ba0051aae5804d5a05d9b9ff68e12bb4d43a20375ea905795449b957e956aa6", 0x0, 0x401, 0x0, 0x0, 0xfffffffffffffff3}, 0x28) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f0000000240)={0x1ff, 0xc, 0x4, 0x0, 0x27e5, {}, {0x4, 0x8, 0x4, 0x8, 0x7, 0x6, "96669900"}, 0x7, 0x0, @fd=r0, 0x9, 0x0, r2}) r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@struct={0x0, 0x0, 0x0, 0x4, 0x0, 0x9}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x1, 0x3f}}]}}, &(0x7f0000000080)=""/236, 0x3e, 0xec, 0x8}, 0x20) ioctl$EVIOCGLED(r3, 0x80404519, &(0x7f0000000580)=""/250) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) dup(0xffffffffffffffff) r5 = dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_CONGESTION(r5, 0x6, 0xd, 0x0, 0x0) ioctl$VIDIOC_TRY_FMT(r5, 0xc0d05640, &(0x7f0000000400)={0xa, @raw_data="d456e651514154be56c23a0150374fec800b3363d0f8209aea95ae10a4bfe2bc4a059b555ffe32ee49657c21fdaeec9ff08b45f3c5b652502dd578edc616a43da8fa7411c10cf0be3062500d3923e6f93300ce6e6ca32a13179605ca95c9250023e974040392fcffaac49faad6d6549cb1f2e1c7492ba9a8e2d26787e1872027fbe8577edbc559354f305d4e05c26a2f708bb008ca01368edece7ac1108379664aea7622db8fe0f786d6a4177494b3766d3f6f8e4c69729d1cdef558344c8bab4dfc9bfc6bc56bfa"}) ioctl$BLKTRACESTART(r5, 0x1274, 0x0) 08:17:44 executing program 0: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [{}], {}, [], {0x10, 0x2}}, 0x2c, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r3, 0x0) chdir(&(0x7f0000000100)='./file0\x00') r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) recvmsg$can_j1939(r4, &(0x7f0000000740)={&(0x7f0000000200)=@xdp, 0x80, &(0x7f0000000340)=[{&(0x7f0000000400)=""/151, 0x97}, {&(0x7f0000000040)=""/50, 0x32}, {&(0x7f00000004c0)=""/129, 0x81}, {&(0x7f0000000580)=""/146, 0x92}, {&(0x7f0000000180)=""/46, 0x2e}, {&(0x7f0000000640)=""/175, 0xaf}, {&(0x7f0000000840)=""/235, 0xeb}, {&(0x7f0000000280)=""/73, 0x49}], 0x8, &(0x7f0000000700)=""/33, 0x21}, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0/file0\x00', 0x200800, 0x10) symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') 08:17:44 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1000000000000304, 0x400000000100) 08:17:44 executing program 4: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [{}], {}, [], {0x10, 0x2}}, 0x2c, 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(0x0, r3, 0x0) chdir(&(0x7f0000000100)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') [ 576.180655][T11974] BPF:[2] ARRAY (anon) 08:17:44 executing program 1: r0 = socket$inet(0x2, 0x3, 0x2) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000240)='/dev/md0\x00', 0x0, 0x0) ioctl$void(r0, 0x5451) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) mkdir(&(0x7f00000005c0)='./file0\x00', 0x100000000020) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x84, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3, 0x7f, 0x4, 0x0, 0x0, 0x9, 0xfc, 0x0, 0x9d7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0xff81}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0x7) lstat(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000340)) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x591800, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/nullb0\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, 0x0) r4 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000180)=ANY=[], &(0x7f0000000140)) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}}, 0x98) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000040)={0x0, 0x3a8e}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f0000000600)={r5, 0x6, 0x140a09e5, 0x3, 0x9961, 0x3}, &(0x7f0000000540)=0x14) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r3, 0x84, 0x19, &(0x7f0000000580)={r6, 0x100}, 0xffffffffffffffe9) ioctl$DRM_IOCTL_GET_SAREA_CTX(r3, 0xc010641d, &(0x7f0000000300)={0x0, &(0x7f0000000480)=""/112}) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm-monitor\x00', 0x200000, 0x0) r7 = dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_CONGESTION(r7, 0x6, 0xd, &(0x7f0000000180)='lp\x00', 0x3) ioctl$VIDIOC_TRY_FMT(r7, 0xc0d05640, &(0x7f0000000400)={0xa, @raw_data="d456e651514154be56c23a0150374fec800b3363d0f8209aea95ae10a4bfe2bc4a059b555ffe32ee49657c21fdaeec9ff08b45f3c5b652502dd578edc616a43da8fa7411c10cf0be3062500d3923e6f93300ce6e6ca32a13179605ca95c9250023e974040392fcffaac49faad6d6549cb1f2e1c7492ba9a8e2d26787e1872027fbe8577edbc559354f305d4e05c26a2f708bb008ca01368edece7ac1108379664aea7622db8fe0f786d6a4177494b3766d3f6f8e4c69729d1cdef558344c8bab4dfc9bfc6bc56bfa"}) ioctl$GIO_UNIMAP(r7, 0x4b66, &(0x7f0000000840)={0x2, &(0x7f0000000280)=[{}, {}]}) clock_gettime(0x0, &(0x7f0000000a40)={0x0, 0x0}) select(0x40, &(0x7f0000000200)={0x4, 0x7, 0x3ff, 0x3, 0xffffffffffffffe1, 0x6, 0x4b4, 0x80000001}, &(0x7f00000009c0)={0x4ebe, 0x5, 0x1, 0x7, 0x1, 0x8, 0x7, 0x100}, &(0x7f0000000a00)={0x0, 0xffffffff, 0x80000001, 0x1f, 0xfffffffffffffffd, 0x1, 0x8, 0x7ffe}, &(0x7f0000000a80)={r8, r9/1000+10000}) ioprio_set$pid(0x7, 0x0, 0x9) ioctl$BLKPG(r1, 0x932, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0x7fff) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r10 = request_key(&(0x7f0000000740)='encrypted\x00', &(0x7f0000000b00)={'syz', 0x2}, &(0x7f0000000b40)='./cgroup\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000680)='asymmetric\x00', &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, r10) request_key(&(0x7f00000003c0)='id_resolver\x00', &(0x7f0000000500)={'syz', 0x1}, &(0x7f0000000540)='wla\x810\x00', 0x0) 08:17:44 executing program 5: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x305, &(0x7f0000000000)=ANY=[]}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, 0x0, 0x0, 0x400000000100) [ 576.211864][T11974] BPF:type_id=5 index_type_id=1 nr_elems=63 [ 576.240511][T11974] BPF: [ 576.267743][T11974] BPF:Invalid index [ 576.284188][T11974] BPF: [ 576.284188][T11974] 08:17:45 executing program 5: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x305, &(0x7f0000000000)=ANY=[]}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, 0x0, 0x0, 0x400000000100) 08:17:45 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1000000000000304, 0x400000000100) 08:17:45 executing program 4: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [{}], {}, [], {0x10, 0x2}}, 0x2c, 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(0x0, r3, 0x0) chdir(&(0x7f0000000100)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') 08:17:45 executing program 0: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [{}], {}, [], {0x10, 0x2}}, 0x2c, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) mlock2(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x40442, 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r3, 0x0) chdir(&(0x7f0000000100)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') 08:17:45 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x16, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000340)}, 0x42) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0xffffffffa0008000, 0xffffffffffffff3e, 0x0, &(0x7f0000000040)="a34747e865af5cf11e34bdff7a7a5ba0051aae5804d5a05d9b9ff68e12bb4d43a20375ea905795449b957e956aa6", 0x0, 0x401, 0x0, 0x0, 0xfffffffffffffff3}, 0x28) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f0000000240)={0x1ff, 0xc, 0x4, 0x0, 0x27e5, {}, {0x4, 0x8, 0x4, 0x8, 0x7, 0x6, "96669900"}, 0x7, 0x0, @fd=r0, 0x9, 0x0, r2}) r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@struct={0x0, 0x0, 0x0, 0x4, 0x0, 0x9}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x1, 0x3f}}]}}, &(0x7f0000000080)=""/236, 0x3e, 0xec, 0x8}, 0x20) ioctl$EVIOCGLED(r3, 0x80404519, &(0x7f0000000580)=""/250) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) dup(0xffffffffffffffff) r5 = dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_CONGESTION(r5, 0x6, 0xd, 0x0, 0x0) ioctl$VIDIOC_TRY_FMT(r5, 0xc0d05640, &(0x7f0000000400)={0xa, @raw_data="d456e651514154be56c23a0150374fec800b3363d0f8209aea95ae10a4bfe2bc4a059b555ffe32ee49657c21fdaeec9ff08b45f3c5b652502dd578edc616a43da8fa7411c10cf0be3062500d3923e6f93300ce6e6ca32a13179605ca95c9250023e974040392fcffaac49faad6d6549cb1f2e1c7492ba9a8e2d26787e1872027fbe8577edbc559354f305d4e05c26a2f708bb008ca01368edece7ac1108379664aea7622db8fe0f786d6a4177494b3766d3f6f8e4c69729d1cdef558344c8bab4dfc9bfc6bc56bfa"}) ioctl$BLKTRACESTART(r5, 0x1274, 0x0) 08:17:45 executing program 1: r0 = socket$inet(0x2, 0x3, 0x2) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000240)='/dev/md0\x00', 0x0, 0x0) ioctl$void(r0, 0x5451) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) mkdir(&(0x7f00000005c0)='./file0\x00', 0x100000000020) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x7f, 0x4, 0x0, 0x0, 0x9, 0xfc, 0x0, 0x9d7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0x7) lstat(&(0x7f00000003c0)='./file1\x00', &(0x7f0000000340)) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x591800, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/nullb0\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, 0x0) r4 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000180)=ANY=[], &(0x7f0000000140)) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}}, 0x98) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000040)={0x0, 0x3a8e}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f0000000600)={r5, 0x7, 0x140a09e5, 0x3, 0x9961, 0x3}, &(0x7f0000000540)=0x14) ioctl$DRM_IOCTL_GET_SAREA_CTX(r3, 0xc010641d, &(0x7f0000000300)={0x0, &(0x7f0000000480)=""/112}) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm-monitor\x00', 0x200000, 0x0) r6 = dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_CONGESTION(r6, 0x6, 0xd, &(0x7f0000000180)='lp\x00', 0x3) ioctl$VIDIOC_TRY_FMT(r6, 0xc0d05640, &(0x7f0000000400)={0xa, @raw_data="d456e651514154be56c23a0150374fec800b3363d0f8209aea95ae10a4bfe2bc4a059b555ffe32ee49657c21fdaeec9ff08b45f3c5b652502dd578edc616a43da8fa7411c10cf0be3062500d3923e6f93300ce6e6ca32a13179605ca95c9250023e974040392fcffaac49faad6d6549cb1f2e1c7492ba9a8e2d26787e1872027fbe8577edbc559354f305d4e05c26a2f708bb008ca01368edece7ac1108379664aea7622db8fe0f786d6a4177494b3766d3f6f8e4c69729d1cdef558344c8bab4dfc9bfc6bc56bfa"}) ioctl$GIO_UNIMAP(r6, 0x4b66, &(0x7f0000000840)={0x2, &(0x7f0000000280)=[{}, {}]}) clock_gettime(0x0, &(0x7f0000000a40)={0x0, 0x0}) select(0x40, &(0x7f0000000200)={0x4, 0x7, 0x3ff, 0x3, 0xffffffffffffffe1, 0x6, 0x4b4, 0x80000001}, &(0x7f00000009c0)={0x4ebe, 0x5, 0x1, 0x7, 0x1, 0x8, 0x7, 0x100}, &(0x7f0000000a00)={0x0, 0xffffffff, 0x80000001, 0x1f, 0xfffffffffffffffd, 0x1, 0x8, 0x8000}, &(0x7f0000000a80)={r7, r8/1000+10000}) ioprio_set$pid(0x7, 0x0, 0x9) ioctl$BLKPG(r1, 0x932, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0x7fff) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, 0x0, 0xfffffffffffffecb) r9 = request_key(&(0x7f0000000740)='encrypted\x00', &(0x7f0000000b00)={'syz', 0x2}, &(0x7f0000000b40)='./cgroup\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000680)='asymmetric\x00', &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, r9) request_key(&(0x7f00000004c0)='pkcs7_test\x00', &(0x7f0000000500)={'syz', 0x1}, &(0x7f0000000540)='wlan0\x00', 0x0) 08:17:45 executing program 5: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x305, &(0x7f0000000000)=ANY=[]}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, 0x0, 0x0, 0x400000000100) 08:17:45 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1000000000000304, 0x400000000100) [ 576.661401][T12103] BPF:[2] ARRAY (anon) [ 576.675736][T12103] BPF:type_id=5 index_type_id=1 nr_elems=63 [ 576.704608][T12103] BPF: [ 576.707430][T12103] BPF:Invalid index [ 576.790720][T12103] BPF: [ 576.790720][T12103] 08:17:45 executing program 4: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [{}], {}, [], {0x10, 0x2}}, 0x2c, 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(0x0, r3, 0x0) chdir(&(0x7f0000000100)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') 08:17:45 executing program 0: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000500)=ANY=[@ANYBLOB="02000000010000000000000002000000", @ANYRES32=0x0, @ANYBLOB="040000000000000010000220000040002000000000cfce58b6074587689699ebae2bffc568848180c2ea52539e95655d3aad0f71cfd530bcfce11dacc2f5d18fe4324f8fee10899998fae7b5cf31947052d5601c83cba7beb153bfd543cc2eafff74273851062762b360b8ae2eba85581d694b429eaac0e4fdc8ec0c580019e5b95322c59d5a9d38f3f299ab73d893e68a5accd8672c5933f8d0f1a89b0bf51b1d56b017686cec0ac88fa653f34860da672e6b7c1c07e8bdf36da9884dd7b8cc391c248e921d2f611f72242301c68b765b5f40d999d95486"], 0x2c, 0x0) openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000180)='/dev/video37\x00', 0x2, 0x0) r0 = dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000180)='lp\x00', 0x3) ioctl$VIDIOC_TRY_FMT(r0, 0xc0d05640, &(0x7f0000000400)={0xa, @raw_data="d456e651514154be56c23a0150374fec800b3363d0f8209aea95ae10a4bfe2bc4a059b555ffe32ee49657c21fdaeec9ff08b45f3c5b652502dd578edc616a43da8fa7411c10cf0be3062500d3923e6f93300ce6e6ca32a13179605ca95c9250023e974040392fcffaac49faad6d6549cb1f2e1c7492ba9a8e2d26787e1872027fbe8577edbc559354f305d4e05c26a2f708bb008ca01368edece7ac1108379664aea7622db8fe0f786d6a4177494b3766d3f6f8e4c69729d1cdef558344c8bab4dfc9bfc6bc56bfa"}) ioctl$VIDIOC_QBUF(r0, 0xc058560f, &(0x7f0000000240)={0x9, 0xc, 0x4, 0x100000, 0x0, {0x77359400}, {0x4, 0xc, 0x6, 0x2, 0x8, 0x48, "67b982a9"}, 0x6, 0x2, @planes=&(0x7f0000000200)={0xfffffff7, 0x1ff, @fd, 0x6}, 0x54, 0x0, 0xffffffffffffffff}) ioctl$sock_inet_udp_SIOCINQ(r1, 0x541b, &(0x7f00000002c0)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket(0x10, 0x2, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000340)={0x6, 0x0, 0x0, r0}) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r5, 0x0) chdir(&(0x7f0000000100)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') 08:17:45 executing program 3: sendmsg(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1000000000000304, 0x400000000100) 08:17:45 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x16, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffff1971a4f0ff00000000b7060000000000811e6403000000000045040400010000001704000001000a00b7040000000100006a0af2fe00000000850000001a000000b70000000000000095000000000000009e17890efaee5eab7ff8a8cdc21ce784909b849d5550ad855dab54d8877a6db61d69f2ffcaa10350e11cb97c8adf1bc9a0c4ee6d9674c77404ceb9971e43405d621ffbc9a4fd39b0b56bfe6508ebb3c44eb84049761451ce540c772e2d9f8004e26f7fcc059c062234d5595f6fba87b81d1106fb0289ce67a66afd9ac3d09e29a9d542ca9d85a5c9c88474895d679838def0a83a733dc6a39b63a5ed69d32394c53361d7480884bd8048a967d9b912ef9f1d6fee41f5b29d37acb91c61ccd1df673896450f859ce8122a79c3e4"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000340)}, 0x42) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0xffffffffa0008000, 0xffffffffffffff3e, 0x0, &(0x7f0000000040)="a34747e865af5cf11e34bdff7a7a5ba0051aae5804d5a05d9b9ff68e12bb4d43a20375ea905795449b957e956aa6", 0x0, 0x401, 0x0, 0x0, 0xfffffffffffffff3}, 0x28) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f0000000240)={0x1ff, 0xc, 0x4, 0x0, 0x27e5, {}, {0x4, 0x8, 0x4, 0x8, 0x7, 0x6, "96669900"}, 0x7, 0x0, @fd=r0, 0x9, 0x0, r2}) r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@struct={0x0, 0x0, 0x0, 0x4, 0x0, 0x9}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x1, 0x3f}}]}}, &(0x7f0000000080)=""/236, 0x3e, 0xec, 0x8}, 0x20) ioctl$EVIOCGLED(r3, 0x80404519, &(0x7f0000000580)=""/250) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) dup(0xffffffffffffffff) r5 = dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_CONGESTION(r5, 0x6, 0xd, 0x0, 0x0) ioctl$VIDIOC_TRY_FMT(r5, 0xc0d05640, &(0x7f0000000400)={0xa, @raw_data="d456e651514154be56c23a0150374fec800b3363d0f8209aea95ae10a4bfe2bc4a059b555ffe32ee49657c21fdaeec9ff08b45f3c5b652502dd578edc616a43da8fa7411c10cf0be3062500d3923e6f93300ce6e6ca32a13179605ca95c9250023e974040392fcffaac49faad6d6549cb1f2e1c7492ba9a8e2d26787e1872027fbe8577edbc559354f305d4e05c26a2f708bb008ca01368edece7ac1108379664aea7622db8fe0f786d6a4177494b3766d3f6f8e4c69729d1cdef558344c8bab4dfc9bfc6bc56bfa"}) ioctl$BLKTRACESTART(r5, 0x1274, 0x0) 08:17:45 executing program 1: r0 = socket$inet(0x2, 0x3, 0x2) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000240)='/dev/md0\x00', 0x0, 0x0) ioctl$void(r0, 0x5451) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) mkdir(&(0x7f00000005c0)='./file0\x00', 0x100000000020) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x7f, 0x4, 0x0, 0x0, 0x9, 0xfc, 0x0, 0x9d7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0x7) lstat(&(0x7f00000002c0)='./file1\x00', &(0x7f0000000340)) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x591800, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/nullb0\x00', 0x82080, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, 0x0) r4 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000180)=ANY=[], &(0x7f0000000140)) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}}, 0x98) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000040)={0x0, 0x3a8e}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f0000000600)={r5, 0x6, 0x140a09e5, 0x3, 0x9961, 0x3}, &(0x7f0000000540)=0x14) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r3, 0x84, 0x19, &(0x7f0000000580)={r6, 0x100}, 0xffffffffffffffe9) ioctl$DRM_IOCTL_GET_SAREA_CTX(r3, 0xc010641d, &(0x7f0000000300)={0x0, &(0x7f0000000480)=""/112}) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm-monitor\x00', 0x200000, 0x0) r7 = dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_CONGESTION(r7, 0x6, 0xd, &(0x7f0000000180)='lp\x00', 0x3) ioctl$VIDIOC_TRY_FMT(r7, 0xc0d05640, &(0x7f0000000400)={0xa, @raw_data="d456e651514154be56c23a0150374fec800b3363d0f8209aea95ae10a4bfe2bc4a059b555ffe32ee49657c21fdaeec9ff08b45f3c5b652502dd578edc616a43da8fa7411c10cf0be3062500d3923e6f93300ce6e6ca32a13179605ca95c9250023e974040392fcffaac49faad6d6549cb1f2e1c7492ba9a8e2d26787e1872027fbe8577edbc559354f305d4e05c26a2f708bb008ca01368edece7ac1108379664aea7622db8fe0f786d6a4177494b3766d3f6f8e4c69729d1cdef558344c8bab4dfc9bfc6bc56bfa"}) ioctl$GIO_UNIMAP(r7, 0x4b66, &(0x7f0000000840)={0x2, &(0x7f0000000280)=[{}, {}]}) clock_gettime(0x0, &(0x7f0000000a40)={0x0, 0x0}) select(0x40, &(0x7f0000000200)={0x4, 0x7, 0x3ff, 0x3, 0xffffffffffffffe1, 0x6, 0x4b4, 0x80000001}, &(0x7f00000009c0)={0x4ebe, 0x5, 0x1, 0x7, 0x1, 0x8, 0x7, 0x100}, &(0x7f0000000a00)={0x0, 0xffffffff, 0x80000001, 0x1f, 0xfffffffffffffffd, 0x1, 0x8, 0x8000}, &(0x7f0000000a80)={r8, r9/1000+10000}) ioprio_set$pid(0x7, 0x0, 0x9) ioctl$BLKPG(r1, 0x932, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0x7fff) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r10 = request_key(&(0x7f0000000740)='encrypted\x00', &(0x7f0000000b00)={'syz', 0x2}, &(0x7f0000000b40)='./cgroup\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000680)='asymmetric\x00', &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, r10) request_key(&(0x7f00000004c0)='pkcs7_test\x00', &(0x7f0000000500)={'syz', 0x1}, &(0x7f0000000540)='wlan0\x00', 0x0) 08:17:45 executing program 5: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x305, &(0x7f0000000000)=ANY=[]}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1000000000000304, 0x0) 08:17:45 executing program 4: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [{}], {}, [], {0x10, 0x2}}, 0x2c, 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) chdir(&(0x7f0000000100)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') 08:17:45 executing program 3: sendmsg(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1000000000000304, 0x400000000100) [ 577.105053][T12231] BPF:[2] ARRAY (anon) [ 577.115134][T12231] BPF:type_id=5 index_type_id=1 nr_elems=63 [ 577.158436][T12231] BPF: [ 577.161533][T12231] BPF:Invalid index [ 577.202249][T12231] BPF: [ 577.202249][T12231] 08:17:45 executing program 0: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)=ANY=[@ANYBLOB="02000000010000000000000002000000", @ANYRES32=0x0, @ANYBLOB="0400000000583629e700020000000000200000e900000000"], 0x2c, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r3, 0x0) chdir(&(0x7f0000000100)='./file0\x00') open(&(0x7f0000000000)='./file0\x00', 0x440, 0x150) symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') 08:17:46 executing program 1: r0 = socket$inet(0x2, 0x3, 0x2) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000240)='/dev/md0\x00', 0x0, 0x0) ioctl$void(r0, 0x5451) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) mkdir(&(0x7f00000005c0)='./file0\x00', 0x100000000020) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x7f, 0x4, 0x0, 0x0, 0x9, 0xfc, 0x0, 0x9d7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0x7) lstat(&(0x7f00000002c0)='./file1\x00', &(0x7f0000000340)) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x591800, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/nullb0\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, 0x0) r4 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000180)=ANY=[], &(0x7f0000000140)) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}}, 0x98) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000040)={0x0, 0x3a8e}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f0000000600)={r5, 0x6, 0x140a09e5, 0x3, 0x9961, 0x3}, &(0x7f0000000540)=0x14) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r3, 0x84, 0x19, &(0x7f0000000580)={r6, 0x100}, 0xffffffffffffffe9) ioctl$DRM_IOCTL_GET_SAREA_CTX(r3, 0xc010641d, &(0x7f0000000300)={0x0, &(0x7f0000000480)=""/112}) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm-monitor\x00', 0x200000, 0x0) r7 = dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_CONGESTION(r7, 0x6, 0xd, &(0x7f0000000180)='lp\x00', 0x3) ioctl$VIDIOC_TRY_FMT(r7, 0xc0d05640, &(0x7f0000000400)={0xa, @raw_data="d456e651514154be56c23a0150374fec800b3363d0f8209aea95ae10a4bfe2bc4a059b555ffe32ee49657c21fdaeec9ff08b45f3c5b652502dd578edc616a43da8fa7411c10cf0be3062500d3923e6f93300ce6e6ca32a13179605ca95c9250023e974040392fcffaac49faad6d6549cb1f2e1c7492ba9a8e2d26787e1872027fbe8577edbc559354f305d4e05c26a2f708bb008ca01368edece7ac1108379664aea7622db8fe0f786d6a4177494b3766d3f6f8e4c69729d1cdef558344c8bab4dfc9bfc6bc56bfa"}) ioctl$GIO_UNIMAP(r7, 0x4b66, &(0x7f0000000840)={0x2, &(0x7f0000000280)=[{}, {}]}) clock_gettime(0x0, &(0x7f0000000a40)={0x0, 0x0}) select(0x40, &(0x7f0000000200)={0x4, 0x7, 0x3ff, 0x3, 0xffffffffffffffe1, 0x6, 0x4b4, 0x80000001}, &(0x7f00000009c0)={0x4ebe, 0x5, 0x1, 0x7, 0x1, 0x8, 0x7, 0x100}, &(0x7f0000000a00)={0x0, 0xffffffff, 0x80000001, 0x1f, 0xfffffffffffffffd, 0x1, 0x8, 0x8000}, &(0x7f0000000a80)={r8, r9/1000+10000}) ioctl$BLKPG(r1, 0x932, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0x7fff) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r10 = request_key(&(0x7f0000000740)='encrypted\x00', &(0x7f0000000b00)={'syz', 0x2}, &(0x7f0000000b40)='./cgroup\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000680)='asymmetric\x00', &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, r10) request_key(&(0x7f00000004c0)='pkcs7_test\x00', &(0x7f0000000500)={'syz', 0x1}, &(0x7f0000000540)='wlan0\x00', 0x0) 08:17:46 executing program 3: sendmsg(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1000000000000304, 0x400000000100) 08:17:46 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x16, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000340)}, 0x42) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0xffffffffa0008000, 0xffffffffffffff3e, 0x0, &(0x7f0000000040)="a34747e865af5cf11e34bdff7a7a5ba0051aae5804d5a05d9b9ff68e12bb4d43a20375ea905795449b957e956aa6", 0x0, 0x401, 0x0, 0x0, 0xfffffffffffffff3}, 0x28) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f0000000240)={0x1ff, 0xc, 0x4, 0x0, 0x27e5, {}, {0x4, 0x8, 0x4, 0x8, 0x7, 0x6, "96669900"}, 0x7, 0x0, @fd=r0, 0x9, 0x0, r2}) r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@struct={0x0, 0x0, 0x0, 0x4, 0x0, 0x9}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x1, 0x3f}}]}}, &(0x7f0000000080)=""/236, 0x3e, 0xec, 0x8}, 0x20) ioctl$EVIOCGLED(r3, 0x80404519, &(0x7f0000000580)=""/250) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) dup(0xffffffffffffffff) r5 = dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_CONGESTION(r5, 0x6, 0xd, &(0x7f0000000180)='lp\x00', 0x3) ioctl$VIDIOC_TRY_FMT(0xffffffffffffffff, 0xc0d05640, &(0x7f0000000400)={0xa, @raw_data="d456e651514154be56c23a0150374fec800b3363d0f8209aea95ae10a4bfe2bc4a059b555ffe32ee49657c21fdaeec9ff08b45f3c5b652502dd578edc616a43da8fa7411c10cf0be3062500d3923e6f93300ce6e6ca32a13179605ca95c9250023e974040392fcffaac49faad6d6549cb1f2e1c7492ba9a8e2d26787e1872027fbe8577edbc559354f305d4e05c26a2f708bb008ca01368edece7ac1108379664aea7622db8fe0f786d6a4177494b3766d3f6f8e4c69729d1cdef558344c8bab4dfc9bfc6bc56bfa"}) ioctl$BLKTRACESTART(r5, 0x1274, 0x0) 08:17:46 executing program 4: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [{}], {}, [], {0x10, 0x2}}, 0x2c, 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) chdir(&(0x7f0000000100)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') [ 577.563182][T12349] BPF:[2] ARRAY (anon) 08:17:46 executing program 5: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x305, &(0x7f0000000000)=ANY=[]}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1000000000000304, 0x0) [ 577.603432][T12349] BPF:type_id=5 index_type_id=1 nr_elems=63 [ 577.642382][T12349] BPF: 08:17:46 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1000000000000304, 0x400000000100) [ 577.658633][T12349] BPF:Invalid index 08:17:46 executing program 0: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [{}], {}, [], {0x10, 0x2}}, 0x2c, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000180)='lp\x00', 0x3) ioctl$VIDIOC_TRY_FMT(r2, 0xc0d05640, &(0x7f0000000400)={0xa, @raw_data="d456e651514154be56c23a0150374fec800b3363d0f8209aea95ae10a4bfe2bc4a059b555ffe32ee49657c21fdaeec9ff08b45f3c5b652502dd578edc616a43da8fa7411c10cf0be3062500d3923e6f93300ce6e6ca32a13179605ca95c9250023e974040392fcffaac49faad6d6549cb1f2e1c7492ba9a8e2d26787e1872027fbe8577edbc559354f305d4e05c26a2f708bb008ca01368edece7ac1108379664aea7622db8fe0f786d6a4177494b3766d3f6f8e4c69729d1cdef558344c8bab4dfc9bfc6bc56bfa"}) ioctl$DRM_IOCTL_ADD_MAP(r2, 0xc0286415, &(0x7f0000000000)={0x0, 0x3c31, 0x0, 0x2, &(0x7f0000ffb000/0x3000)=nil, 0xffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r4, 0x0) chdir(&(0x7f0000000100)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') [ 577.685091][T12349] BPF: [ 577.685091][T12349] 08:17:46 executing program 4: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [{}], {}, [], {0x10, 0x2}}, 0x2c, 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) chdir(&(0x7f0000000100)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') 08:17:46 executing program 1: r0 = socket$inet(0x2, 0x3, 0x2) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000240)='/dev/md0\x00', 0x0, 0x0) ioctl$void(r0, 0x5451) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) mkdir(&(0x7f00000005c0)='./file0\x00', 0x100000000020) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x7f, 0x4, 0x0, 0x0, 0x9, 0xfc, 0x0, 0x9d7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0x2) lstat(&(0x7f00000002c0)='./file1\x00', &(0x7f0000000340)) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x591800, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/nullb0\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, 0x0) r4 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000180)=ANY=[], &(0x7f0000000140)) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}}, 0x98) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000040)={0x0, 0x3a8e}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f0000000600)={r5, 0x6, 0x140a09e5, 0x3, 0x9961, 0x3}, &(0x7f0000000540)=0x14) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r3, 0x84, 0x19, &(0x7f0000000580)={r6, 0x100}, 0xffffffffffffffe9) ioctl$DRM_IOCTL_GET_SAREA_CTX(r3, 0xc010641d, &(0x7f0000000300)={0x0, &(0x7f0000000480)=""/112}) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm-monitor\x00', 0x200000, 0x0) r7 = dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_CONGESTION(r7, 0x6, 0xd, &(0x7f0000000180)='lp\x00', 0x3) ioctl$VIDIOC_TRY_FMT(r7, 0xc0d05640, &(0x7f0000000400)={0xa, @raw_data="d456e651514154be56c23a0150374fec800b3363d0f8209aea95ae10a4bfe2bc4a059b555ffe32ee49657c21fdaeec9ff08b45f3c5b652502dd578edc616a43da8fa7411c10cf0be3062500d3923e6f93300ce6e6ca32a13179605ca95c9250023e974040392fcffaac49faad6d6549cb1f2e1c7492ba9a8e2d26787e1872027fbe8577edbc559354f305d4e05c26a2f708bb008ca01368edece7ac1108379664aea7622db8fe0f786d6a4177494b3766d3f6f8e4c69729d1cdef558344c8bab4dfc9bfc6bc56bfa"}) ioctl$GIO_UNIMAP(r7, 0x4b66, &(0x7f0000000840)={0x2, &(0x7f0000000280)=[{}, {}]}) clock_gettime(0x0, &(0x7f0000000a40)={0x0, 0x0}) select(0x40, &(0x7f0000000200)={0x4, 0x7, 0x3ff, 0x3, 0xffffffffffffffe1, 0x6, 0x4b4, 0x80000001}, &(0x7f00000009c0)={0x4ebe, 0x5, 0x1, 0x7, 0x1, 0x8, 0x7, 0x100}, &(0x7f0000000a00)={0x0, 0xffffffff, 0x80000001, 0x1f, 0xfffffffffffffffd, 0x1, 0x8, 0x8000}, &(0x7f0000000a80)={r8, r9/1000+10000}) ioprio_set$pid(0x7, 0x0, 0x9) ioctl$BLKPG(r1, 0x932, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0x7fff) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r10 = request_key(&(0x7f0000000740)='encrypted\x00', &(0x7f0000000b00)={'syz', 0x2}, &(0x7f00000003c0)='./cgroup\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000680)='asymmetric\x00', &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, r10) request_key(&(0x7f00000004c0)='pkcs7_test\x00', &(0x7f0000000500)={'syz', 0x1}, &(0x7f0000000540)='wlan0\x00', 0x0) 08:17:46 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1000000000000304, 0x400000000100) 08:17:46 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x16, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000340)}, 0x42) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0xffffffffa0008000, 0xffffffffffffff3e, 0x0, &(0x7f0000000040)="a34747e865af5cf11e34bdff7a7a5ba0051aae5804d5a05d9b9ff68e12bb4d43a20375ea905795449b957e956aa6", 0x0, 0x401, 0x0, 0x0, 0xfffffffffffffff3}, 0x28) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f0000000240)={0x1ff, 0xc, 0x4, 0x0, 0x27e5, {}, {0x4, 0x8, 0x4, 0x8, 0x7, 0x6, "96669900"}, 0x7, 0x0, @fd=r0, 0x9, 0x0, r2}) r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@struct={0x0, 0x0, 0x0, 0x4, 0x0, 0x9}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x1, 0x3f}}]}}, &(0x7f0000000080)=""/236, 0x3e, 0xec, 0x8}, 0x20) ioctl$EVIOCGLED(r3, 0x80404519, &(0x7f0000000580)=""/250) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) dup(0xffffffffffffffff) r5 = dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_CONGESTION(r5, 0x6, 0xd, &(0x7f0000000180)='lp\x00', 0x3) ioctl$VIDIOC_TRY_FMT(0xffffffffffffffff, 0xc0d05640, &(0x7f0000000400)={0xa, @raw_data="d456e651514154be56c23a0150374fec800b3363d0f8209aea95ae10a4bfe2bc4a059b555ffe32ee49657c21fdaeec9ff08b45f3c5b652502dd578edc616a43da8fa7411c10cf0be3062500d3923e6f93300ce6e6ca32a13179605ca95c9250023e974040392fcffaac49faad6d6549cb1f2e1c7492ba9a8e2d26787e1872027fbe8577edbc559354f305d4e05c26a2f708bb008ca01368edece7ac1108379664aea7622db8fe0f786d6a4177494b3766d3f6f8e4c69729d1cdef558344c8bab4dfc9bfc6bc56bfa"}) ioctl$BLKTRACESTART(r5, 0x1274, 0x0) 08:17:46 executing program 0: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [{}], {}, [], {0x10, 0x2}}, 0x2c, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r3, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000000)=@abs={0x1, 0x0, 0x4e23}, 0x6e) chdir(&(0x7f0000000100)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') 08:17:46 executing program 4: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [{}], {}, [], {0x10, 0x2}}, 0x2c, 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r3, 0x0) chdir(0x0) symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') 08:17:46 executing program 5: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x305, &(0x7f0000000000)=ANY=[]}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1000000000000304, 0x0) 08:17:46 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1000000000000304, 0x400000000100) [ 578.204665][T12480] BPF:[2] ARRAY (anon) [ 578.209332][T12480] BPF:type_id=5 index_type_id=1 nr_elems=63 08:17:46 executing program 1: r0 = socket$inet(0x2, 0x3, 0x2) openat$md(0xffffffffffffff9c, &(0x7f0000000240)='/dev/md0\x00', 0x2e8482, 0x0) ioctl$void(r0, 0x5451) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) mkdir(&(0x7f00000005c0)='./file0\x00', 0x100000000020) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x7f, 0x4, 0x0, 0x0, 0x9, 0xfc, 0x0, 0x9d7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x7) lstat(&(0x7f00000002c0)='./file1\x00', &(0x7f0000000340)) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x591800, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/nullb0\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, 0x0) r3 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000180)=ANY=[], &(0x7f0000000140)) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}}, 0x98) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x400300, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r6 = socket(0xa, 0x1, 0x0) r7 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r7, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r6, 0x84, 0x11, &(0x7f0000000100)={r8}, 0x8) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r5, 0x84, 0x1a, &(0x7f00000003c0)={r8, 0x71, "158d51f15796e30e1203177854643711e3d664b62aea7f5313d13edd096b460de2e3591fc8f44f08ff469d4dbb58a69f97ffd3b50ed27909cfd929776fa2037e2e094640d5236705308e4ba53145d37ddc3197f960f3e4ee77be391bdd8ba354416b7ae5c69c0f73aff293c467230c4bf8"}, &(0x7f0000000200)=0x79) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r4, 0x84, 0x66, &(0x7f0000000040)={r9, 0x5}, &(0x7f0000000440)=0x8) getsockopt$inet_sctp_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f0000000600)={r10, 0x6, 0x140a09e5, 0x3, 0x9961, 0x3}, &(0x7f0000000540)=0x14) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r2, 0x84, 0x19, &(0x7f0000000580)={r11, 0x100}, 0xffffffffffffffe9) ioctl$DRM_IOCTL_GET_SAREA_CTX(r2, 0xc010641d, &(0x7f0000000300)={0x0, &(0x7f0000000480)=""/112}) r12 = memfd_create(&(0x7f0000000280)='#em1#+\x00', 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x0, 0x12, r12, 0x0) r13 = userfaultfd(0x0) ioctl$UFFDIO_API(r13, 0xc018aa3f, &(0x7f0000e53fe8)) ioctl$UFFDIO_REGISTER(r13, 0xc020aa00, &(0x7f0000007fe0)={{&(0x7f0000000000/0x4000)=nil, 0x4000}, 0x1}) 08:17:46 executing program 0: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0, 0x0}, &(0x7f0000000280)=0x5) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0, 0x0}, &(0x7f0000000280)=0xc) r4 = getgid() setresgid(0x0, r4, 0x0) getgroups(0x3, &(0x7f00000002c0)=[r4, r2, 0xee00]) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000340)={{}, {}, [], {0x4, 0x4}, [{0x8, 0x0, 0xffffffffffffffff}, {0x8, 0x0, r0}, {0x8, 0x4, r3}, {0x8, 0x0, r5}], {0x10, 0x2}}, 0x44, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r9, 0x0) chdir(&(0x7f0000000100)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') [ 578.280152][T12480] BPF: [ 578.294835][T12480] BPF:Invalid index [ 578.314745][T12480] BPF: [ 578.314745][T12480] 08:17:46 executing program 4: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [{}], {}, [], {0x10, 0x2}}, 0x2c, 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r3, 0x0) chdir(0x0) symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') 08:17:47 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x305, &(0x7f0000000000)=ANY=[]}, 0x0) r0 = syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1000000000000304, 0x400000000100) 08:17:47 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x16, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000340)}, 0x42) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0xffffffffa0008000, 0xffffffffffffff3e, 0x0, &(0x7f0000000040)="a34747e865af5cf11e34bdff7a7a5ba0051aae5804d5a05d9b9ff68e12bb4d43a20375ea905795449b957e956aa6", 0x0, 0x401, 0x0, 0x0, 0xfffffffffffffff3}, 0x28) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f0000000240)={0x1ff, 0xc, 0x4, 0x0, 0x27e5, {}, {0x4, 0x8, 0x4, 0x8, 0x7, 0x6, "96669900"}, 0x7, 0x0, @fd=r0, 0x9, 0x0, r2}) r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@struct={0x0, 0x0, 0x0, 0x4, 0x0, 0x9}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x1, 0x3f}}]}}, &(0x7f0000000080)=""/236, 0x3e, 0xec, 0x8}, 0x20) ioctl$EVIOCGLED(r3, 0x80404519, &(0x7f0000000580)=""/250) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) dup(0xffffffffffffffff) r5 = dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_CONGESTION(r5, 0x6, 0xd, &(0x7f0000000180)='lp\x00', 0x3) ioctl$VIDIOC_TRY_FMT(0xffffffffffffffff, 0xc0d05640, &(0x7f0000000400)={0xa, @raw_data="d456e651514154be56c23a0150374fec800b3363d0f8209aea95ae10a4bfe2bc4a059b555ffe32ee49657c21fdaeec9ff08b45f3c5b652502dd578edc616a43da8fa7411c10cf0be3062500d3923e6f93300ce6e6ca32a13179605ca95c9250023e974040392fcffaac49faad6d6549cb1f2e1c7492ba9a8e2d26787e1872027fbe8577edbc559354f305d4e05c26a2f708bb008ca01368edece7ac1108379664aea7622db8fe0f786d6a4177494b3766d3f6f8e4c69729d1cdef558344c8bab4dfc9bfc6bc56bfa"}) ioctl$BLKTRACESTART(r5, 0x1274, 0x0) 08:17:47 executing program 4: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [{}], {}, [], {0x10, 0x2}}, 0x2c, 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r3, 0x0) chdir(0x0) symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') 08:17:47 executing program 5: r0 = socket$inet(0x2, 0x3, 0x2) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000240)='/dev/md0\x00', 0x0, 0x0) ioctl$void(r0, 0x5451) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) mkdir(&(0x7f00000005c0)='./file0\x00', 0x100000000020) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x7f, 0x4, 0x0, 0x0, 0x9, 0xfc, 0x0, 0x9d7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0x7) lstat(&(0x7f00000002c0)='./file1\x00', &(0x7f0000000340)) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x591800, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/nullb0\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, 0x0) r4 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000180)=ANY=[], &(0x7f0000000140)) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}}, 0x98) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000040)={0x0, 0x3a8e}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f0000000600)={r5, 0x6, 0x140a09e5, 0x3, 0x9961, 0x3}, &(0x7f0000000540)=0x14) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r3, 0x84, 0x19, &(0x7f0000000580)={r6, 0x100}, 0xffffffffffffffe9) ioctl$DRM_IOCTL_GET_SAREA_CTX(r3, 0xc010641d, &(0x7f0000000300)={0x0, &(0x7f0000000480)=""/112}) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm-monitor\x00', 0x200000, 0x0) r7 = dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_CONGESTION(r7, 0x6, 0xd, &(0x7f0000000180)='lp\x00', 0x3) ioctl$VIDIOC_TRY_FMT(r7, 0xc0d05640, &(0x7f0000000400)={0xa, @raw_data="d456e651514154be56c23a0150374fec800b3363d0f8209aea95ae10a4bfe2bc4a059b555ffe32ee49657c21fdaeec9ff08b45f3c5b652502dd578edc616a43da8fa7411c10cf0be3062500d3923e6f93300ce6e6ca32a13179605ca95c9250023e974040392fcffaac49faad6d6549cb1f2e1c7492ba9a8e2d26787e1872027fbe8577edbc559354f305d4e05c26a2f708bb008ca01368edece7ac1108379664aea7622db8fe0f786d6a4177494b3766d3f6f8e4c69729d1cdef558344c8bab4dfc9bfc6bc56bfa"}) ioctl$GIO_UNIMAP(r7, 0x4b66, &(0x7f0000000840)={0x2, &(0x7f0000000280)=[{}, {}]}) clock_gettime(0x0, &(0x7f0000000a40)) select(0x40, &(0x7f0000000200)={0x4, 0x7, 0x3ff, 0x3, 0xffffffffffffffe1, 0x6, 0x4b0, 0x80000001}, &(0x7f00000009c0)={0x4ebe, 0x5, 0x10005, 0x7, 0x1, 0x8, 0x7, 0x104}, &(0x7f0000000a00)={0x0, 0xffffdfff, 0x80000001, 0x1f, 0xfffffffffffffffd, 0x1, 0x8, 0x8000}, &(0x7f0000000a80)) ioprio_set$pid(0x7, 0x0, 0x9) ioctl$BLKPG(r1, 0x932, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0x7fff) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r8 = request_key(&(0x7f0000000740)='encrypted\x00', &(0x7f0000000b00)={'syz', 0x2}, &(0x7f0000000b40)='./cgroup\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000680)='asymmetric\x00', &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, r8) request_key(&(0x7f00000004c0)='pkcs7_test\x00', &(0x7f0000000500)={'syz', 0x1}, &(0x7f0000000540)='wlan0\x00', 0x0) 08:17:47 executing program 0: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [{}], {}, [], {0x10, 0x2}}, 0x2c, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r4, 0x0) chdir(&(0x7f0000000100)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') mount$9p_fd(0x0, &(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000040)='9p\x00', 0x2000000, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@uname={'uname', 0x3d, '\''}}, {@posixacl='posixacl'}], [{@mask={'mask', 0x3d, 'MAY_WRITE'}}, {@euid_lt={'euid<', 0xee00}}]}}) 08:17:47 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x305, &(0x7f0000000000)=ANY=[]}, 0x0) r0 = syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1000000000000304, 0x400000000100) 08:17:47 executing program 1: r0 = socket$inet(0x2, 0x3, 0x2) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000240)='/dev/md0\x00', 0x10800, 0x0) ioctl$void(r0, 0x5451) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) mkdir(&(0x7f00000005c0)='./file0\x00', 0x100000000020) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x7f, 0x4, 0x0, 0x0, 0x9, 0xfc, 0x0, 0x9d7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0x7) lstat(&(0x7f00000002c0)='./file1\x00', &(0x7f0000000340)) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x591800, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/nullb0\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, 0x0) r4 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000180)=ANY=[], &(0x7f0000000140)) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}}, 0x98) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000040)={0x0, 0x3a8e}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f0000000600)={r5, 0x6, 0x140a09e5, 0x3, 0x9961, 0x3}, &(0x7f0000000540)=0x14) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r3, 0x84, 0x19, &(0x7f0000000580)={r6, 0x100}, 0xffffffffffffffe9) ioctl$DRM_IOCTL_GET_SAREA_CTX(r3, 0xc010641d, &(0x7f0000000300)={0x0, &(0x7f0000000480)=""/112}) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm-monitor\x00', 0x200000, 0x0) r7 = dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_CONGESTION(r7, 0x6, 0xd, &(0x7f0000000180)='lp\x00', 0x3) ioctl$VIDIOC_TRY_FMT(r7, 0xc0d05640, &(0x7f0000000400)={0xa, @raw_data="d456e651514154be56c23a0150374fec800b3363d0f8209aea95ae10a4bfe2bc4a059b555ffe32ee49657c21fdaeec9ff08b45f3c5b652502dd578edc616a43da8fa7411c10cf0be3062500d3923e6f93300ce6e6ca32a13179605ca95c9250023e974040392fcffaac49faad6d6549cb1f2e1c7492ba9a8e2d26787e1872027fbe8577edbc559354f305d4e05c26a2f708bb008ca01368edece7ac1108379664aea7622db8fe0f786d6a4177494b3766d3f6f8e4c69729d1cdef558344c8bab4dfc9bfc6bc56bfa"}) ioctl$GIO_UNIMAP(r7, 0x4b66, &(0x7f0000000840)={0x2, &(0x7f0000000280)=[{}, {}]}) clock_gettime(0x0, &(0x7f0000000a40)={0x0, 0x0}) select(0x40, &(0x7f0000000200)={0x4, 0x7, 0x3ff, 0x3, 0xffffffffffffffe1, 0x6, 0x4b4, 0x80000001}, &(0x7f00000009c0)={0x4ebe, 0x5, 0x1, 0x7, 0x1, 0x8, 0x7, 0x100}, &(0x7f0000000a00)={0x0, 0xffffffff, 0x80000001, 0x1f, 0xfffffffffffffffd, 0x1, 0x8, 0x8000}, &(0x7f0000000a80)={r8, r9/1000+10000}) ioprio_set$pid(0x7, 0x0, 0x9) ioctl$BLKPG(r1, 0x932, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0x7fff) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r10 = request_key(&(0x7f0000000740)='encrypted\x00', &(0x7f0000000b00)={'syz', 0x2}, &(0x7f0000000b40)='./cgroup\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000680)='asymmetric\x00', &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, r10) request_key(&(0x7f00000004c0)='pkcs7_test\x00', &(0x7f0000000500)={'syz', 0x1}, &(0x7f0000000540)='wlan0\x00', 0x0) [ 578.744608][T12611] BPF:[2] ARRAY (anon) [ 578.758084][T12611] BPF:type_id=5 index_type_id=1 nr_elems=63 [ 578.781220][T12611] BPF: [ 578.820551][T12611] BPF:Invalid index [ 578.848628][T12611] BPF: [ 578.848628][T12611] 08:17:47 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x305, &(0x7f0000000000)=ANY=[]}, 0x0) r0 = syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1000000000000304, 0x400000000100) 08:17:47 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x16, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000340)}, 0x42) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0xffffffffa0008000, 0xffffffffffffff3e, 0x0, &(0x7f0000000040)="a34747e865af5cf11e34bdff7a7a5ba0051aae5804d5a05d9b9ff68e12bb4d43a20375ea905795449b957e956aa6", 0x0, 0x401, 0x0, 0x0, 0xfffffffffffffff3}, 0x28) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f0000000240)={0x1ff, 0xc, 0x4, 0x0, 0x27e5, {}, {0x4, 0x8, 0x4, 0x8, 0x7, 0x6, "96669900"}, 0x7, 0x0, @fd=r0, 0x9, 0x0, r2}) r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@struct={0x0, 0x0, 0x0, 0x4, 0x0, 0x9}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x1, 0x3f}}]}}, &(0x7f0000000080)=""/236, 0x3e, 0xec, 0x8}, 0x20) ioctl$EVIOCGLED(r3, 0x80404519, &(0x7f0000000580)=""/250) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) dup(0xffffffffffffffff) r5 = dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_CONGESTION(r5, 0x6, 0xd, &(0x7f0000000180)='lp\x00', 0x3) ioctl$VIDIOC_TRY_FMT(r5, 0xc0d05640, 0x0) ioctl$BLKTRACESTART(r5, 0x1274, 0x0) 08:17:47 executing program 4: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [{}], {}, [], {0x10, 0x2}}, 0x2c, 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r3, 0x0) chdir(&(0x7f0000000100)='./file0\x00') symlink(0x0, &(0x7f00000007c0)='./file0\x00') 08:17:47 executing program 0: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)=ANY=[@ANYBLOB="0200001f710000000000000002000000", @ANYRES32=0x0, @ANYBLOB="040000000000000010000200000000002000000000000000"], 0x2c, 0x0) prctl$PR_CAPBSET_READ(0x17, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r3, 0x0) chdir(&(0x7f0000000100)='./file0\x00') getsockopt$SO_J1939_PROMISC(r2, 0x6b, 0x2, &(0x7f0000000000), &(0x7f0000000040)=0x4) symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') 08:17:47 executing program 1: r0 = socket$inet(0x2, 0x3, 0x2) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000240)='/dev/md0\x00', 0x0, 0x0) ioctl$void(r0, 0x5451) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) mkdir(&(0x7f00000005c0)='./file0\x00', 0x100000000020) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x7f, 0x4, 0x0, 0x0, 0x9, 0xfc, 0x0, 0x9d7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0x7) lstat(&(0x7f00000002c0)='./file1\x00', &(0x7f0000000340)) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x591800, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/nullb0\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, 0x0) r4 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000180)=ANY=[], &(0x7f0000000140)) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xffffffff}, 0x9c) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000040)={0x0, 0x3a8e}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f0000000600)={r5, 0x6, 0x140a09e5, 0x3, 0x9961, 0x3}, &(0x7f0000000540)=0x14) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r3, 0x84, 0x19, &(0x7f0000000580)={r6, 0x100}, 0xffffffffffffffe9) ioctl$DRM_IOCTL_GET_SAREA_CTX(r3, 0xc010641d, &(0x7f0000000300)={0x0, &(0x7f0000000480)=""/112}) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm-monitor\x00', 0x200000, 0x0) r7 = dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_CONGESTION(r7, 0x6, 0xd, &(0x7f0000000180)='lp\x00', 0x3) ioctl$VIDIOC_TRY_FMT(r7, 0xc0d05640, &(0x7f0000000400)={0xa, @raw_data="d456e651514154be56c23a0150374fec800b3363d0f8209aea95ae10a4bfe2bc4a059b555ffe32ee49657c21fdaeec9ff08b45f3c5b652502dd578edc616a43da8fa7411c10cf0be3062500d3923e6f93300ce6e6ca32a13179605ca95c9250023e974040392fcffaac49faad6d6549cb1f2e1c7492ba9a8e2d26787e1872027fbe8577edbc559354f305d4e05c26a2f708bb008ca01368edece7ac1108379664aea7622db8fe0f786d6a4177494b3766d3f6f8e4c69729d1cdef558344c8bab4dfc9bfc6bc56bfa"}) ioctl$GIO_UNIMAP(r7, 0x4b66, &(0x7f0000000840)={0x2, &(0x7f0000000280)=[{}, {}]}) clock_gettime(0x0, &(0x7f0000000a40)={0x0, 0x0}) select(0x40, &(0x7f0000000200)={0x4, 0x7, 0x3ff, 0x3, 0xffffffffffffffe1, 0x6, 0x4b4, 0x80000001}, &(0x7f00000009c0)={0x4ebe, 0x5, 0x1, 0x7, 0x1, 0x8, 0x7, 0x100}, &(0x7f0000000a00)={0x0, 0xffffffff, 0x80000001, 0x1f, 0xfffffffffffffffd, 0x1, 0x8, 0x8000}, &(0x7f0000000a80)={r8, r9/1000+10000}) ioprio_set$pid(0x7, 0x0, 0x9) ioctl$BLKPG(r1, 0x932, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0x7fff) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r10 = request_key(&(0x7f0000000740)='encrypted\x00', &(0x7f0000000b00)={'syz', 0x2}, &(0x7f0000000b40)='./cgroup\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000680)='asymmetric\x00', &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, r10) request_key(&(0x7f00000004c0)='pkcs7_test\x00', &(0x7f0000000500)={'syz', 0x1}, &(0x7f0000000540)='wlan0\x00', 0x0) 08:17:47 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x305, &(0x7f0000000000)=ANY=[]}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1000000000000304, 0x400000000100) [ 579.145107][T12732] BPF:[2] ARRAY (anon) [ 579.163038][T12732] BPF:type_id=5 index_type_id=1 nr_elems=63 08:17:47 executing program 5: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x305, &(0x7f0000000000)=ANY=[]}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') preadv(r0, &(0x7f00000017c0), 0x1000000000000304, 0x400000000100) [ 579.190194][T12732] BPF: [ 579.204785][T12732] BPF:Invalid index [ 579.208874][T12732] BPF: [ 579.208874][T12732] 08:17:47 executing program 4: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [{}], {}, [], {0x10, 0x2}}, 0x2c, 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r3, 0x0) chdir(&(0x7f0000000100)='./file0\x00') symlink(0x0, &(0x7f00000007c0)='./file0\x00') 08:17:48 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x16, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffff1971a4f0ff00000000b7060000000000811e6403000000000045040400010000001704000001000a00b7040000000100006a0af2fe00000000850000001a000000b70000000000000095000000000000009e17890efaee5eab7ff8a8cdc21ce784909b849d5550ad855dab54d8877a6db61d69f2ffcaa10350e11cb97c8adf1bc9a0c4ee6d9674c77404ceb9971e43405d621ffbc9a4fd39b0b56bfe6508ebb3c44eb84049761451ce540c772e2d9f8004e26f7fcc059c062234d5595f6fba87b81d1106fb0289ce67a66afd9ac3d09e29a9d542ca9d85a5c9c88474895d679838def0a83a733dc6a39b63a5ed69d32394c53361d7480884bd8048a967d9b912ef9f1d6fee41f5b29d37acb91c61ccd1df673896450f859ce8122a79c3e4"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000340)}, 0x42) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0xffffffffa0008000, 0xffffffffffffff3e, 0x0, &(0x7f0000000040)="a34747e865af5cf11e34bdff7a7a5ba0051aae5804d5a05d9b9ff68e12bb4d43a20375ea905795449b957e956aa6", 0x0, 0x401, 0x0, 0x0, 0xfffffffffffffff3}, 0x28) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f0000000240)={0x1ff, 0xc, 0x4, 0x0, 0x27e5, {}, {0x4, 0x8, 0x4, 0x8, 0x7, 0x6, "96669900"}, 0x7, 0x0, @fd=r0, 0x9, 0x0, r2}) r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@struct={0x0, 0x0, 0x0, 0x4, 0x0, 0x9}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x1, 0x3f}}]}}, &(0x7f0000000080)=""/236, 0x3e, 0xec, 0x8}, 0x20) ioctl$EVIOCGLED(r3, 0x80404519, &(0x7f0000000580)=""/250) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) dup(0xffffffffffffffff) r5 = dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_CONGESTION(r5, 0x6, 0xd, &(0x7f0000000180)='lp\x00', 0x3) ioctl$VIDIOC_TRY_FMT(r5, 0xc0d05640, 0x0) ioctl$BLKTRACESTART(r5, 0x1274, 0x0) 08:17:48 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [{}], {}, [], {0x10, 0x2}}, 0x2c, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r3, 0x0) chdir(&(0x7f0000000100)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') 08:17:48 executing program 1: r0 = socket$inet(0x2, 0x3, 0x2) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000240)='/dev/md0\x00', 0x0, 0x0) ioctl$void(r0, 0x5451) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) mkdir(&(0x7f00000005c0)='./file0\x00', 0x100000000020) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x7f, 0x4, 0x0, 0x0, 0x9, 0xfc, 0x0, 0x9d7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0x7) lstat(&(0x7f00000002c0)='./file1\x00', &(0x7f0000000340)) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x591800, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/nullb0\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, 0x0) r4 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000180)=ANY=[], &(0x7f0000000140)) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}}, 0x98) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000040)={0x0, 0x3a8e}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f0000000600)={r5, 0x6, 0x140a09e5, 0x3, 0x9961, 0x3}, &(0x7f0000000540)=0x14) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r3, 0x84, 0x19, &(0x7f0000000580)={r6, 0x100}, 0xffffffffffffffe9) ioctl$DRM_IOCTL_GET_SAREA_CTX(r3, 0xc010641d, &(0x7f0000000300)={0x0, &(0x7f0000000480)=""/112}) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm-monitor\x00', 0x200000, 0x0) r7 = dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_CONGESTION(r7, 0x6, 0xd, &(0x7f0000000180)='lp\x00', 0x3) ioctl$VIDIOC_TRY_FMT(r7, 0xc0d05640, &(0x7f0000000880)={0xa, @raw_data="d456e651514154be56c23a0150374fec800b3363d0f8209aea95ae10a4bfe2bc4a059b555ffe32ee49657c21fdaeec9ff08b45f3c5b652502dd578edc616a43da8fa7411c10cf0be3062500d3923e6f93300ce6e6ca32a13179605ca95c9250023e974040392fcffaac49faad6d6549cb1f2e1c7492ba9a8e2d26787e1872027fbe8577edbc559354f305d4e05c26a2f708bb008ca01368edece7ac1108379664aea7622db8fe0f786d6a4177494b3766d3f6f8e4c69729d1cdef558344c8bab4dfc9bfc6bc56bfa"}) ioctl$GIO_UNIMAP(r7, 0x4b66, &(0x7f0000000840)={0x2, &(0x7f0000000280)=[{}, {}]}) clock_gettime(0x0, &(0x7f0000000a40)={0x0, 0x0}) select(0x40, &(0x7f0000000200)={0x4, 0x7, 0x3ff, 0x3, 0xffffffffffffffe1, 0x6, 0x4b4, 0x80000001}, &(0x7f00000009c0)={0x4ebe, 0x5, 0x1, 0x7, 0x1, 0x8, 0x7, 0x100}, &(0x7f0000000a00)={0x0, 0xffffffff, 0x80000001, 0x1f, 0xfffffffffffffffd, 0x1, 0x8, 0x8000}, &(0x7f0000000a80)={r8, r9/1000+10000}) ioprio_set$pid(0x7, 0x0, 0x9) ioctl$BLKPG(r1, 0x932, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0x7fff) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r10 = request_key(&(0x7f0000000740)='encrypted\x00', &(0x7f0000000b00)={'syz', 0x2}, &(0x7f0000000b40)='./cgroup\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000680)='asymmetric\x00', &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, r10) request_key(&(0x7f00000004c0)='pkcs7_test\x00', &(0x7f0000000500)={'syz', 0x1}, &(0x7f0000000540)='wlan0\x00', 0x0) 08:17:48 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x305, &(0x7f0000000000)=ANY=[]}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1000000000000304, 0x400000000100) 08:17:48 executing program 4: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [{}], {}, [], {0x10, 0x2}}, 0x2c, 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r3, 0x0) chdir(&(0x7f0000000100)='./file0\x00') symlink(0x0, &(0x7f00000007c0)='./file0\x00') 08:17:48 executing program 5: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x305, &(0x7f0000000000)=ANY=[]}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1000000000000304, 0x400000000100) [ 579.583075][T12861] BPF:[2] ARRAY (anon) [ 579.610218][T12861] BPF:type_id=5 index_type_id=1 nr_elems=63 [ 579.643786][T12861] BPF: [ 579.681395][T12861] BPF:Invalid index [ 579.699563][T12861] BPF: [ 579.699563][T12861] 08:17:48 executing program 0: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)=ANY=[@ANYBLOB="020000202f00a1fa1e31000000000000", @ANYRES32=0x0, @ANYBLOB="040000000000000010000200000000002000000000000000"], 0x2c, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) bind$unix(r1, &(0x7f0000000000)=@abs={0x0, 0x0, 0x4e24}, 0x6e) r2 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000000240)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r4, 0x0) chdir(&(0x7f0000000100)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') 08:17:48 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x305, &(0x7f0000000000)=ANY=[]}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1000000000000304, 0x400000000100) 08:17:48 executing program 4: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [{}], {}, [], {0x10, 0x2}}, 0x2c, 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r3, 0x0) chdir(&(0x7f0000000100)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', 0x0) 08:17:48 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x16, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000340)}, 0x42) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0xffffffffa0008000, 0xffffffffffffff3e, 0x0, &(0x7f0000000040)="a34747e865af5cf11e34bdff7a7a5ba0051aae5804d5a05d9b9ff68e12bb4d43a20375ea905795449b957e956aa6", 0x0, 0x401, 0x0, 0x0, 0xfffffffffffffff3}, 0x28) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f0000000240)={0x1ff, 0xc, 0x4, 0x0, 0x27e5, {}, {0x4, 0x8, 0x4, 0x8, 0x7, 0x6, "96669900"}, 0x7, 0x0, @fd=r0, 0x9, 0x0, r2}) r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@struct={0x0, 0x0, 0x0, 0x4, 0x0, 0x9}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x1, 0x3f}}]}}, &(0x7f0000000080)=""/236, 0x3e, 0xec, 0x8}, 0x20) ioctl$EVIOCGLED(r3, 0x80404519, &(0x7f0000000580)=""/250) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) dup(0xffffffffffffffff) r5 = dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_CONGESTION(r5, 0x6, 0xd, &(0x7f0000000180)='lp\x00', 0x3) ioctl$VIDIOC_TRY_FMT(r5, 0xc0d05640, 0x0) ioctl$BLKTRACESTART(r5, 0x1274, 0x0) 08:17:48 executing program 1: r0 = socket$inet(0x2, 0x3, 0x2) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000240)='/dev/md0\x00', 0x0, 0x0) ioctl$void(r0, 0x5451) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) mkdir(&(0x7f00000005c0)='./file0\x00', 0x100000000020) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x7f, 0x4, 0x0, 0x0, 0x9, 0xfc, 0x0, 0x9d7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0x7) lstat(&(0x7f00000002c0)='./file1\x00', &(0x7f0000000340)) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x591800, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/nullb0\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, 0x0) r4 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000180)=ANY=[], &(0x7f0000000140)) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}}, 0x9c) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000040)={0x0, 0x3a8e}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f0000000600)={r5, 0x6, 0x140a09e5, 0x3, 0x9961, 0x3}, &(0x7f0000000540)=0x14) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r3, 0x84, 0x19, &(0x7f0000000580)={r6, 0x100}, 0xffffffffffffffe9) ioctl$DRM_IOCTL_GET_SAREA_CTX(r3, 0xc010641d, &(0x7f0000000300)={0x0, &(0x7f0000000480)=""/112}) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm-monitor\x00', 0x200000, 0x0) r7 = dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_CONGESTION(r7, 0x6, 0xd, &(0x7f0000000180)='lp\x00', 0x3) ioctl$VIDIOC_TRY_FMT(r7, 0xc0d05640, &(0x7f0000000400)={0xa, @raw_data="d456e651514154be56c23a0150374fec800b3363d0f8209aea95ae10a4bfe2bc4a059b555ffe32ee49657c21fdaeec9ff08b45f3c5b652502dd578edc616a43da8fa7411c10cf0be3062500d3923e6f93300ce6e6ca32a13179605ca95c9250023e974040392fcffaac49faad6d6549cb1f2e1c7492ba9a8e2d26787e1872027fbe8577edbc559354f305d4e05c26a2f708bb008ca01368edece7ac1108379664aea7622db8fe0f786d6a4177494b3766d3f6f8e4c69729d1cdef558344c8bab4dfc9bfc6bc56bfa"}) ioctl$GIO_UNIMAP(r7, 0x4b66, &(0x7f0000000840)={0x2, &(0x7f0000000280)=[{}, {}]}) clock_gettime(0x0, &(0x7f0000000a40)={0x0, 0x0}) select(0x40, &(0x7f0000000200)={0x4, 0x7, 0x3ff, 0x3, 0xffffffffffffffe1, 0x6, 0x4b4, 0x80000001}, &(0x7f00000009c0)={0x4ebe, 0x5, 0x1, 0x7, 0x1, 0x8, 0x7, 0x100}, &(0x7f0000000a00)={0x0, 0xffffffff, 0x80000001, 0x1f, 0xfffffffffffffffd, 0x1, 0x8, 0x8000}, &(0x7f0000000a80)={r8, r9/1000+10000}) ioprio_set$pid(0x7, 0x0, 0x9) ioctl$BLKPG(r1, 0x932, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0x7fff) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r10 = request_key(&(0x7f0000000740)='encrypted\x00', &(0x7f0000000b00)={'syz', 0x2}, &(0x7f0000000b40)='./cgroup\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000680)='asymmetric\x00', &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, r10) request_key(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={'syz', 0x1}, &(0x7f0000000540)='wlan0\x00', 0xfffffffffffffff8) 08:17:48 executing program 4: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [{}], {}, [], {0x10, 0x2}}, 0x2c, 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r3, 0x0) chdir(&(0x7f0000000100)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', 0x0) 08:17:48 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x305, &(0x7f0000000000)=ANY=[]}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1000000000000304, 0x400000000100) [ 580.099715][T12995] BPF:[2] ARRAY (anon) [ 580.107570][T12995] BPF:type_id=5 index_type_id=1 nr_elems=63 [ 580.123467][T12995] BPF: [ 580.131118][T12995] BPF:Invalid index [ 580.140472][T12995] BPF: [ 580.140472][T12995] 08:17:48 executing program 5: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x305, &(0x7f0000000000)=ANY=[]}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1000000000000304, 0x400000000100) 08:17:48 executing program 4: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [{}], {}, [], {0x10, 0x2}}, 0x2c, 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r3, 0x0) chdir(&(0x7f0000000100)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', 0x0) 08:17:49 executing program 1: r0 = socket$inet(0x2, 0x3, 0x2) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000240)='/dev/md0\x00', 0x0, 0x0) ioctl$void(r0, 0x5451) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) mkdir(&(0x7f00000005c0)='./file0\x00', 0x100000000020) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x7f, 0x4, 0x0, 0x0, 0x9, 0xfc, 0x0, 0x9d7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0x7) lstat(&(0x7f00000002c0)='./file1\x00', &(0x7f0000000780)) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x591800, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/nullb0\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, 0x0) r4 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000180)=ANY=[], &(0x7f0000000140)) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}}, 0x98) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000040)={0x0, 0x3a8e}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f0000000600)={r5, 0x6, 0x140a09e5, 0x3, 0x9961, 0x3}, &(0x7f0000000540)=0x14) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r3, 0x84, 0x19, &(0x7f0000000580)={r6, 0x100}, 0xffffffffffffffe9) ioctl$DRM_IOCTL_GET_SAREA_CTX(r3, 0xc010641d, &(0x7f0000000300)={0x0, &(0x7f0000000480)=""/112}) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm-monitor\x00', 0x200000, 0x0) r7 = dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_CONGESTION(r7, 0x6, 0xd, &(0x7f0000000180)='lp\x00', 0x3) ioctl$VIDIOC_TRY_FMT(r7, 0xc0d05640, &(0x7f0000000400)={0xa, @raw_data="d456e651514154be56c23a0150374fec800b3363d0f8209aea95ae10a4bfe2bc4a059b555ffe32ee49657c21fdaeec9ff08b45f3c5b652502dd578edc616a43da8fa7411c10cf0be3062500d3923e6f93300ce6e6ca32a13179605ca95c9250023e974040392fcffaac49faad6d6549cb1f2e1c7492ba9a8e2d26787e1872027fbe8577edbc559354f305d4e05c26a2f708bb008ca01368edece7ac1108379664aea7622db8fe0f786d6a4177494b3766d3f6f8e4c69729d1cdef558344c8bab4dfc9bfc6bc56bfa"}) ioctl$GIO_UNIMAP(r7, 0x4b66, &(0x7f0000000840)={0x2, &(0x7f0000000280)=[{}, {}]}) clock_gettime(0x0, &(0x7f0000000a40)={0x0, 0x0}) select(0x40, &(0x7f0000000200)={0x4, 0x7, 0x3ff, 0x3, 0xffffffffffffffe1, 0x6, 0x4b4, 0x80000001}, &(0x7f00000009c0)={0x4ebe, 0x5, 0x1, 0x7, 0x1, 0x8, 0x7, 0x100}, &(0x7f0000000a00)={0x0, 0xffffffff, 0x80000001, 0x1f, 0xfffffffffffffffd, 0x1, 0x8, 0x8000}, &(0x7f0000000a80)={r8, r9/1000+10000}) ioprio_set$pid(0x7, 0x0, 0x9) ioctl$BLKPG(r1, 0x932, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0x7fff) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r10 = request_key(&(0x7f0000000740)='encrypted\x00', &(0x7f0000000b00)={'syz', 0x2}, &(0x7f0000000b40)='./cgroup\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000680)='asymmetric\x00', &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, r10) request_key(&(0x7f00000004c0)='pkcs7_test\x00', &(0x7f0000000500)={'syz', 0x1}, &(0x7f0000000540)='wlan0\x00', 0x0) 08:17:49 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x16, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000340)}, 0x42) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0xffffffffa0008000, 0xffffffffffffff3e, 0x0, &(0x7f0000000040)="a34747e865af5cf11e34bdff7a7a5ba0051aae5804d5a05d9b9ff68e12bb4d43a20375ea905795449b957e956aa6", 0x0, 0x401, 0x0, 0x0, 0xfffffffffffffff3}, 0x28) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f0000000240)={0x1ff, 0xc, 0x4, 0x0, 0x27e5, {}, {0x4, 0x8, 0x4, 0x8, 0x7, 0x6, "96669900"}, 0x7, 0x0, @fd=r0, 0x9, 0x0, r2}) r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@struct={0x0, 0x0, 0x0, 0x4, 0x0, 0x9}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x1, 0x3f}}]}}, &(0x7f0000000080)=""/236, 0x3e, 0xec, 0x8}, 0x20) ioctl$EVIOCGLED(r3, 0x80404519, &(0x7f0000000580)=""/250) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) dup(0xffffffffffffffff) r5 = dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_CONGESTION(r5, 0x6, 0xd, &(0x7f0000000180)='lp\x00', 0x3) ioctl$VIDIOC_TRY_FMT(r5, 0xc0d05640, &(0x7f0000000400)={0x0, @raw_data="d456e651514154be56c23a0150374fec800b3363d0f8209aea95ae10a4bfe2bc4a059b555ffe32ee49657c21fdaeec9ff08b45f3c5b652502dd578edc616a43da8fa7411c10cf0be3062500d3923e6f93300ce6e6ca32a13179605ca95c9250023e974040392fcffaac49faad6d6549cb1f2e1c7492ba9a8e2d26787e1872027fbe8577edbc559354f305d4e05c26a2f708bb008ca01368edece7ac1108379664aea7622db8fe0f786d6a4177494b3766d3f6f8e4c69729d1cdef558344c8bab4dfc9bfc6bc56bfa"}) ioctl$BLKTRACESTART(r5, 0x1274, 0x0) 08:17:49 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x305, &(0x7f0000000000)=ANY=[]}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1000000000000304, 0x400000000100) 08:17:49 executing program 4 (fault-call:9 fault-nth:0): mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [{}], {}, [], {0x10, 0x2}}, 0x2c, 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r3, 0x0) chdir(&(0x7f0000000100)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') [ 580.552311][T13114] BPF:[2] ARRAY (anon) [ 580.559993][T13114] BPF:type_id=5 index_type_id=1 nr_elems=63 [ 580.587209][T13114] BPF: [ 580.590460][T13114] BPF:Invalid index [ 580.604687][T13114] BPF: [ 580.604687][T13114] 08:17:49 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x305, &(0x7f0000000000)=ANY=[]}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1000000000000304, 0x400000000100) 08:17:49 executing program 1: r0 = socket$inet(0x2, 0x3, 0x2) openat$md(0xffffffffffffff9c, &(0x7f0000000240)='/dev/md0\x00', 0x0, 0x0) ioctl$void(r0, 0x5451) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sysvipc/shm\x00', 0x0, 0x0) r3 = timerfd_create(0x0, 0x0) r4 = getpid() sched_setscheduler(r4, 0x0, &(0x7f00000001c0)) getpgid(r4) dup3(r3, r2, 0x0) r5 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mmap(&(0x7f00009ff000/0x600000)=nil, 0x600000, 0x0, 0x12, r5, 0x0) sendto$inet6(r5, 0x0, 0x0, 0xfffffefffffffffe, &(0x7f000006ffe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) write(r5, &(0x7f0000004400)="d4c65f0c7bbebdb8702538ba76ee70389977d651287ea2663ac5bc5a8d5b5bb4a325474330fee7f49e276fe4e90188ceef0a173adf3ec5d6a543f7a2de5550ba77b4ab18b7a8ae43ddf73a09d06f6dfd3f99056bd37bcabae7f9c13bc4fa28445a90c31614687d3184a8a6d7f38c1892a60dd30341e3527c74693347eaf238281492c8638b4a3f7c616b185e9d8c1c0b681a26f6f6d1b772813237b77c9af159505e1ff6ebe79559ae0efc59cb4e442ea3d9f0277dc7dd5228b1902c14b890cab08e2fe68a0a3dfed118a6de9643ed2e0b14fdebb1cf0f0eb32fa7d4ebed3a122f22b000276e3e01270b9eee007080badf84b8aba8a3dbcbc2a34aba74fd08521a7aba804ef1d9ee48a352d26b84775ac8fc4e585e12debc3d1ce33650d6c06579b522bb03ab0484cfc34c5e30648b8dc67ed40d5ffc265303f8083b911f9b7b353604dbe8997902088876574f6bf652c8a3fd7ac7426b358e33e6bda0a9f6710ee5006613ba2f295cd93561eeae30bf27b714b843568ccb3a600b907eeefeefcafea2cdb3fda757317d8d62d921c29d2b8e9540550664b13e680359a6451065f0874b2f527f2ef388dc83e8adf1234e5b1afb92c5aa9d94848b2863601d0feb87beeab5a23ed9e20b5d0f97f8ea057f01b1616b62f281ec8bfbfb56aadc042ff5bfdbb1914e6d01c6921f8585874260496909b3cb0e98d80566720e747ca33b3ef5b7673740b5c52fbf3055f74979eecd2d1734d24b6d4fae549fa261b299b05688bb9d669acdcef742ce1bc151ec7c9a3c91fc632665f7ab40e3a65d026c5c53240347a7c96e3b490aedec9bc53d1ea8204efc64dd3a2be44446049f56cbca1928af793885fbdc5ac6ed5dac10e28fe8e43629e5b52069ee1933c3bd4962d3e46efa45b62b4b2bf3aa45f49106bceefae138810b79d44c9a291f6bb829dc3a51d6a74de9034942a87971d3c8134350fff6f31faa1c3a15ed4a1747e3d6357ede1f300ffa42db213c2a631bf079afb5f85bc22b98f5bb4d4b3fa4f98a31121a12c915edb5a26fe357a35a99e2c7e86d4a1cb5d18249c1ef34fd4a9b2076e193be685ff59a606846e702bf3d5cb8ab46152e1c352f1493de76bfec450d8713297cfc13a13e104a3f68543235e54fe1a4c554746d6d75a980fe9f17b909fc631c9e4a3cb96aa1288d024a2ee317ddbc4be00bd0abeb829530de94c462eaa417589862a09ced3dcc83ce3717b18817b093c767810e8c174138f83dfd3d346c765b450b9f3ad4ea39ef2c3b77632748d72952b97b5941dc7e4f23fbe6d6132d82f224febd211a857bdcd411806fd7ae7ca5dd4f516f905538d7758f36117dbf845135ff5d06dad94597ef23ab06f513955c35f3d77466870e168248bbe109ef697ab49b287529404deccad9a17d1b4dcf3da8a80a6af31a53ad4b5bfc00def32cd9f5964b0851b03c49cbb7e6f88c44c43cadbafb249f37f4ecd20f661f5b6ba4330500e4bf7308f69e3b8557e42f130715dbde687694c0fcd53b64abdd12ea7ed663a00606bcda776f131d259c414b5dac86a8fd07c8037a2ef37558a25fba19fa41977307eca047c4f00fe9bcab6392e585b09673e85b8d7ad86ed9796422c7071c8205e7a859e6387ac759bf8f21e91098d708036139e2e52f10e2d46594a42a4d55012323af17c85910e8819c504b2a1272fb21ff55b05f211b151fc5a27995cd8dc98af48b31939e63ede2225f4f6d366c2843bbfa4334b022e6685058e77acb30388da0b2b202c0c73c4ce8c5dd635ced1d33eefe8de816e9455aa7f788211450f5f36e3d5cfb26bd2ec51322432bcfe8b5f6258cc62993e3ffcacec2c2a35cdecaf5677a583116352a56990b219d8ec72c7db52f5642dddf7fe216422d19def0cb1e1804a3547995fd8da4fa58c9f21972894f7dcaab6d5db9461222df1b15e69d986730496131b2b3b45b0b012f285dcca21b7f7ebe84dc54f743bf8d0ee29951d583329bf6ce0ba4bfc845c78d5c90f0725d51dae4d8918162bbf33e885bd49073a58ac6e4305df3f9b221e085361d01eca6b9e0f65c1d73d226b3a8e38db30fe85fcbd97f9739cd9e37763540fd4f9b55a135c42ad19ba0214f98bb9479d5a6fc2df5ea707028850eb127813933478979691e01d5fda69d507a6ab701621a0f37b96adb62fa96591d08249d657066bf8549a714d28a5dcfab849873792a2dee8fd06b23b54d3fe9f5de641ff8973353307d7691da79d11633450286d539b63d55be021c201b7f5c9a2fe57fd6c2e85bbf396bb1efaf7595dc81d0d34d5f3e22c33a8bc795635355468ad75f8dd5100b3dcf5b1c1b7097d20e20003e07300d1c40ab111eba44dcc1830a4bd468ec4b10e6968008d65b7ae8b6aa471c2b2d6396ad4dd4c0ee02fd2ec2ae189fc43158dc58761fb8ba5a880053b4cc1b211ca925ed8ded7ed00546da1e36b8992e932426f844ed45b1ed70b231c0ff7d51c3033644ae876e3ef12a5a304339a9536b81d8083610db1a8052fdeba35651ce8f346bad2981e75ae6e62839a1c595ca745d3c0e8d69cafd7e0fb61ebf81b96af33af0b4117b3ab2357740f10bd306a9e65370aa8a13a0d4d834a7394dc5deea28cfc0f3e22f7851a1b61efef92366e2c356ea2b544ceb320a61d90392b7069426b7dcc9fc9667d8acde3ba9fec5fca3351534484f01b55a78621d24084d7bbb6ba00672b8288c33509bee6b1a419dccce5c8ad2700153fb99c3bed7c53865b258b86928ea3ad5816c59078db102100f459fece52b17802d4bbb4441e58e34b5aacef14488bf80ea6c0d3d5b5eb6fc447ee94c406c0cac02ac593d1eddc3c77bc8e5f9aa2bdfe414bc91307b77888cdae2b3759395896c47d0738d162381c20428fbf47d92fdf50b78744cb00c83db88ec902111660978447859b84eed4aa9227d84469cda66e961364baded94f5c1b7b98e9092e9d5a50b4ed699908ac7687f7f8d509e9f748310fc5d425960cefe1232b2492a12e30576f83f079969b124c8fcd28ea3962faee5c9637ee2282f1d77fbe63d25711168f1357c89bf42723e26d023a404b372b7029a6157fb89274512efbed083e94903060467cf346ea017d6830bb248d48c226f7bf65eeebc450e279bb478a2949c2a84f70235895e844f6f4d67632771f2ace481a102ce19451b0ac6b50bc1a0a5dbf1813f1c5d5c9dbd2c529b2af8528ac6f0df6ddd4869b22bb4c7d8cc902b33b53f8ea548dac293b3b93e7861c36856776e45ff353c2fc345f35d05546a9d4bb84f9478c7017d28a4f831117eaefee4d97e8a5278ee0787793d46a47c8a892018d6d2e97d6eec124785bbf0d33f1a58149736a806dcc9331ad300589586ae7b8e0463fa48e6afb29d8e479d5f72acf93eec5c2079a85ffe7b992639e11b0d602c2df580823e64e29a11b2ec9a4ea1abc49e69756e9593481c257a40ce2f1753468f36429ba5c167126ee2afb2b3b3619aa5bc2366c857d482da2c6d370694c0bf2dd155faf1a6c3da35de787d7438fb74d76232ac344e5a28848482afb228264d25469fc60a1c940186aacc28c3e92dd82c8c70ab369ff96a8c89dc6d9af9a6865fb49e45a380ce65846d3001b7ca00b522989632f9dcd3a2f9592a5e8cdae984c32a89401bca6478efc24e49dc2a1e35245dd2d426b7796d22e27e52ebbbabe786d7c87056b1ce034123404ea76a6e35d4680264f4f778ed2938308468c8869fe50ac3bf295d8b3843cff5d62884a3870678b0aa55698b3a891f68aec57c243eb646146f67f30821f81d6cd5bb82f6c26378a36d1633259954a0427e842446b712740305f85cfcc79bb2cade6da39b6443ec799bfb73c07a44202cd9c497b8d892e4c3bccf797c9d7fadba10cd3643a589904f372221c43ad51c1c9eef86a1edaa53ecf2eea68d81f8a829866325e028e7879e9b4f3261a7f0457b50110ced33dd935ba419d7b7d0ed983b2542271b160256138c01e98ef50038e5d39654f484ac24ce1f907e2b43f061bc52cf7e87cd06642c575960e56e3ea5cd0fea81050fb764793030c475a6bfbe0c76a576819cc6f4b510d908dd83ca1af0d079db1faec479b0dc2788aa322ba199f3ecbf3ff5e5e440ffefeda37f9549245f73743cf21b7f40b1277d0d836c9b9d17ada955a2c908be0376ee6c46689d99f75fdb9acc944cf6115a297aab5445738199dc38deedbb7be0cf2c77d0c8f447518de9329fc73d355f4bae104ec1e27f9e85bed5a434b35e6c1bcef515c3b88ed61d2e62709a09128e9b04bbd5ecc1b66b3f9a4b3f5720c1818636c3b2fb3976589eb66c6f5f2922435cb744d08a9ff72e0373a792f000f924fced5a91fd5acf42ba03e748e758500433c5c3c4d479b65a0c92c8cbe7dfd0026eeba6afc872106f7bf5cbac14a52b3673ee626c180bcd91f9175a329b270fb0cf2a2e012f9c2ca7704bfde15164395990a86e62f0fb1ca79b799042475aacaab8fa2ba38c560026ced544031f6e245bca53659341e493018a91a96150ed546669a1ea3066ebee89d35890dc7a917815b445f1ae69a8eb4161cd106f3596b0ea08d316a4e385c9dc491f7c1de8b17ba53e5b64bb9fbdca70d53070391877e78ac8d6e89a6d2a90441aaafc8bea4922c56024efee33308d495913f0c5e93e7729c1c19e10752e403a8f86525eb45b26bade82fe5f64c518e4fc391baf5cd8c51eb71c3189f0b679bbc6bc4b3977b4bdc99e798bd93fb86b9d78fea870d937907225f70099e0f017a5e0ae7f731fd4d2bea9fb6c9e58f1f974945b1eb334b2407a68d59652b1945bdf9ee64a37c6f7cb288786fa1c996bc16fcf8c61003764f13b421f9d6f9ad5ceb2fb8ffe3d66157a3c28e43d1b0548a8cfa456a24a684bc67ebcafc1a3380ff47d838fa161c5c91d842ade47aaef726293ff54f556d030a2521e92c8bbc95a79651c817bd4e9e673d773b30641467d79b59b8914610228b16a92e1dafa04c41d3ee412238cb958290f08d65a55360b423eee704cc694a94c98b3cc6a588bcc27ed25f4e08412df4fd1523c6cf355e8b0d917c864401a2f3bf5e65552c653ac16a5cd2fd9e2ed923710ccc76bf36c6f55fe7a9b6180edd520d997938e4e92cd8f89ccdb6e4379ecc52b76e1cdec5a965b56402cedd793e05659f56cad68d8ce4a972b00ca7ddd56f69d32ada520f2a9c35f5246793b38c01bc816e218f87669ad7b72b6d549588769240006e472e8512fdb45c45be61d3618e827ce94058e16b724c47003b7ef9382396d1e1bdaae05a1ee94ddc23c88d57aedae59e077461b1ad2dffc3646bb0a8933fa8cf4b8b6e60114dfacc3c22f95902bd29e57929746a3488bdf8c34cf27847bbdf7741cdf98c5a7d08e73737a0dbf92b0f307c040249415977e4cc7570cbe01dea47bd400770e88ba3664161bc3ca58a569e050781fc4f9f894e54df195d479514b11f2841e1cecd53e69f25ad51c00e6b562d91efdb470a976274cc90f9a81fd8682c27e2017e89dbca15881f01687ed14f2421b9ad1ebdd928aa233b99a34dbf4cb112df0b347d146b02755a274adba643796d76b65891c9e80f0eff589b941a1bb57b0e20726791b26af81e8fa8f1c00a0c463fff71089c5377abaeff5c2e3946decf7878a4c7fe2243769300eeb0f0371cd6e0ae53fd5df14883454fd0274a9757ae2078ae95e41fc6eabad45cc5398fb8f8e8598fda4deea29d8aad2b9100fba5cdb4015489e2e29f47f96a6402b7f9bac2bd315483671ef393d9892ea71f89df633", 0x1000) sendto$inet6(r5, &(0x7f0000002340)="88122bee8b917d7ff16334a46d8488b1cac8173c0e0eba338d6bc2064546b54f234e160f862eb7bbc20ffb5bcb78cd1bf9d501182c288f3e5b2bf136eb7854a4a5051022caab24b59f5495b3d62b5abbc683fba25ea2a73520309f9a9fd1bf2fdcb042380efcd1924dcd377b16bd1b1c563ac1983c8388cb4fb7b55ca8c81cd9b4d660c40fe5105b72a8a8af3c10f61c3014ed9a9bcb91326a092229327b2ba84ea157b2cb2bb1426fb36799ab2dc520c911ba457f959e191ccce6e53eba7e500b6089bebfb2872a3272f152aec9ea82bc144f7397677284aad5fa60947d0474f7b1c3f56b8d0435cf043e3f85bb65bef841d3cc85fb22975aba37406e6e0ae31c2c1afda312c6668f03428d39fba4083c6d21bd7948dd83176323c75049e23c01b23c4b08351fa0fa476ed924ebaae3510036269293c3aa5e2b07933fd400c548fdc1e8fd8d2cee14c9ceafc594b73020eb44ac969afe5a0a423e5eb002812e040f4cefc7ad8bfe9b216939bc1269bb69aa6689b46eb2299bd9f0b3f2cf0466e801aea429306fe869913d18fb3ffa2165f910fed18f091970a5e388883c56e8b87e16a14d5068ffc2dcae198347cc1ccdea0a887577c4d5e1ac6083988967e2b16bda9476567de831615cc00476cb3aa04b250f04e3c71d6599000e5d993fd1f57206d184c10290ae2bb940b1fba876c531174e8dc37a8bde28c45807cd8c8138d03193e4fdbd0d3ad1a0f3adea4309b15a6952c862544e3a3cdc7060d23ed06e36d2ee49f73283c3796966067b0c28e9cf864264194df3e397e4a1e97005eeb1627291d545312be1359d06c4f99888d862ec4d7a7a0d1d52496d3b334e4582f8372852bb50cd8cc6cc4884a46551a47c1b1fd2234df54d3a9ce61a390edb77fb087e8cb86c297438f739b99735bb2cc0ebfe3ce919dbccb86ecb145ad729914fe39f26761bdaaaf544a86d05d4bab3e3f71c6cb3217543f586892f61764dea4377a9cc0f221884470a12a219277740b3a6bd1d72031618ff22cca0e7bd048920508011010f34f4153f3ac60e493c1e54b670e5e30ca16c99d154ecbbdca3f6181de4e37a3e05e93f45bd6f85cdd35693f315b0298317dada20b7deae2b3b4e693b1829044f8d87c02c8f8a394a55fbe5beaa6955bc7cdd58bed9fdf30aef04d9adc5f2cf684e1df821d76a5d4f2ffd30842ef78cf8dd8be618750b75cfddb5b5f25f905f40e19c2194d6a737d85682ef1af4a19b98d4e4efe99398cd86a25356b866270743eeef94a8760a05e3f22d78322e111f7c1687a0402a758f2c8533fbfdd21768f8a78395e20a9cbd487f038b6a22b274a9504eea03d685bc3411fc2cb8a3e922cff421ab999b336054fee0533299d7873770a6eb93cd1947451a8ebfcb162c4688e78b6ede00b8438441b57921ffe1c3fd2eb0e0a996d278753d6eeffb845af20515b74847ead73487f870e023a5595b3f14e7959fc856f9edb084c16d888c06a66c493b36e1bb557966dc9a8f4a1d0dcc6cf220c03aed24791b4b6dec902f2b584d2a0812fe8bf89b81b535f1fc52b549f42c45bc79de1cead067ce611813f54906175d860b22f6b8d88f0f1f4527f3b48f1bd9fd04377a76a9c5b9c1093e99cd1b8a5e58609a13daaf8c22ddfaca405436d187784a5f7b0ad2a48feac3045751a8f7bc3d47ee6f28b55e95e84a4c917516f9cc021d3deb03ca783ab3bddd024235161b333008eb0ed98e184b8bc637181d2ebd91b3ccfae9d2bf5243b0aca93d214ef9da32435678d9a6e3e5b554fbe6450791082624682b95fbaad608a69cb6b5644ab57092aa221070c850788f4519bf95d51aab30c580033b2aa06551b701bd1609099faacdf6c583a08b28730c30f83a6adba6fa77ddaac43e324c0732016afd5942dae9012e7a8e2c451fc4e6fc5cfeba689c929ad219d47691bb333471032cffabf041645ae31141960c23e0371465b94e320742ca27484a77803b504769883e81cf718e84632b5efb15aa7455375653a403df8839e7cfca338e722ef25ee3a7afaa080328bee24ffd34dc8e0f3249bcbe4ddd6b50f479aa8d7312388ea3a955164185ba932f545876d7272400afccfe8f8d612f477e7393092508b1d7339cb9b83469452c18e3dfcf59384ce96896dd255f653f544af00fdc8c38e9def0e2c5d98829afd34e477053275791481a3a207fc76dbf63c6fa939845993adeb4f2f52a198c84f81adac361110c3d4aced65e4f242d6a980df1ca2973b4e2eb30b17eee1d5b7499dc8b883c61fce8dc973c75cf8049d8fdb3d480315bd70d2ee7343242600d73bd77732fb5a6a3c9d33a5925ec5b7403d1e27018e803555f1718cfbb33b40ea2d114455616e4735c118257acb89d1adf7b149356b74840b28654c34eef26b8157a363a850cdbe7c0f1ae2e7ce1b24c974b1328bab8eb6c3d00918011d76441d1d899034b39151b54407596dcec8a951c6c5e1c8fec3693da24cbbf063e7b9c6dee26916e857c6049dfd93e19840d4248b3e840f68f2a219317c48bd8f82fef1c3a307751f58a30570506dbbdfb289f968185f28604ebfc2ecdc8a4006462902c4ab2883d72c54e8f8aa1948d6363ee8d31acb57357cb92893431f6147656b76c1d730dba495e98c8b190927aa5433ff0d77f7d6e9a27f3c2baa41286870994876190e3feb39d40e2f2e5612a6ce96d7c24f9c0a0f0cc86ea4363c497296bc85483fb405c1086575283aa612e2ceb4c955378a21e1774c70edb9987a29e49590940d8767b2f3c0f840f2beb82c08a2f4eadcb41475c2cbb176be9f0d2e46cbb758368e4bde4834e7bd5a2727dd8a614d3e093ed9a6cd656bfd15cf33d4e8aa2a7fb6903d006c4bdd2b3eee3b8c7536cdc0c7b425a6fe9ee0dc842c1cd8e01b6123f196f0d066027d4ed1552e3460eefa14923f5982b14a79551440f4e5e9393b7e9a221d9ad3e229178b2b390889d037e829656b4664b8a674b42699b3b418e39963b77ab5aa3b1f576ee10f6d2cff0334fcc64b7664d8b0ab89b42cec159d55004da89e77447cdd76162b952208d32e301146992fb7fa5beb8e7696af71ea751bc0326a244a7735d489287f201c278ba1eac6ef43efbb709d071c8bda2c5c8d71d8fda9f06f30c0483aa1ad07a9c02a27e6371e4102f66153c584464d5b54f2b8d6b6b3a1cfc9c1d370857801faabb5929f67760f67e59ad6b89fa0d1dc99f35fd523f9e1fbb24f24685cd0afad5b2b144838c198021a3159ccd428aa66220a3fd125a562b0d5ac3d2a4f24288ead91dbb471c7c7b1462ab2fd0d1a40b0ea740848461a782b91c04158dda3001a50f348f5e2a9e6b7051f1cd1495df4b316ad74d44916c1e7f0fce41936b31ab74c6b3c8a1e5d408fb7cc9cef1fa6e47c4d5beeabc5149b9d78140433223ea019ab763c65a3ac0f0fd90ba0ed72a7cbf14adc9ddeac6112ff3eadd7de04dd6146f3010e0eba2403c0ed9250298440168919d29dd8f66ee79c374834e44ab5a4f39ae73d852a334eef6690c443c640979538233d43e5520e19495c4b2866c77a4b7146acf89971aaa7901ef6dcf9d0ad227cec87cc1744e1fc89836836b6b3f0fd2cc158fd4bd8c3447f32b995677d2df0e732ee080931128ac0d25d527fc91090000000029ce71c214fd2ca73f5f68c6f1cf96023e9597511e86e084d5e4a4849ffb41ad5bdb2079deac5a53a02f812b6aa8df3a541cfd525a540ab9218072ecc773c44637329e356140dc5c434a7e71c5e3d4b929c8b9c11e4e600fdde09cb7aaaa6deaff63e79afee6cf9ed7c6dad3a3bb9011057ccb38a2b02143abdba9fe566b622f28742e5d715c8519bf6e876c4fe6dc6b849d98b72a1fcff8d188775134f5558f2a1b7070af064345a71afc5e2ac295e81f1f7b9551afbc2dd26f470b8dbd152e54e314d9c8fdffbcd12ebd33a7deb7ae77fdf4633d01f4f02f328d5a8b96c30677787e1e909055d94834435d9eac6c1b82e0c110df61c3a63553a55c5242c1b73ea5d8c87938061a53299f0f9be487772f90e3ae1a5962025c8e8af6315d09b3fedab2ce5a7506ff2e913ece7b175b382bb4888c03d8ba771c3f657fde1cec63c66d9c1ff56ff0d7fbab27d40c6b70d6a18d5eac8f2413804f86d3684ae29e1bd5a543cd23c97d30e181ecab5feb2ef24ba7e6a1b702fc5c7907c780e2d74bef3ba3e83c8a947e35d88b27db682eb8a6c19593ae6d3f9e1985f11afc3303ae7d5058a69334f3eec0f2400f2c26f3e011e174d4482855497669921c96168e89f022df0f78260bbd93584f2e5cb9569afff5651208c4a67be00aa7422c63b8bea251b839023c63048c3531b0e9c6a873536d66f2429314de9a84a3837c0b1284bebfb7cfb779eca6000b3fccf9df8516ff0d5e866c5d3eea8caecacd572405b4110f4a3b5db00ac732a06761b1c4fad9ca284cfa7a6791f9726b6ea0109b90a630f6b8e9d07f2f7211eeef1f73f20cfc6df7d795482c1a4517d48ce39a77736b9aa4135072aabccb52e0b84cc437e1e4ddb06df66253044d531586068ca6a19889cd6b20c54e12569d8cfb333228c2129f0b38f54290944d9fb64a77ef4f2d74f0d860caf4ee499ce1640362dfe007bcd7450919c4e19403cba18ff8bad794dddf75c90ed32ef8f4203c4465c052a79f8e6ced18b229474e696f024e85c71b86c37424c384644abf3a4f911392133f234340e96f63220c5bd615ad83e5de1c389e6edd0d0748d65986b58002ae3ea1faa3de3a4c20673519796f524a5ab6f5b46ae222384e695cfabcbb44fe7535dbb42b0f03ae785ea4fbf77af890e04787015143a66a8b0bbd6a42a6aecb3fbc07ac2911b8c8c93243d6a765944c71b6b3c33b12cf9f0e8032359841749c0300ffeb9b2b88c16acc0dbe28e16aae7e224194e2b8633c50d75a047be4535482a402dac43e55f8249e088972dcf27a114e1526d80ca857eab2816c484bde1f835ac003167e360c591902caec68376cacc17f22927c89d63d8d5ec5e44d8e3a57a5068629865b6ac6d62b546e2804c448989d96da315429a246a77d27f496deb7b380c1475808d230c40263452c698e4796c1bd739be67da35610cc4e1624daaad9be2d1a134325365d924dc218d117183cc8911c83eeb3722c24c972c89eaf03b151f4a9d0f52afcf4e53c0463fe71622df47e05e34806eadb633130292ae15789bbda6eb735e8fea0e958efe52a2bd75140c66ce0e07041b5d844e1e6318d2bf7ccb3d199983bfd4d6bbfbc630fcbc1843211fae666e57274933f5f8f421c7278fc0cbc2fb2dda4e1d0cc6fe98463f0124a32d17c27267853101a7862fc666d1e4b831db0a2f08305f79840d52e7897f7c65ba829cea9b715e555aba4b4fca48ea65cd30073eb2a41dbb1da6a541ae1f93e905395a721b8d82cc8e1695b36ed0baa3da2132797ba36934734726b852de428719aa722fcc17961e4c7488e486e4f5399027db5ab5e385adc6edd0edeb13eb69ea2e32116542e52b289077e9169bfdb56fe0a9ba1ddb97b8e38751724771f371469ce937a8f46b4208b96779184a25138beef53ab28f6363946deac10c073c25a484bc53d31d4f9700d70e7d969784be4a5a62d01d777cf52b434308c4320ab3796f3d1e7a55947287a016284019c385e20fe6c784416708bb957202364fa794d4f63993ee9614c12731eb5c420f7bf74438944f058bb29b77f0dae6d1c21e28696ec50b071b63b90dab571000000000000000000000000000000357142b9000000000000000000000000000000006a64e79e349c32c88fdff1a18f69383fe0563d19add65cf33636cceb1ee02cecc3ac3b5f91f2a52299d5c71083b780b45edc37fd94b26cd9bd9d07465d18bf7aa730a7e5ffd27e0daf8bb13fa09a406368d826e1ab8dda78e0e908b14d445b0abc7e47ab34a1c631c72a41490d257ac647ba7be7779967b25640c895db55bdf15990356bc313751f01946b373ce19743e98394659642bda7b468000000", 0xffffffffffffffdd, 0x20000041, 0x0, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r5, 0x6, 0x23, &(0x7f0000000480)={&(0x7f0000ffd000/0x3000)=nil, 0x3000}, &(0x7f0000000080)=0x10) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) mkdir(&(0x7f00000005c0)='./file0\x00', 0x100000000020) r6 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x7f, 0x4, 0x0, 0x0, 0x9, 0xfc, 0x0, 0x9d7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r6, 0x2403, 0x7) lstat(&(0x7f00000002c0)='./file1\x00', &(0x7f0000000340)) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x591800, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/nullb0\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) [ 580.767808][T13159] FAULT_INJECTION: forcing a failure. [ 580.767808][T13159] name failslab, interval 1, probability 0, space 0, times 0 [ 580.795600][T13159] CPU: 1 PID: 13159 Comm: syz-executor.4 Not tainted 5.5.0-rc7-syzkaller #0 [ 580.804331][T13159] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 580.814404][T13159] Call Trace: [ 580.817723][T13159] dump_stack+0x197/0x210 [ 580.822087][T13159] should_fail.cold+0xa/0x15 [ 580.826835][T13159] ? fault_create_debugfs_attr+0x180/0x180 [ 580.832662][T13159] ? ___might_sleep+0x163/0x2c0 [ 580.837552][T13159] __should_failslab+0x121/0x190 [ 580.842513][T13159] should_failslab+0x9/0x14 [ 580.847034][T13159] kmem_cache_alloc+0x2aa/0x710 [ 580.851999][T13159] ? wait_for_completion+0x440/0x440 [ 580.857322][T13159] getname_flags+0xd6/0x5b0 [ 580.861971][T13159] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 580.868235][T13159] do_symlinkat+0x8b/0x290 [ 580.872673][T13159] ? __ia32_sys_unlink+0x50/0x50 [ 580.877629][T13159] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 580.883104][T13159] ? do_syscall_64+0x26/0x790 [ 580.887796][T13159] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 580.893883][T13159] ? do_syscall_64+0x26/0x790 [ 580.898593][T13159] ? lockdep_hardirqs_on+0x421/0x5e0 [ 580.903927][T13159] __x64_sys_symlink+0x59/0x80 [ 580.908716][T13159] do_syscall_64+0xfa/0x790 [ 580.913265][T13159] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 580.919178][T13159] RIP: 0033:0x45b349 [ 580.923086][T13159] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 580.942703][T13159] RSP: 002b:00007f2284701c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000058 [ 580.951378][T13159] RAX: ffffffffffffffda RBX: 00007f22847026d4 RCX: 000000000045b349 [ 580.959366][T13159] RDX: 0000000000000000 RSI: 00000000200007c0 RDI: 0000000020000800 08:17:49 executing program 0: mkdir(&(0x7f0000000300)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [{}], {}, [], {0x10, 0x2}}, 0x2c, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r3, 0x0) chdir(&(0x7f0000000100)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') 08:17:49 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x16, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000340)}, 0x42) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0xffffffffa0008000, 0xffffffffffffff3e, 0x0, &(0x7f0000000040)="a34747e865af5cf11e34bdff7a7a5ba0051aae5804d5a05d9b9ff68e12bb4d43a20375ea905795449b957e956aa6", 0x0, 0x401, 0x0, 0x0, 0xfffffffffffffff3}, 0x28) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f0000000240)={0x1ff, 0xc, 0x4, 0x0, 0x27e5, {}, {0x4, 0x8, 0x4, 0x8, 0x7, 0x6, "96669900"}, 0x7, 0x0, @fd=r0, 0x9, 0x0, r2}) r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@struct={0x0, 0x0, 0x0, 0x4, 0x0, 0x9}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x1, 0x3f}}]}}, &(0x7f0000000080)=""/236, 0x3e, 0xec, 0x8}, 0x20) ioctl$EVIOCGLED(r3, 0x80404519, &(0x7f0000000580)=""/250) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) dup(0xffffffffffffffff) r5 = dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_CONGESTION(r5, 0x6, 0xd, &(0x7f0000000180)='lp\x00', 0x3) ioctl$VIDIOC_TRY_FMT(r5, 0xc0d05640, &(0x7f0000000400)={0x0, @raw_data="d456e651514154be56c23a0150374fec800b3363d0f8209aea95ae10a4bfe2bc4a059b555ffe32ee49657c21fdaeec9ff08b45f3c5b652502dd578edc616a43da8fa7411c10cf0be3062500d3923e6f93300ce6e6ca32a13179605ca95c9250023e974040392fcffaac49faad6d6549cb1f2e1c7492ba9a8e2d26787e1872027fbe8577edbc559354f305d4e05c26a2f708bb008ca01368edece7ac1108379664aea7622db8fe0f786d6a4177494b3766d3f6f8e4c69729d1cdef558344c8bab4dfc9bfc6bc56bfa"}) ioctl$BLKTRACESTART(r5, 0x1274, 0x0) 08:17:49 executing program 5 (fault-call:3 fault-nth:0): sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x305, &(0x7f0000000000)=ANY=[]}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1000000000000304, 0x400000000100) [ 580.967355][T13159] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 580.975429][T13159] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 580.983443][T13159] R13: 0000000000000b42 R14: 00000000004cc2cf R15: 0000000000000000 08:17:49 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x305, &(0x7f0000000000)=ANY=[]}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1000000000000304, 0x400000000100) [ 581.053219][T13235] BPF:[2] ARRAY (anon) 08:17:49 executing program 0: mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x40) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='system.posix_acl_access\x00', &(0x7f0000000240)=ANY=[@ANYBLOB="0200000001000000000000000000000088bc786a3e93b0c1fd355906d2f36d07b5dcb4a97f264cdd9521f997b03485ac38ee3b5943ff73ee0cce263d7ed9b05fb4bf091a932bba108e35d048df47439e59deede8bce49c05a17997c77bbcc6a6fedf061b9c28aded05db75bb1953ebac819911c5ed2e93918a4164f258ee783945358ddc63a6e5677802e43f", @ANYRES32=0x0, @ANYBLOB="040000000000000010000200000000002000000000000000"], 0x2c, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r3, 0x0) chdir(&(0x7f0000000100)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) fsync(r4) [ 581.082155][T13235] BPF:type_id=5 index_type_id=1 nr_elems=63 [ 581.120492][T13236] FAULT_INJECTION: forcing a failure. [ 581.120492][T13236] name failslab, interval 1, probability 0, space 0, times 0 [ 581.134031][T13235] BPF: [ 581.143225][T13235] BPF:Invalid index [ 581.173747][T13235] BPF: [ 581.173747][T13235] [ 581.189263][T13236] CPU: 0 PID: 13236 Comm: syz-executor.5 Not tainted 5.5.0-rc7-syzkaller #0 [ 581.198104][T13236] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 581.208171][T13236] Call Trace: [ 581.211491][T13236] dump_stack+0x197/0x210 [ 581.215851][T13236] should_fail.cold+0xa/0x15 [ 581.220465][T13236] ? fault_create_debugfs_attr+0x180/0x180 [ 581.226289][T13236] ? ___might_sleep+0x163/0x2c0 [ 581.231823][T13236] __should_failslab+0x121/0x190 [ 581.237214][T13236] should_failslab+0x9/0x14 [ 581.241769][T13236] __kmalloc+0x2e0/0x770 [ 581.246031][T13236] ? rw_copy_check_uvector+0x77/0x390 [ 581.251415][T13236] ? rw_copy_check_uvector+0x31a/0x390 [ 581.257154][T13236] rw_copy_check_uvector+0x31a/0x390 [ 581.262465][T13236] ? __lock_acquire+0x8a0/0x4a00 [ 581.267456][T13236] ? __kasan_check_read+0x11/0x20 08:17:49 executing program 0: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)=ANY=[@ANYBLOB="020000000100d75ef3e8a3c40e3e0000", @ANYRES32=0x0, @ANYBLOB="040000000000008010000200000000002000008c5f000000"], 0x2c, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r3, 0x0) chdir(&(0x7f0000000100)='./file0\x00') 08:17:49 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x305, &(0x7f0000000000)=ANY=[]}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1000000000000304, 0x400000000100) [ 581.272510][T13236] ? mark_lock+0xc2/0x1220 [ 581.277034][T13236] import_iovec+0xc9/0x410 [ 581.281474][T13236] ? dup_iter+0x260/0x260 [ 581.285820][T13236] ? __fget+0x35d/0x550 [ 581.290004][T13236] vfs_readv+0xc6/0x160 [ 581.294183][T13236] ? compat_rw_copy_check_uvector+0x4c0/0x4c0 [ 581.300267][T13236] ? __kasan_check_read+0x11/0x20 [ 581.305313][T13236] ? __fget+0x37f/0x550 [ 581.309496][T13236] ? ksys_dup3+0x3e0/0x3e0 [ 581.313975][T13236] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 581.320342][T13236] ? debug_smp_processor_id+0x33/0x18a [ 581.325822][T13236] ? __fget_light+0x1a9/0x230 [ 581.330522][T13236] do_preadv+0x1c4/0x280 [ 581.334784][T13236] ? do_readv+0x330/0x330 [ 581.339126][T13236] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 581.344607][T13236] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 581.350085][T13236] ? do_syscall_64+0x26/0x790 [ 581.354896][T13236] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 581.361239][T13236] ? do_syscall_64+0x26/0x790 [ 581.365940][T13236] __x64_sys_preadv+0x9a/0xf0 [ 581.370637][T13236] do_syscall_64+0xfa/0x790 [ 581.375275][T13236] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 581.381306][T13236] RIP: 0033:0x45b349 [ 581.385219][T13236] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 581.404962][T13236] RSP: 002b:00007fbac52e4c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 581.414083][T13236] RAX: ffffffffffffffda RBX: 00007fbac52e56d4 RCX: 000000000045b349 08:17:50 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x305, &(0x7f0000000000)=ANY=[]}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1000000000000304, 0x400000000100) 08:17:50 executing program 0: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [{}], {}, [], {0x10, 0x2}}, 0x2c, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r5, 0x84, 0x76, &(0x7f0000000040)={0x0, 0x4}, &(0x7f0000000180)=0x8) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000200)={r6, @in6={{0xa, 0x4e21, 0xc0d, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0xfb1}}, 0x5, 0x4, 0x0, 0x4, 0xb0, 0xffff}, 0x9c) chown(&(0x7f00000001c0)='./file0\x00', r3, 0x0) r7 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x38100, 0x0) ioctl$TUNGETDEVNETNS(r7, 0x54e3, 0x0) chdir(&(0x7f0000000100)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') [ 581.422078][T13236] RDX: 1000000000000304 RSI: 00000000200017c0 RDI: 0000000000000003 [ 581.430066][T13236] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 581.438176][T13236] R10: 0000400000000100 R11: 0000000000000246 R12: 0000000000000005 [ 581.446165][T13236] R13: 000000000000082c R14: 00000000004c9a3e R15: 0000000000000000 08:17:50 executing program 4 (fault-call:9 fault-nth:1): mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [{}], {}, [], {0x10, 0x2}}, 0x2c, 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r3, 0x0) chdir(&(0x7f0000000100)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') 08:17:50 executing program 5 (fault-call:3 fault-nth:1): sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x305, &(0x7f0000000000)=ANY=[]}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1000000000000304, 0x400000000100) [ 581.719354][T13368] FAULT_INJECTION: forcing a failure. [ 581.719354][T13368] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 581.732637][T13368] CPU: 1 PID: 13368 Comm: syz-executor.4 Not tainted 5.5.0-rc7-syzkaller #0 [ 581.741518][T13368] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 581.751678][T13368] Call Trace: [ 581.754997][T13368] dump_stack+0x197/0x210 [ 581.759544][T13368] should_fail.cold+0xa/0x15 [ 581.764170][T13368] ? fault_create_debugfs_attr+0x180/0x180 [ 581.769979][T13368] ? __kasan_check_read+0x11/0x20 [ 581.775032][T13368] ? __lock_acquire+0x16f2/0x4a00 [ 581.780211][T13368] ? get_pid_task+0x11d/0x210 [ 581.784932][T13368] should_fail_alloc_page+0x50/0x60 [ 581.790843][T13368] __alloc_pages_nodemask+0x1a1/0x910 [ 581.796329][T13368] ? fs_reclaim_release+0xf/0x30 [ 581.801297][T13368] ? __alloc_pages_slowpath+0x2900/0x2900 [ 581.807040][T13368] ? fs_reclaim_release+0xf/0x30 [ 581.812110][T13368] ? fault_create_debugfs_attr+0x180/0x180 [ 581.817932][T13368] cache_grow_begin+0x90/0xc60 [ 581.822826][T13368] ? getname_flags+0xd6/0x5b0 [ 581.827517][T13368] ? trace_hardirqs_off+0x62/0x240 [ 581.832653][T13368] kmem_cache_alloc+0x64e/0x710 [ 581.837525][T13368] ? wait_for_completion+0x440/0x440 [ 581.842838][T13368] getname_flags+0xd6/0x5b0 [ 581.847360][T13368] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 581.853622][T13368] do_symlinkat+0x8b/0x290 [ 581.858060][T13368] ? __ia32_sys_unlink+0x50/0x50 [ 581.862985][T13368] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 581.868494][T13368] ? do_syscall_64+0x26/0x790 [ 581.873180][T13368] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 581.879255][T13368] ? do_syscall_64+0x26/0x790 [ 581.883946][T13368] ? lockdep_hardirqs_on+0x421/0x5e0 [ 581.885501][T13367] FAULT_INJECTION: forcing a failure. [ 581.885501][T13367] name failslab, interval 1, probability 0, space 0, times 0 [ 581.889247][T13368] __x64_sys_symlink+0x59/0x80 [ 581.889266][T13368] do_syscall_64+0xfa/0x790 [ 581.889289][T13368] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 581.889313][T13368] RIP: 0033:0x45b349 [ 581.889328][T13368] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 581.889335][T13368] RSP: 002b:00007f2284701c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000058 [ 581.949594][T13368] RAX: ffffffffffffffda RBX: 00007f22847026d4 RCX: 000000000045b349 [ 581.957596][T13368] RDX: 0000000000000000 RSI: 00000000200007c0 RDI: 0000000020000800 [ 581.965703][T13368] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 581.973815][T13368] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 581.982073][T13368] R13: 0000000000000b42 R14: 00000000004cc2cf R15: 0000000000000001 [ 581.990458][T13367] CPU: 0 PID: 13367 Comm: syz-executor.5 Not tainted 5.5.0-rc7-syzkaller #0 [ 581.999169][T13367] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 582.009270][T13367] Call Trace: [ 582.012584][T13367] dump_stack+0x197/0x210 [ 582.016914][T13367] should_fail.cold+0xa/0x15 [ 582.021516][T13367] ? fault_create_debugfs_attr+0x180/0x180 [ 582.027342][T13367] ? ___might_sleep+0x163/0x2c0 [ 582.032209][T13367] __should_failslab+0x121/0x190 [ 582.037153][T13367] should_failslab+0x9/0x14 [ 582.041649][T13367] kmem_cache_alloc_node_trace+0x274/0x750 [ 582.047471][T13367] __kmalloc_node+0x3d/0x70 [ 582.052042][T13367] kvmalloc_node+0x68/0x100 [ 582.056549][T13367] traverse+0x3e9/0x730 [ 582.060753][T13367] ? seq_open_private+0x50/0x50 [ 582.065608][T13367] seq_read+0x906/0x1170 [ 582.069854][T13367] ? seq_open_private+0x50/0x50 [ 582.074719][T13367] ? seq_open_private+0x50/0x50 [ 582.079630][T13367] proc_reg_read+0x1fc/0x2c0 [ 582.084225][T13367] ? proc_reg_compat_ioctl+0x2a0/0x2a0 [ 582.089809][T13367] ? rw_verify_area+0x126/0x360 [ 582.094681][T13367] do_iter_read+0x4a4/0x660 [ 582.099191][T13367] ? dup_iter+0x260/0x260 [ 582.103539][T13367] vfs_readv+0xf0/0x160 [ 582.107707][T13367] ? compat_rw_copy_check_uvector+0x4c0/0x4c0 [ 582.113785][T13367] ? __kasan_check_read+0x11/0x20 [ 582.118847][T13367] ? ksys_dup3+0x3e0/0x3e0 [ 582.123369][T13367] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 582.129728][T13367] ? debug_smp_processor_id+0x33/0x18a [ 582.135189][T13367] ? __fget_light+0x1a9/0x230 [ 582.139888][T13367] do_preadv+0x1c4/0x280 [ 582.144127][T13367] ? do_readv+0x330/0x330 [ 582.148496][T13367] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 582.153954][T13367] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 582.159417][T13367] ? do_syscall_64+0x26/0x790 [ 582.164098][T13367] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 582.170165][T13367] ? do_syscall_64+0x26/0x790 [ 582.174849][T13367] __x64_sys_preadv+0x9a/0xf0 [ 582.179522][T13367] do_syscall_64+0xfa/0x790 [ 582.184025][T13367] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 582.189920][T13367] RIP: 0033:0x45b349 [ 582.193806][T13367] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 582.213524][T13367] RSP: 002b:00007fbac52e4c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 582.221940][T13367] RAX: ffffffffffffffda RBX: 00007fbac52e56d4 RCX: 000000000045b349 [ 582.230018][T13367] RDX: 1000000000000304 RSI: 00000000200017c0 RDI: 0000000000000003 [ 582.238115][T13367] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 582.246102][T13367] R10: 0000400000000100 R11: 0000000000000246 R12: 0000000000000005 [ 582.254085][T13367] R13: 000000000000082c R14: 00000000004c9a3e R15: 0000000000000001 08:17:50 executing program 1: r0 = socket$inet(0x2, 0x3, 0x2) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000240)='/dev/md0\x00', 0x0, 0x0) ioctl$void(r0, 0x5451) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) mkdir(&(0x7f00000005c0)='./file0\x00', 0x100000000020) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x7f, 0x4, 0x0, 0x0, 0x9, 0xfc, 0x0, 0x9d7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0x7) lstat(&(0x7f00000002c0)='./file1\x00', &(0x7f0000000340)) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x591800, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/nullb0\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/consoles\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r4, 0x84, 0x18, 0x0, 0x0) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, 0x0) r5 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000180)=ANY=[], &(0x7f0000000140)) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}}, 0x98) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000040)={0x0, 0x3a8e}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f0000000600)={r6, 0x6, 0x140a09e5, 0x3, 0x9961, 0x3}, &(0x7f0000000540)=0x14) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r3, 0x84, 0x19, &(0x7f0000000580)={r7, 0x100}, 0xffffffffffffffe9) ioctl$DRM_IOCTL_GET_SAREA_CTX(r3, 0xc010641d, &(0x7f0000000300)={0x0, &(0x7f0000000480)=""/112}) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm-monitor\x00', 0x200000, 0x0) r8 = dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_CONGESTION(r8, 0x6, 0xd, &(0x7f0000000180)='lp\x00', 0x3) ioctl$VIDIOC_TRY_FMT(r8, 0xc0d05640, &(0x7f0000000400)={0xa, @raw_data="d456e651514154be56c23a0150374fec800b3363d0f8209aea95ae10a4bfe2bc4a059b555ffe32ee49657c21fdaeec9ff08b45f3c5b652502dd578edc616a43da8fa7411c10cf0be3062500d3923e6f93300ce6e6ca32a13179605ca95c9250023e974040392fcffaac49faad6d6549cb1f2e1c7492ba9a8e2d26787e1872027fbe8577edbc559354f305d4e05c26a2f708bb008ca01368edece7ac1108379664aea7622db8fe0f786d6a4177494b3766d3f6f8e4c69729d1cdef558344c8bab4dfc9bfc6bc56bfa"}) ioctl$GIO_UNIMAP(r8, 0x4b66, &(0x7f0000000840)={0x2, &(0x7f0000000280)=[{}, {}]}) clock_gettime(0x0, &(0x7f0000000a40)={0x0, 0x0}) select(0x40, &(0x7f0000000200)={0x4, 0x7, 0x3ff, 0x3, 0xffffffffffffffe1, 0x6, 0x4b4, 0x80000001}, &(0x7f00000009c0)={0x4ebe, 0x5, 0x1, 0x7, 0x1, 0x8, 0x7, 0x100}, &(0x7f0000000a00)={0x0, 0xffffffff, 0x80000001, 0x1f, 0xfffffffffffffffd, 0x1, 0x8, 0x8000}, &(0x7f0000000a80)={r9, r10/1000+10000}) ioprio_set$pid(0x7, 0x0, 0x9) ioctl$BLKPG(r1, 0x932, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0x7fff) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r11 = request_key(&(0x7f0000000740)='encrypted\x00', &(0x7f0000000b00)={'syz', 0x2}, &(0x7f0000000b40)='./cgroup\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000680)='asymmetric\x00', &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, r11) request_key(&(0x7f00000004c0)='pkcs7_test\x00', &(0x7f0000000500)={'syz', 0x1}, &(0x7f0000000540)='wlan0\x00', 0x0) 08:17:50 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x16, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffff1971a4f0ff00000000b7060000000000811e6403000000000045040400010000001704000001000a00b7040000000100006a0af2fe00000000850000001a000000b70000000000000095000000000000009e17890efaee5eab7ff8a8cdc21ce784909b849d5550ad855dab54d8877a6db61d69f2ffcaa10350e11cb97c8adf1bc9a0c4ee6d9674c77404ceb9971e43405d621ffbc9a4fd39b0b56bfe6508ebb3c44eb84049761451ce540c772e2d9f8004e26f7fcc059c062234d5595f6fba87b81d1106fb0289ce67a66afd9ac3d09e29a9d542ca9d85a5c9c88474895d679838def0a83a733dc6a39b63a5ed69d32394c53361d7480884bd8048a967d9b912ef9f1d6fee41f5b29d37acb91c61ccd1df673896450f859ce8122a79c3e4"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000340)}, 0x42) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0xffffffffa0008000, 0xffffffffffffff3e, 0x0, &(0x7f0000000040)="a34747e865af5cf11e34bdff7a7a5ba0051aae5804d5a05d9b9ff68e12bb4d43a20375ea905795449b957e956aa6", 0x0, 0x401, 0x0, 0x0, 0xfffffffffffffff3}, 0x28) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f0000000240)={0x1ff, 0xc, 0x4, 0x0, 0x27e5, {}, {0x4, 0x8, 0x4, 0x8, 0x7, 0x6, "96669900"}, 0x7, 0x0, @fd=r0, 0x9, 0x0, r2}) r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@struct={0x0, 0x0, 0x0, 0x4, 0x0, 0x9}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x1, 0x3f}}]}}, &(0x7f0000000080)=""/236, 0x3e, 0xec, 0x8}, 0x20) ioctl$EVIOCGLED(r3, 0x80404519, &(0x7f0000000580)=""/250) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) dup(0xffffffffffffffff) r5 = dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_CONGESTION(r5, 0x6, 0xd, &(0x7f0000000180)='lp\x00', 0x3) ioctl$VIDIOC_TRY_FMT(r5, 0xc0d05640, &(0x7f0000000400)={0x0, @raw_data="d456e651514154be56c23a0150374fec800b3363d0f8209aea95ae10a4bfe2bc4a059b555ffe32ee49657c21fdaeec9ff08b45f3c5b652502dd578edc616a43da8fa7411c10cf0be3062500d3923e6f93300ce6e6ca32a13179605ca95c9250023e974040392fcffaac49faad6d6549cb1f2e1c7492ba9a8e2d26787e1872027fbe8577edbc559354f305d4e05c26a2f708bb008ca01368edece7ac1108379664aea7622db8fe0f786d6a4177494b3766d3f6f8e4c69729d1cdef558344c8bab4dfc9bfc6bc56bfa"}) ioctl$BLKTRACESTART(r5, 0x1274, 0x0) 08:17:50 executing program 0: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [{}], {}, [], {0x10, 0x2}}, 0x2c, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) futimesat(r1, &(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000040)={{0x0, 0x2710}}) chown(&(0x7f00000001c0)='./file0\x00', r3, 0x0) chdir(&(0x7f0000000100)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') 08:17:50 executing program 5 (fault-call:3 fault-nth:2): sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x305, &(0x7f0000000000)=ANY=[]}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1000000000000304, 0x400000000100) 08:17:50 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x305, &(0x7f0000000000)=ANY=[]}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1000000000000304, 0x400000000100) 08:17:50 executing program 4 (fault-call:9 fault-nth:2): mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [{}], {}, [], {0x10, 0x2}}, 0x2c, 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r3, 0x0) chdir(&(0x7f0000000100)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') [ 582.421136][T13379] FAULT_INJECTION: forcing a failure. [ 582.421136][T13379] name failslab, interval 1, probability 0, space 0, times 0 [ 582.464652][T13379] CPU: 1 PID: 13379 Comm: syz-executor.4 Not tainted 5.5.0-rc7-syzkaller #0 [ 582.473499][T13379] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 582.483561][T13379] Call Trace: [ 582.486873][T13379] dump_stack+0x197/0x210 [ 582.491205][T13379] should_fail.cold+0xa/0x15 [ 582.495802][T13379] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 582.502060][T13379] ? fault_create_debugfs_attr+0x180/0x180 [ 582.508053][T13379] ? ___might_sleep+0x163/0x2c0 [ 582.512919][T13379] __should_failslab+0x121/0x190 [ 582.517877][T13379] should_failslab+0x9/0x14 [ 582.522414][T13379] kmem_cache_alloc+0x2aa/0x710 [ 582.527276][T13379] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 582.533511][T13379] ? strncpy_from_user+0x2b4/0x400 [ 582.538663][T13379] getname_flags+0xd6/0x5b0 [ 582.543305][T13379] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 582.549552][T13379] do_symlinkat+0xe1/0x290 [ 582.553979][T13379] ? __ia32_sys_unlink+0x50/0x50 [ 582.558911][T13379] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 582.564508][T13379] ? do_syscall_64+0x26/0x790 [ 582.569203][T13379] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 582.575270][T13379] ? do_syscall_64+0x26/0x790 [ 582.579953][T13379] ? lockdep_hardirqs_on+0x421/0x5e0 [ 582.585244][T13379] __x64_sys_symlink+0x59/0x80 [ 582.590022][T13379] do_syscall_64+0xfa/0x790 [ 582.594670][T13379] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 582.600567][T13379] RIP: 0033:0x45b349 [ 582.604458][T13379] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 582.624182][T13379] RSP: 002b:00007f2284701c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000058 [ 582.632841][T13379] RAX: ffffffffffffffda RBX: 00007f22847026d4 RCX: 000000000045b349 [ 582.640817][T13379] RDX: 0000000000000000 RSI: 00000000200007c0 RDI: 0000000020000800 [ 582.648782][T13379] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 582.656822][T13379] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 582.664793][T13379] R13: 0000000000000b42 R14: 00000000004cc2cf R15: 0000000000000002 08:17:51 executing program 1: r0 = socket$inet(0x2, 0x3, 0x2) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000240)='/dev/md0\x00', 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) ioctl$void(r0, 0x5451) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) mkdir(&(0x7f00000005c0)='./file0\x00', 0x100000000020) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x7) lstat(&(0x7f00000003c0)='./file1\x00', &(0x7f0000000340)) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x591800, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/nullb0\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, 0x0) r4 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000180)=ANY=[], &(0x7f0000000140)) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}}, 0x98) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000040)={0x0, 0x3a8e}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f0000000600)={r5, 0x6, 0x140a09e5, 0x3, 0x9961, 0x3}, &(0x7f0000000540)=0x14) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r3, 0x84, 0x19, &(0x7f0000000580)={r6, 0x100}, 0xffffffffffffffe9) ioctl$DRM_IOCTL_GET_SAREA_CTX(r3, 0xc010641d, &(0x7f0000000300)={0x0, &(0x7f0000000480)=""/112}) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm-monitor\x00', 0x200000, 0x0) r7 = dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_CONGESTION(r7, 0x6, 0xd, &(0x7f0000000180)='lp\x00', 0x3) ioctl$VIDIOC_TRY_FMT(r7, 0xc0d05640, &(0x7f0000000400)={0xa, @raw_data="d456e651514154be56c23a0150374fec800b3363d0f8209aea95ae10a4bfe2bc4a059b555ffe32ee49657c21fdaeec9ff08b45f3c5b652502dd578edc616a43da8fa7411c10cf0be3062500d3923e6f93300ce6e6ca32a13179605ca95c9250023e974040392fcffaac49faad6d6549cb1f2e1c7492ba9a8e2d26787e1872027fbe8577edbc559354f305d4e05c26a2f708bb008ca01368edece7ac1108379664aea7622db8fe0f786d6a4177494b3766d3f6f8e4c69729d1cdef558344c8bab4dfc9bfc6bc56bfa"}) ioctl$GIO_UNIMAP(r7, 0x4b66, &(0x7f0000000840)={0x2, &(0x7f0000000280)=[{}, {}]}) clock_gettime(0x0, &(0x7f0000000a40)={0x0, 0x0}) select(0x40, &(0x7f0000000200)={0x4, 0x7, 0x3ff, 0x3, 0xffffffffffffffe1, 0x6, 0x4b4, 0x80000001}, &(0x7f00000009c0)={0x44ebe, 0x5, 0x1, 0x7, 0x1, 0x8, 0x7, 0x100}, &(0x7f0000000a00)={0x0, 0xffffffff, 0x80000001, 0x1f, 0xfffffffffffffffd, 0x5, 0x8, 0x8000}, &(0x7f0000000a80)={r8, r9/1000+10000}) ioprio_set$pid(0x7, 0x0, 0x9) ioctl$BLKPG(r1, 0x932, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0x7fff) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r10 = request_key(&(0x7f0000000740)='encrypted\x00', &(0x7f0000000b00)={'syz', 0x2}, &(0x7f0000000b40)='./cgroup\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000680)='asymmetric\x00', &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, r10) request_key(&(0x7f00000004c0)='pkcs7_test\x00', &(0x7f0000000500)={'syz', 0x1}, &(0x7f0000000540)='wlan0\x00', 0x0) [ 582.756121][T13382] BPF:[2] ARRAY (anon) [ 582.760341][T13382] BPF:type_id=5 index_type_id=1 nr_elems=63 [ 582.791569][T13382] BPF: [ 582.801718][T13382] BPF:Invalid index [ 582.845489][T13382] BPF: [ 582.845489][T13382] 08:17:51 executing program 0: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [{}], {}, [], {0x10, 0x2}, {0x20, 0x2}}, 0x2c, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) r4 = getpid() sched_setscheduler(r4, 0x5, &(0x7f0000000380)) sched_setparam(r4, &(0x7f0000000000)=0x9) chown(&(0x7f00000001c0)='./file0\x00', r3, 0x0) chdir(&(0x7f0000000100)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') 08:17:51 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x305, &(0x7f0000000000)=ANY=[]}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1000000000000304, 0x400000000100) 08:17:51 executing program 4 (fault-call:9 fault-nth:3): mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [{}], {}, [], {0x10, 0x2}}, 0x2c, 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r3, 0x0) chdir(&(0x7f0000000100)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') 08:17:51 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x16, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000340)}, 0x42) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0xffffffffa0008000, 0xffffffffffffff3e, 0x0, &(0x7f0000000040)="a34747e865af5cf11e34bdff7a7a5ba0051aae5804d5a05d9b9ff68e12bb4d43a20375ea905795449b957e956aa6", 0x0, 0x401, 0x0, 0x0, 0xfffffffffffffff3}, 0x28) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f0000000240)={0x1ff, 0xc, 0x4, 0x0, 0x27e5, {}, {0x4, 0x8, 0x4, 0x8, 0x7, 0x6, "96669900"}, 0x7, 0x0, @fd=r0, 0x9, 0x0, r2}) r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@struct={0x0, 0x0, 0x0, 0x4, 0x0, 0x9}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x1, 0x3f}}]}}, &(0x7f0000000080)=""/236, 0x3e, 0xec, 0x8}, 0x20) ioctl$EVIOCGLED(r3, 0x80404519, &(0x7f0000000580)=""/250) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) dup(0xffffffffffffffff) r5 = dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_CONGESTION(r5, 0x6, 0xd, &(0x7f0000000180)='lp\x00', 0x3) ioctl$VIDIOC_TRY_FMT(r5, 0xc0d05640, &(0x7f0000000400)={0xa, @raw_data="d456e651514154be56c23a0150374fec800b3363d0f8209aea95ae10a4bfe2bc4a059b555ffe32ee49657c21fdaeec9ff08b45f3c5b652502dd578edc616a43da8fa7411c10cf0be3062500d3923e6f93300ce6e6ca32a13179605ca95c9250023e974040392fcffaac49faad6d6549cb1f2e1c7492ba9a8e2d26787e1872027fbe8577edbc559354f305d4e05c26a2f708bb008ca01368edece7ac1108379664aea7622db8fe0f786d6a4177494b3766d3f6f8e4c69729d1cdef558344c8bab4dfc9bfc6bc56bfa"}) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) 08:17:51 executing program 1: r0 = socket$inet(0x2, 0x3, 0x2) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000240)='/dev/md0\x00', 0x0, 0x0) ioctl$void(r0, 0x5451) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) mkdir(&(0x7f00000005c0)='./file0\x00', 0x100000000020) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x7f, 0x4, 0x0, 0x0, 0x9, 0xfc, 0x0, 0x9d7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0x7) lstat(&(0x7f00000002c0)='./file1\x00', &(0x7f0000000340)) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x591800, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/nullb0\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, 0x0) r4 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000180)=ANY=[], &(0x7f0000000140)) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}}, 0x98) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000040)={0x0, 0x3a8e}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f0000000600)={r5, 0x6, 0x140a09e5, 0x3, 0x9961, 0x3}, &(0x7f0000000540)=0x14) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r3, 0x84, 0x19, &(0x7f0000000580)={r6, 0x100}, 0xffffffffffffffe9) ioctl$DRM_IOCTL_GET_SAREA_CTX(r3, 0xc010641d, &(0x7f0000000300)={0x0, &(0x7f0000000480)=""/112}) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm-monitor\x00', 0x200000, 0x0) r7 = dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_CONGESTION(r7, 0x6, 0xd, &(0x7f0000000180)='lp\x00', 0x3) ioctl$VIDIOC_TRY_FMT(r7, 0xc0d05640, &(0x7f0000000400)={0xa, @raw_data="d456e651514154be56c23a0150374fec800b3363d0f8209aea95ae10a4bfe2bc4a059b555ffe32ee49657c21fdaeec9ff08b45f3c5b652502dd578edc616a43da8fa7411c10cf0be3062500d3923e6f93300ce6e6ca32a13179605ca95c9250023e974040392fcffaac49faad6d6549cb1f2e1c7492ba9a8e2d26787e1872027fbe8577edbc559354f305d4e05c26a2f708bb008ca01368edece7ac1108379664aea7622db8fe0f786d6a4177494b3766d3f6f8e4c69729d1cdef558344c8bab4dfc9bfc6bc56bfa"}) ioctl$GIO_UNIMAP(r7, 0x4b66, &(0x7f0000000840)={0x2, &(0x7f0000000280)=[{}, {}]}) clock_gettime(0x0, &(0x7f0000000a40)={0x0, 0x0}) select(0x40, &(0x7f0000000200)={0x4, 0x7, 0x3ff, 0x3, 0xffffffffffffffe1, 0x6, 0x9, 0x80000001}, &(0x7f00000009c0)={0x4ebe, 0x5, 0x1, 0x7, 0x1, 0x8, 0x7, 0x100}, &(0x7f0000000a00)={0x0, 0xffffffff, 0x80000001, 0x1f, 0xfffffffffffffffd, 0x1, 0x8, 0x8000}, &(0x7f0000000a80)={r8, r9/1000+10000}) ioprio_set$pid(0x7, 0x0, 0x9) ioctl$BLKPG(r1, 0x932, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0x7fff) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r10 = request_key(&(0x7f0000000740)='encrypted\x00', &(0x7f0000000b00)={'syz', 0x2}, &(0x7f0000000b40)='./cgroup\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000680)='asymmetric\x00', &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, r10) request_key(&(0x7f00000004c0)='pkcs7_test\x00', &(0x7f0000000500)={'syz', 0x1}, &(0x7f0000000540)='wlan0\x00', 0x0) 08:17:51 executing program 0: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [{}], {}, [], {0x10, 0x2}}, 0x2c, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) setsockopt(r1, 0x9, 0x84ef, &(0x7f0000000200)="783a089c5deebda16a6d47cfb660f0e73a66dde32524dc9952653e680aae17981e0bb9c905c529e09055a835a44b80e1aadbd61b7e1fa17e716221f7ceabd34efcdbe1a8b802d85ff99a721fb1fb762646b61303d79921ad47e8c3d1c1ed7c90fa54cd85a90cae50151cd8e65b080cdf30ecf071bbc0c21f4cf9aab4adf813a62b41b199358969cb70af0ada649646e5376d1b1a43b6581fe905c7ccf6f3d8f35b0731ee5f959adfdb059572847c1165c541f57f970b9a25477c2cb6fe8d1a614046", 0xc2) r2 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r4, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r5, 0x8982, &(0x7f0000000000)={0x7, 'batadv_slave_0\x00', {0x5}, 0x4}) chdir(&(0x7f0000000100)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') 08:17:51 executing program 5: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x305, &(0x7f0000000000)=ANY=[]}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1000000000000304, 0x400000000100) [ 583.305351][T13513] BPF:[2] ARRAY (anon) [ 583.324772][T13513] BPF:type_id=5 index_type_id=1 nr_elems=63 [ 583.350431][T13513] BPF: [ 583.372678][T13513] BPF:Invalid index [ 583.382220][T13519] FAULT_INJECTION: forcing a failure. [ 583.382220][T13519] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 583.394189][T13513] BPF: [ 583.394189][T13513] [ 583.395545][T13519] CPU: 0 PID: 13519 Comm: syz-executor.4 Not tainted 5.5.0-rc7-syzkaller #0 [ 583.395554][T13519] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 583.395559][T13519] Call Trace: [ 583.395583][T13519] dump_stack+0x197/0x210 [ 583.395608][T13519] should_fail.cold+0xa/0x15 [ 583.395629][T13519] ? fault_create_debugfs_attr+0x180/0x180 [ 583.438126][T13519] ? __kasan_check_read+0x11/0x20 [ 583.443169][T13519] ? __lock_acquire+0x16f2/0x4a00 [ 583.448225][T13519] should_fail_alloc_page+0x50/0x60 [ 583.453447][T13519] __alloc_pages_nodemask+0x1a1/0x910 [ 583.458840][T13519] ? fs_reclaim_release+0xf/0x30 [ 583.463812][T13519] ? __alloc_pages_slowpath+0x2900/0x2900 [ 583.469555][T13519] ? fs_reclaim_release+0xf/0x30 [ 583.474523][T13519] ? fault_create_debugfs_attr+0x180/0x180 [ 583.480350][T13519] cache_grow_begin+0x90/0xc60 [ 583.485134][T13519] ? getname_flags+0xd6/0x5b0 [ 583.489830][T13519] ? trace_hardirqs_off+0x62/0x240 [ 583.494958][T13519] kmem_cache_alloc+0x64e/0x710 [ 583.499844][T13519] getname_flags+0xd6/0x5b0 [ 583.504364][T13519] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 583.510625][T13519] do_symlinkat+0xe1/0x290 [ 583.515063][T13519] ? __ia32_sys_unlink+0x50/0x50 08:17:52 executing program 1: r0 = socket$inet(0x2, 0x3, 0x2) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000240)='/dev/md0\x00', 0x0, 0x0) ioctl$void(r0, 0x5451) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) mkdir(&(0x7f00000005c0)='./file0\x00', 0x100000000020) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x7f, 0x4, 0x0, 0x0, 0x9, 0xfc, 0x0, 0x9d7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0x7) lstat(&(0x7f00000002c0)='./file1\x00', &(0x7f00000006c0)) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x591800, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/nullb0\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000180)=ANY=[], &(0x7f0000000140)) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}}, 0x9c) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000040)={0x0, 0x3a8e}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f0000000600)={r5, 0x6, 0x140a09e5, 0x3, 0x9961, 0x3}, &(0x7f0000000540)=0x14) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r3, 0x84, 0x19, &(0x7f0000000580)={r6, 0x100}, 0xffffffffffffffe9) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm-monitor\x00', 0x200000, 0x0) r7 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) r8 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r8, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r8, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r9 = dup(r8) setsockopt$inet_tcp_TCP_CONGESTION(r9, 0x6, 0xd, &(0x7f0000000180)='lp\x00', 0x3) ioctl$VIDIOC_TRY_FMT(r9, 0xc0d05640, &(0x7f0000000400)={0xa, @raw_data="d456e651514154be56c23a0150374fec800b3363d0f8209aea95ae10a4bfe2bc4a059b555ffe32ee49657c21fdaeec9ff08b45f3c5b652502dd578edc616a43da8fa7411c10cf0be3062500d3923e6f93300ce6e6ca32a13179605ca95c9250023e974040392fcffaac49faad6d6549cb1f2e1c7492ba9a8e2d26787e1872027fbe8577edbc559354f305d4e05c26a2f708bb008ca01368edece7ac1108379664aea7622db8fe0f786d6a4177494b3766d3f6f8e4c69729d1cdef558344c8bab4dfc9bfc6bc56bfa"}) ioctl$GIO_UNIMAP(r9, 0x4b66, &(0x7f0000000840)={0x2, &(0x7f0000000280)=[{}, {}]}) clock_gettime(0x0, &(0x7f0000000a40)={0x0, 0x0}) select(0x40, &(0x7f0000000200)={0x4, 0x7, 0x3ff, 0x3, 0xffffffffffffffe1, 0x6, 0x4b4, 0x80000001}, &(0x7f00000009c0)={0x4ebe, 0x5, 0x1, 0x7, 0x1, 0x8, 0x7, 0x100}, &(0x7f0000000a00)={0x0, 0xffffffff, 0x80000001, 0x1f, 0xfffffffffffffffd, 0x1, 0x8, 0x8000}, &(0x7f0000000a80)={r10, r11/1000+10000}) ioprio_set$pid(0x7, 0x0, 0x9) ioctl$BLKPG(r1, 0x932, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0x7fff) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r12 = request_key(&(0x7f0000000740)='encrypted\x00', &(0x7f0000000b00)={'syz', 0x2}, &(0x7f0000000b40)='./cgroup\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000680)='asymmetric\x00', &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, r12) request_key(&(0x7f00000004c0)='pkcs7_test\x00', &(0x7f0000000500)={'syz', 0x1}, &(0x7f0000000540)='wlan0\x00', 0x0) 08:17:52 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x16, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000340)}, 0x42) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0xffffffffa0008000, 0xffffffffffffff3e, 0x0, &(0x7f0000000040)="a34747e865af5cf11e34bdff7a7a5ba0051aae5804d5a05d9b9ff68e12bb4d43a20375ea905795449b957e956aa6", 0x0, 0x401, 0x0, 0x0, 0xfffffffffffffff3}, 0x28) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f0000000240)={0x1ff, 0xc, 0x4, 0x0, 0x27e5, {}, {0x4, 0x8, 0x4, 0x8, 0x7, 0x6, "96669900"}, 0x7, 0x0, @fd=r0, 0x9, 0x0, r2}) r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@struct={0x0, 0x0, 0x0, 0x4, 0x0, 0x9}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x1, 0x3f}}]}}, &(0x7f0000000080)=""/236, 0x3e, 0xec, 0x8}, 0x20) ioctl$EVIOCGLED(r3, 0x80404519, &(0x7f0000000580)=""/250) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) dup(0xffffffffffffffff) r5 = dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_CONGESTION(r5, 0x6, 0xd, &(0x7f0000000180)='lp\x00', 0x3) ioctl$VIDIOC_TRY_FMT(r5, 0xc0d05640, &(0x7f0000000400)={0xa, @raw_data="d456e651514154be56c23a0150374fec800b3363d0f8209aea95ae10a4bfe2bc4a059b555ffe32ee49657c21fdaeec9ff08b45f3c5b652502dd578edc616a43da8fa7411c10cf0be3062500d3923e6f93300ce6e6ca32a13179605ca95c9250023e974040392fcffaac49faad6d6549cb1f2e1c7492ba9a8e2d26787e1872027fbe8577edbc559354f305d4e05c26a2f708bb008ca01368edece7ac1108379664aea7622db8fe0f786d6a4177494b3766d3f6f8e4c69729d1cdef558344c8bab4dfc9bfc6bc56bfa"}) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) [ 583.520022][T13519] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 583.525501][T13519] ? do_syscall_64+0x26/0x790 [ 583.530282][T13519] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 583.536363][T13519] ? do_syscall_64+0x26/0x790 [ 583.541057][T13519] ? lockdep_hardirqs_on+0x421/0x5e0 [ 583.546361][T13519] __x64_sys_symlink+0x59/0x80 [ 583.551149][T13519] do_syscall_64+0xfa/0x790 [ 583.555678][T13519] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 583.561578][T13519] RIP: 0033:0x45b349 [ 583.566338][T13519] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 583.586051][T13519] RSP: 002b:00007f22846e0c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000058 [ 583.594472][T13519] RAX: ffffffffffffffda RBX: 00007f22846e16d4 RCX: 000000000045b349 [ 583.602447][T13519] RDX: 0000000000000000 RSI: 00000000200007c0 RDI: 0000000020000800 [ 583.610421][T13519] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 08:17:52 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x305, &(0x7f0000000000)=ANY=[]}, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x1000000000000304, 0x400000000100) [ 583.618398][T13519] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 583.626372][T13519] R13: 0000000000000b42 R14: 00000000004cc2cf R15: 0000000000000003 08:17:52 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x305, &(0x7f0000000000)=ANY=[]}, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x1000000000000304, 0x400000000100) 08:17:52 executing program 1: r0 = socket$inet(0x2, 0x3, 0x2) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000240)='/dev/md0\x00', 0x0, 0x0) ioctl$void(r0, 0x5451) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) mkdir(&(0x7f00000005c0)='./file0\x00', 0x100000000020) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x7f, 0x4, 0x0, 0x0, 0x9, 0xfc, 0x0, 0x9d7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0x7) lstat(&(0x7f00000002c0)='./file1\x00', &(0x7f0000000340)) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x591800, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/nullb0\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, 0x0) r4 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000180)=ANY=[], &(0x7f0000000140)) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}}, 0x98) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000040)={0x0, 0x3a8e}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f0000000600)={r5, 0x6, 0x140a09e5, 0x3, 0x9961, 0x3}, &(0x7f0000000540)=0x14) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r3, 0x84, 0x19, &(0x7f0000000580)={r6, 0x100}, 0xffffffffffffffe9) ioctl$DRM_IOCTL_GET_SAREA_CTX(r3, 0xc010641d, &(0x7f0000000300)={0x0, &(0x7f0000000480)=""/112}) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm-monitor\x00', 0x50d202, 0x0) r7 = dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_CONGESTION(r7, 0x6, 0xd, &(0x7f0000000180)='lp\x00', 0x3) ioctl$VIDIOC_TRY_FMT(r7, 0xc0d05640, &(0x7f0000000400)={0xa, @raw_data="d456e651514154be56c23a0150374fec800b3363d0f8209aea95ae10a4bfe2bc4a059b555ffe32ee49657c21fdaeec9ff08b45f3c5b652502dd578edc616a43da8fa7411c10cf0be3062500d3923e6f93300ce6e6ca32a13179605ca95c9250023e974040392fcffaac49faad6d6549cb1f2e1c7492ba9a8e2d26787e1872027fbe8577edbc559354f305d4e05c26a2f708bb008ca01368edece7ac1108379664aea7622db8fe0f786d6a4177494b3766d3f6f8e4c69729d1cdef558344c8bab4dfc9bfc6bc56bfa"}) ioctl$GIO_UNIMAP(r7, 0x4b66, &(0x7f0000000840)={0x2, &(0x7f0000000280)=[{}, {}]}) clock_gettime(0x0, &(0x7f0000000a40)={0x0, 0x0}) select(0x40, &(0x7f0000000200)={0x4, 0x7, 0x3ff, 0x3, 0xffffffffffffffe1, 0x6, 0x4b4, 0x80000001}, &(0x7f00000009c0)={0x4ebe, 0x5, 0x1, 0x7, 0x1, 0x8, 0x7, 0x100}, &(0x7f0000000a00)={0x0, 0xffffffff, 0x80000001, 0x1f, 0xfffffffffffffffd, 0x1, 0x8, 0x8000}, &(0x7f0000000a80)={r8, r9/1000+10000}) ioprio_set$pid(0x7, 0x0, 0x9) ioctl$BLKPG(r1, 0x932, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0x7fff) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r10 = request_key(&(0x7f0000000740)='encrypted\x00', &(0x7f0000000b00)={'syz', 0x2}, &(0x7f0000000b40)='./cgroup\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000680)='asymmetric\x00', &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, r10) request_key(&(0x7f00000004c0)='pkcs7_test\x00', &(0x7f0000000500)={'syz', 0x1}, &(0x7f0000000540)='wlan0\x00', 0x0) 08:17:52 executing program 4 (fault-call:9 fault-nth:4): mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [{}], {}, [], {0x10, 0x2}}, 0x2c, 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r3, 0x0) chdir(&(0x7f0000000100)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') 08:17:52 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x305, &(0x7f0000000000)=ANY=[]}, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x1000000000000304, 0x400000000100) 08:17:52 executing program 0: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [{}], {}, [], {0x10, 0x2}}, 0x2c, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) write$binfmt_script(r4, &(0x7f0000000400)={'#! ', './file1', [{0x20, 'system.posix_acl_access\x00'}, {0x20, 'system.posix_acl_access\x00'}, {0x20, '%*md5sumvmnet1@self'}, {0x20, ')'}, {}], 0xa, "f77253e5a08bdd6093b37d991e239c4ad7a8d92f46d695387b49a601ef44230e21449f59a19e512aa9abde8b3f3f2c20415e9327cd37355b7268fa6d3a53d5e36ef5f09efc30144f452a3d5debade2b0d79f0f1d1b9489bce8364d9eefac6d7dc10d9718b52fa76af87924c932628bde1f52af03c7ab8d460cef8b6a00b9f8c5a5a0a5ef98f4cb1630631aeec3e16810cde3adba5ade73d029d76f2de0faf030bb72c043688c"}, 0xfa) getpeername$packet(r2, &(0x7f0000000200)={0x11, 0x0, 0x0}, &(0x7f0000000240)=0x14) bind$packet(0xffffffffffffffff, &(0x7f0000000280)={0x11, 0x1b, r5, 0x1, 0xf1, 0x6, @link_local}, 0x14) chown(&(0x7f00000001c0)='./file0\x00', r3, 0x0) chdir(&(0x7f0000000100)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') 08:17:52 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x16, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000340)}, 0x42) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0xffffffffa0008000, 0xffffffffffffff3e, 0x0, &(0x7f0000000040)="a34747e865af5cf11e34bdff7a7a5ba0051aae5804d5a05d9b9ff68e12bb4d43a20375ea905795449b957e956aa6", 0x0, 0x401, 0x0, 0x0, 0xfffffffffffffff3}, 0x28) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f0000000240)={0x1ff, 0xc, 0x4, 0x0, 0x27e5, {}, {0x4, 0x8, 0x4, 0x8, 0x7, 0x6, "96669900"}, 0x7, 0x0, @fd=r0, 0x9, 0x0, r2}) r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@struct={0x0, 0x0, 0x0, 0x4, 0x0, 0x9}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x1, 0x3f}}]}}, &(0x7f0000000080)=""/236, 0x3e, 0xec, 0x8}, 0x20) ioctl$EVIOCGLED(r3, 0x80404519, &(0x7f0000000580)=""/250) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) dup(0xffffffffffffffff) r5 = dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_CONGESTION(r5, 0x6, 0xd, &(0x7f0000000180)='lp\x00', 0x3) ioctl$VIDIOC_TRY_FMT(r5, 0xc0d05640, &(0x7f0000000400)={0xa, @raw_data="d456e651514154be56c23a0150374fec800b3363d0f8209aea95ae10a4bfe2bc4a059b555ffe32ee49657c21fdaeec9ff08b45f3c5b652502dd578edc616a43da8fa7411c10cf0be3062500d3923e6f93300ce6e6ca32a13179605ca95c9250023e974040392fcffaac49faad6d6549cb1f2e1c7492ba9a8e2d26787e1872027fbe8577edbc559354f305d4e05c26a2f708bb008ca01368edece7ac1108379664aea7622db8fe0f786d6a4177494b3766d3f6f8e4c69729d1cdef558344c8bab4dfc9bfc6bc56bfa"}) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) 08:17:52 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x305, &(0x7f0000000000)=ANY=[]}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, 0x0, 0x0, 0x400000000100) [ 584.144614][T13754] BPF:[2] ARRAY (anon) [ 584.146437][T13751] FAULT_INJECTION: forcing a failure. [ 584.146437][T13751] name failslab, interval 1, probability 0, space 0, times 0 [ 584.154587][T13754] BPF:type_id=5 index_type_id=1 nr_elems=63 [ 584.184045][T13754] BPF: [ 584.192822][T13751] CPU: 1 PID: 13751 Comm: syz-executor.4 Not tainted 5.5.0-rc7-syzkaller #0 [ 584.201682][T13751] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 584.211780][T13751] Call Trace: [ 584.215090][T13751] dump_stack+0x197/0x210 [ 584.219450][T13751] should_fail.cold+0xa/0x15 [ 584.224069][T13751] ? fault_create_debugfs_attr+0x180/0x180 [ 584.229901][T13751] ? ___might_sleep+0x163/0x2c0 [ 584.234813][T13751] __should_failslab+0x121/0x190 [ 584.239773][T13751] should_failslab+0x9/0x14 [ 584.244294][T13751] kmem_cache_alloc+0x2aa/0x710 [ 584.249409][T13751] ? __d_lookup+0x42a/0x750 [ 584.253928][T13751] ? lookup_dcache+0x23/0x140 [ 584.258613][T13751] ? d_lookup+0xf4/0x260 [ 584.262868][T13751] ? lockdep_hardirqs_on+0x421/0x5e0 [ 584.268201][T13751] __d_alloc+0x2e/0x8c0 [ 584.272430][T13751] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 584.278190][T13751] d_alloc+0x4d/0x280 [ 584.282204][T13751] __lookup_hash+0xcd/0x190 [ 584.286761][T13751] filename_create+0x1a7/0x4f0 [ 584.291554][T13751] ? kern_path_mountpoint+0x40/0x40 [ 584.296779][T13751] ? strncpy_from_user+0x2b4/0x400 [ 584.302000][T13751] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 584.308392][T13751] ? getname_flags+0x277/0x5b0 [ 584.313189][T13751] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 584.319449][T13751] do_symlinkat+0xf3/0x290 [ 584.323887][T13751] ? __ia32_sys_unlink+0x50/0x50 [ 584.328964][T13751] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 584.334440][T13751] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 584.340636][T13751] ? do_syscall_64+0x26/0x790 [ 584.345327][T13751] ? lockdep_hardirqs_on+0x421/0x5e0 [ 584.350632][T13751] __x64_sys_symlink+0x59/0x80 [ 584.355518][T13751] do_syscall_64+0xfa/0x790 [ 584.360047][T13751] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 584.366047][T13751] RIP: 0033:0x45b349 [ 584.369954][T13751] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 08:17:52 executing program 0: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [{}], {}, [], {0x10, 0x2}}, 0x2c, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r3, 0x0) chdir(&(0x7f0000000100)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') [ 584.389700][T13751] RSP: 002b:00007f2284701c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000058 [ 584.398219][T13751] RAX: ffffffffffffffda RBX: 00007f22847026d4 RCX: 000000000045b349 [ 584.406280][T13751] RDX: 0000000000000000 RSI: 00000000200007c0 RDI: 0000000020000800 [ 584.414270][T13751] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 584.422862][T13751] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 584.430849][T13751] R13: 0000000000000b42 R14: 00000000004cc2cf R15: 0000000000000004 [ 584.434636][T13754] BPF:Invalid index 08:17:53 executing program 5: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x305, &(0x7f0000000000)=ANY=[]}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1000000000000002, 0x400000000100) 08:17:53 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x305, &(0x7f0000000000)=ANY=[]}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, 0x0, 0x0, 0x400000000100) [ 584.457099][T13754] BPF: [ 584.457099][T13754] 08:17:53 executing program 1: r0 = socket$inet(0x2, 0x3, 0x2) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000240)='/dev/md0\x00', 0x0, 0x0) ioctl$void(r0, 0x5451) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) mkdir(&(0x7f00000005c0)='./file0\x00', 0x100000000020) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x7f, 0x4, 0x0, 0x0, 0x9, 0xfc, 0x0, 0x9d7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0x7) lstat(&(0x7f00000002c0)='./file1\x00', &(0x7f0000000340)) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x591800, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/nullb0\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, 0x0) r4 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000180)=ANY=[], &(0x7f0000000140)) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @loopback}}}, 0x9c) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000040)={0x0, 0x3a8e}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f0000000600)={r5, 0x6, 0x140a09e5, 0x3, 0x9961, 0x3}, &(0x7f0000000540)=0x14) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r3, 0x84, 0x19, &(0x7f0000000580)={r6, 0x100}, 0xffffffffffffffe9) ioctl$DRM_IOCTL_GET_SAREA_CTX(r3, 0xc010641d, &(0x7f0000000300)={0x0, &(0x7f0000000480)=""/112}) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm-monitor\x00', 0x200000, 0x0) r7 = dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_CONGESTION(r7, 0x6, 0xd, &(0x7f0000000180)='lp\x00', 0x3) ioctl$VIDIOC_TRY_FMT(r7, 0xc0d05640, &(0x7f0000000400)={0xa, @raw_data="d456e651514154be56c23a0150374fec800b3363d0f8209aea95ae10a4bfe2bc4a059b555ffe32ee49657c21fdaeec9ff08b45f3c5b652502dd578edc616a43da8fa7411c10cf0be3062500d3923e6f93300ce6e6ca32a13179605ca95c9250023e974040392fcffaac49faad6d6549cb1f2e1c7492ba9a8e2d26787e1872027fbe8577edbc559354f305d4e05c26a2f708bb008ca01368edece7ac1108379664aea7622db8fe0f786d6a4177494b3766d3f6f8e4c69729d1cdef558344c8bab4dfc9bfc6bc56bfa"}) ioctl$GIO_UNIMAP(r7, 0x4b66, &(0x7f0000000840)={0x2, &(0x7f0000000280)=[{}, {}]}) clock_gettime(0x0, &(0x7f0000000a40)={0x0, 0x0}) select(0x40, &(0x7f0000000200)={0x4, 0x7, 0x3ff, 0x3, 0xffffffffffffffe1, 0x6, 0x4b4, 0x80000001}, &(0x7f00000009c0)={0x4ebe, 0x5, 0x1, 0x7, 0x1, 0x8, 0x7, 0x100}, &(0x7f0000000a00)={0x0, 0xffffffff, 0x80000001, 0x1f, 0xfffffffffffffffd, 0x1, 0x8, 0x8000}, &(0x7f0000000a80)={r8, r9/1000+10000}) ioprio_set$pid(0x7, 0x0, 0x9) ioctl$BLKPG(r1, 0x932, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0x7fff) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r10 = request_key(&(0x7f0000000740)='encrypted\x00', &(0x7f0000000b00)={'syz', 0x2}, &(0x7f0000000b40)='./cgroup\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000680)='asymmetric\x00', &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, r10) request_key(&(0x7f00000004c0)='pkcs7_test\x00', &(0x7f0000000500)={'syz', 0x1}, &(0x7f0000000540)='wlan0\x00', 0x0) 08:17:53 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x305, &(0x7f0000000000)=ANY=[]}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, 0x0, 0x0, 0x400000000100) 08:17:53 executing program 5: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x305, &(0x7f0000000000)=ANY=[]}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1000000000000003, 0x400000000100) 08:17:53 executing program 2 (fault-call:7 fault-nth:0): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x16, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000340)}, 0x42) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0xffffffffa0008000, 0xffffffffffffff3e, 0x0, &(0x7f0000000040)="a34747e865af5cf11e34bdff7a7a5ba0051aae5804d5a05d9b9ff68e12bb4d43a20375ea905795449b957e956aa6", 0x0, 0x401, 0x0, 0x0, 0xfffffffffffffff3}, 0x28) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f0000000240)={0x1ff, 0xc, 0x4, 0x0, 0x27e5, {}, {0x4, 0x8, 0x4, 0x8, 0x7, 0x6, "96669900"}, 0x7, 0x0, @fd=r0, 0x9, 0x0, r2}) r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@struct={0x0, 0x0, 0x0, 0x4, 0x0, 0x9}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x1, 0x3f}}]}}, &(0x7f0000000080)=""/236, 0x3e, 0xec, 0x8}, 0x20) ioctl$EVIOCGLED(r3, 0x80404519, &(0x7f0000000580)=""/250) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) dup(0xffffffffffffffff) r5 = dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_CONGESTION(r5, 0x6, 0xd, &(0x7f0000000180)='lp\x00', 0x3) ioctl$VIDIOC_TRY_FMT(r5, 0xc0d05640, &(0x7f0000000400)={0xa, @raw_data="d456e651514154be56c23a0150374fec800b3363d0f8209aea95ae10a4bfe2bc4a059b555ffe32ee49657c21fdaeec9ff08b45f3c5b652502dd578edc616a43da8fa7411c10cf0be3062500d3923e6f93300ce6e6ca32a13179605ca95c9250023e974040392fcffaac49faad6d6549cb1f2e1c7492ba9a8e2d26787e1872027fbe8577edbc559354f305d4e05c26a2f708bb008ca01368edece7ac1108379664aea7622db8fe0f786d6a4177494b3766d3f6f8e4c69729d1cdef558344c8bab4dfc9bfc6bc56bfa"}) ioctl$BLKTRACESTART(r5, 0x1274, 0x0) [ 584.840287][T13884] FAULT_INJECTION: forcing a failure. [ 584.840287][T13884] name failslab, interval 1, probability 0, space 0, times 0 [ 584.869872][T13884] CPU: 0 PID: 13884 Comm: syz-executor.2 Not tainted 5.5.0-rc7-syzkaller #0 [ 584.878701][T13884] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 08:17:53 executing program 4 (fault-call:9 fault-nth:5): mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [{}], {}, [], {0x10, 0x2}}, 0x2c, 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r3, 0x0) chdir(&(0x7f0000000100)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') 08:17:53 executing program 0: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)=ANY=[@ANYBLOB="02000000010040000000000002000000", @ANYRES32=0x0, @ANYBLOB="040000000000000010000200000000002000000000000000"], 0x2c, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) setsockopt$inet_sctp_SCTP_ADD_STREAMS(r2, 0x84, 0x79, &(0x7f0000000000)={0x0, 0x20, 0x9}, 0x8) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r4, 0x0) chdir(&(0x7f0000000100)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') 08:17:53 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x305, &(0x7f0000000000)=ANY=[]}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1000000000000304, 0x0) 08:17:53 executing program 5: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x305, &(0x7f0000000000)=ANY=[]}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1000000000000004, 0x400000000100) 08:17:53 executing program 1: r0 = socket$inet(0x2, 0x3, 0x2) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000240)='/dev/md0\x00', 0x0, 0x0) ioctl$void(r0, 0x5451) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) mkdir(&(0x7f00000005c0)='./file0\x00', 0x100000000020) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x7f, 0x4, 0x0, 0x0, 0x9, 0xfc, 0x0, 0x9d7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0x7) lstat(&(0x7f00000002c0)='./file1\x00', &(0x7f0000000340)) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/ubi_ctrl\x00', 0x591800, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/nullb0\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, 0x0) r4 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000180)=ANY=[], &(0x7f0000000140)) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}}, 0x98) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000040)={0x0, 0x3a8e}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f0000000600)={r5, 0x6, 0x140a09e5, 0x3, 0x9961, 0x3}, &(0x7f0000000540)=0x14) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r3, 0x84, 0x19, &(0x7f0000000580)={r6, 0x100}, 0xffffffffffffffe9) ioctl$DRM_IOCTL_GET_SAREA_CTX(r3, 0xc010641d, &(0x7f0000000300)={0x0, &(0x7f0000000480)=""/112}) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm-monitor\x00', 0x200000, 0x0) r7 = dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_CONGESTION(r7, 0x6, 0xd, &(0x7f0000000180)='lp\x00', 0x3) ioctl$VIDIOC_TRY_FMT(r7, 0xc0d05640, &(0x7f0000000400)={0xa, @raw_data="d456e651514154be56c23a0150374fec800b3363d0f8209aea95ae10a4bfe2bc4a059b555ffe32ee49657c21fdaeec9ff08b45f3c5b652502dd578edc616a43da8fa7411c10cf0be3062500d3923e6f93300ce6e6ca32a13179605ca95c9250023e974040392fcffaac49faad6d6549cb1f2e1c7492ba9a8e2d26787e1872027fbe8577edbc559354f305d4e05c26a2f708bb008ca01368edece7ac1108379664aea7622db8fe0f786d6a4177494b3766d3f6f8e4c69729d1cdef558344c8bab4dfc9bfc6bc56bfa"}) ioctl$GIO_UNIMAP(r7, 0x4b66, &(0x7f0000000840)={0x2, &(0x7f0000000280)=[{}, {}]}) clock_gettime(0x0, &(0x7f0000000a40)) select(0x40, &(0x7f0000000200)={0x8001, 0x7, 0x3ff, 0x3, 0xffffffffffffffe1, 0x8, 0x4b4, 0x80000001}, &(0x7f00000009c0)={0x4ebe, 0x5, 0x1, 0x7, 0x1, 0x6, 0x7, 0x100}, &(0x7f0000000a00)={0xfffffffffffffffc, 0xffffffff, 0x9, 0x1f, 0xfffffffffffffffd, 0x1, 0x8, 0x8000}, &(0x7f0000000100)) ioprio_set$pid(0x7, 0x0, 0x9) ioctl$BLKPG(r1, 0x932, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0x7fff) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r8 = request_key(&(0x7f0000000740)='encrypted\x00', &(0x7f0000000b00)={'syz', 0x2}, &(0x7f0000000b40)='./cgroup\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000680)='asymmetric\x00', &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, r8) request_key(&(0x7f00000004c0)='pkcs7_test\x00', &(0x7f0000000500)={'syz', 0x1}, &(0x7f0000000540)='wlan0\x00', 0x0) [ 584.888772][T13884] Call Trace: [ 584.892177][T13884] dump_stack+0x197/0x210 [ 584.896540][T13884] should_fail.cold+0xa/0x15 [ 584.901277][T13884] ? fault_create_debugfs_attr+0x180/0x180 [ 584.907109][T13884] ? ___might_sleep+0x163/0x2c0 [ 584.912107][T13884] __should_failslab+0x121/0x190 [ 584.917166][T13884] should_failslab+0x9/0x14 [ 584.921688][T13884] kmem_cache_alloc_trace+0x2d3/0x790 [ 584.927086][T13884] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 584.933606][T13884] btf_new_fd+0x1c9/0x1d10 [ 584.938046][T13884] ? apparmor_cred_prepare+0x7b0/0x7b0 [ 584.943519][T13884] ? lock_downgrade+0x920/0x920 [ 584.948505][T13884] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 584.954828][T13884] ? cap_capable+0x205/0x270 [ 584.959445][T13884] ? btf_type_seq_show+0x1b0/0x1b0 [ 584.964731][T13884] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 584.970989][T13884] ? ns_capable_common+0x93/0x100 [ 584.976127][T13884] __do_sys_bpf+0x1529/0x3810 [ 584.980826][T13884] ? _raw_spin_unlock_irq+0x23/0x80 [ 584.986045][T13884] ? bpf_prog_load+0x18f0/0x18f0 [ 584.991019][T13884] ? _raw_spin_unlock_irq+0x59/0x80 [ 584.996229][T13884] ? finish_task_switch+0x147/0x750 [ 585.001465][T13884] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 585.007728][T13884] ? debug_smp_processor_id+0x33/0x18a [ 585.013224][T13884] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 585.019412][T13884] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 585.025014][T13884] ? do_syscall_64+0x26/0x790 [ 585.029806][T13884] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 585.035921][T13884] ? do_syscall_64+0x26/0x790 08:17:53 executing program 5: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x305, &(0x7f0000000000)=ANY=[]}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1000000000000005, 0x400000000100) [ 585.040633][T13884] __x64_sys_bpf+0x73/0xb0 [ 585.045067][T13884] do_syscall_64+0xfa/0x790 [ 585.049605][T13884] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 585.055514][T13884] RIP: 0033:0x45b349 [ 585.059423][T13884] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 585.079038][T13884] RSP: 002b:00007f158229bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 08:17:53 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x305, &(0x7f0000000000)=ANY=[]}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1000000000000304, 0x0) [ 585.087598][T13884] RAX: ffffffffffffffda RBX: 00007f158229c6d4 RCX: 000000000045b349 [ 585.095720][T13884] RDX: 0000000000000020 RSI: 0000000020000200 RDI: 0000000000000012 [ 585.103705][T13884] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 585.111740][T13884] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000007 [ 585.119727][T13884] R13: 000000000000004b R14: 00000000004c196d R15: 0000000000000000 [ 585.137802][T13897] FAULT_INJECTION: forcing a failure. [ 585.137802][T13897] name failslab, interval 1, probability 0, space 0, times 0 [ 585.216568][T13897] CPU: 1 PID: 13897 Comm: syz-executor.4 Not tainted 5.5.0-rc7-syzkaller #0 [ 585.225331][T13897] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 585.235399][T13897] Call Trace: [ 585.238709][T13897] dump_stack+0x197/0x210 [ 585.243062][T13897] should_fail.cold+0xa/0x15 [ 585.247689][T13897] ? fault_create_debugfs_attr+0x180/0x180 [ 585.253678][T13897] ? ___might_sleep+0x163/0x2c0 [ 585.258571][T13897] __should_failslab+0x121/0x190 [ 585.263533][T13897] should_failslab+0x9/0x14 [ 585.268050][T13897] __kmalloc+0x2e0/0x770 [ 585.272306][T13897] ? mark_held_locks+0xf0/0xf0 [ 585.277093][T13897] ? __kasan_check_read+0x11/0x20 [ 585.282916][T13897] ? tomoyo_realpath_from_path+0xc5/0x660 [ 585.288679][T13897] tomoyo_realpath_from_path+0xc5/0x660 [ 585.294247][T13897] ? tomoyo_path_perm+0x1cb/0x430 [ 585.299305][T13897] tomoyo_path_perm+0x230/0x430 [ 585.304330][T13897] ? tomoyo_path_perm+0x1cb/0x430 [ 585.309383][T13897] ? tomoyo_check_open_permission+0x3e0/0x3e0 [ 585.315521][T13897] ? kmem_cache_free+0x26b/0x320 [ 585.320494][T13897] tomoyo_path_symlink+0xaa/0xf0 [ 585.325448][T13897] ? tomoyo_inode_getattr+0x30/0x30 [ 585.330662][T13897] ? kern_path_mountpoint+0x40/0x40 [ 585.335877][T13897] ? strncpy_from_user+0x2b4/0x400 [ 585.341156][T13897] security_path_symlink+0x10a/0x170 [ 585.346464][T13897] do_symlinkat+0x137/0x290 [ 585.350987][T13897] ? __ia32_sys_unlink+0x50/0x50 [ 585.355936][T13897] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 585.361412][T13897] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 585.367488][T13897] ? do_syscall_64+0x26/0x790 [ 585.372182][T13897] ? lockdep_hardirqs_on+0x421/0x5e0 [ 585.377481][T13897] __x64_sys_symlink+0x59/0x80 [ 585.382263][T13897] do_syscall_64+0xfa/0x790 [ 585.386783][T13897] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 585.392795][T13897] RIP: 0033:0x45b349 [ 585.396701][T13897] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 08:17:54 executing program 0: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [{}], {}, [], {0x10, 0x2}}, 0x2c, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r3, 0x0) accept$alg(r1, 0x0, 0x0) chdir(&(0x7f0000000100)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') [ 585.416315][T13897] RSP: 002b:00007f2284701c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000058 [ 585.424741][T13897] RAX: ffffffffffffffda RBX: 00007f22847026d4 RCX: 000000000045b349 [ 585.432724][T13897] RDX: 0000000000000000 RSI: 00000000200007c0 RDI: 0000000020000800 [ 585.440741][T13897] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 585.448725][T13897] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 585.456819][T13897] R13: 0000000000000b42 R14: 00000000004cc2cf R15: 0000000000000005 08:17:54 executing program 1: r0 = socket$inet(0x2, 0x3, 0x2) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000240)='/dev/md0\x00', 0x0, 0x0) ioctl$void(r0, 0x5451) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) mkdir(&(0x7f00000005c0)='./file0\x00', 0x100000000020) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x7f, 0x4, 0x0, 0x0, 0x9, 0xfc, 0x0, 0x9d7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0x7) lstat(&(0x7f00000002c0)='./file1\x00', &(0x7f0000000340)) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x591800, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/nullb0\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, 0x0) r4 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000180)=ANY=[], &(0x7f0000000140)) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}}, 0x98) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000040)={0x0, 0x3a8e}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f0000000600)={r5, 0x6, 0x140a09e5, 0x3, 0x9961, 0x3}, &(0x7f0000000540)=0x14) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r3, 0x84, 0x19, &(0x7f0000000580)={r6, 0x100}, 0xffffffffffffffe9) ioctl$DRM_IOCTL_GET_SAREA_CTX(r3, 0xc010641d, &(0x7f0000000300)={0x0, &(0x7f0000000480)=""/112}) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm-monitor\x00', 0x200000, 0x0) r7 = dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_CONGESTION(r7, 0x6, 0xd, &(0x7f0000000180)='lp\x00', 0x3) ioctl$VIDIOC_TRY_FMT(r7, 0xc0d05640, &(0x7f0000000400)={0xa, @raw_data="d456e651514154be56c23a0150374fec800b3363d0f8209aea95ae10a4bfe2bc4a059b555ffe32ee49657c21fdaeec9ff08b45f3c5b652502dd578edc616a43da8fa7411c10cf0be3062500d3923e6f93300ce6e6ca32a13179605ca95c9250023e974040392fcffaac49faad6d6549cb1f2e1c7492ba9a8e2d26787e1872027fbe8577edbc559354f305d4e05c26a2f708bb008ca01368edece7ac1108379664aea7622db8fe0f786d6a4177494b3766d3f6f8e4c69729d1cdef558344c8bab4dfc9bfc6bc56bfa"}) ioctl$GIO_UNIMAP(r7, 0x4b66, &(0x7f0000000840)={0x2, &(0x7f0000000280)=[{}, {}]}) clock_gettime(0x0, &(0x7f0000000a40)={0x0, 0x0}) select(0x40, &(0x7f0000000200)={0x4, 0x7, 0x3ff, 0x3, 0xffffffffffffffe1, 0x6, 0x4b8, 0x80000001}, &(0x7f00000009c0)={0x4ebe, 0x5, 0x1, 0x7, 0x1, 0x8, 0x7, 0x100}, &(0x7f0000000a00)={0x0, 0xffffffff, 0x80000001, 0x1f, 0xfffffffffffffffd, 0x1, 0x8, 0x8000}, &(0x7f0000000a80)={r8, r9/1000+10000}) ioprio_set$pid(0x7, 0x0, 0x9) ioctl$BLKPG(r1, 0x932, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0x7fff) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r10 = request_key(&(0x7f0000000740)='encrypted\x00', &(0x7f0000000b00)={'syz', 0x2}, &(0x7f0000000b40)='./cgroup\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000680)='asymmetric\x00', &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, r10) request_key(&(0x7f00000004c0)='pkcs7_test\x00', &(0x7f0000000500)={'syz', 0x1}, &(0x7f0000000540)='wlan0\x00', 0x0) 08:17:54 executing program 5: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x305, &(0x7f0000000000)=ANY=[]}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1000000000000006, 0x400000000100) 08:17:54 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x16, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffff1971a4f0ff00000000b7060000000000811e6403000000000045040400010000001704000001000a00b7040000000100006a0af2fe00000000850000001a000000b70000000000000095000000000000009e17890efaee5eab7ff8a8cdc21ce784909b849d5550ad855dab54d8877a6db61d69f2ffcaa10350e11cb97c8adf1bc9a0c4ee6d9674c77404ceb9971e43405d621ffbc9a4fd39b0b56bfe6508ebb3c44eb84049761451ce540c772e2d9f8004e26f7fcc059c062234d5595f6fba87b81d1106fb0289ce67a66afd9ac3d09e29a9d542ca9d85a5c9c88474895d679838def0a83a733dc6a39b63a5ed69d32394c53361d7480884bd8048a967d9b912ef9f1d6fee41f5b29d37acb91c61ccd1df673896450f859ce8122a79c3e4"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000340)}, 0x42) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0xffffffffa0008000, 0xffffffffffffff3e, 0x0, &(0x7f0000000040)="a34747e865af5cf11e34bdff7a7a5ba0051aae5804d5a05d9b9ff68e12bb4d43a20375ea905795449b957e956aa6", 0x0, 0x401, 0x0, 0x0, 0xfffffffffffffff3}, 0x28) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f0000000240)={0x1ff, 0xc, 0x4, 0x0, 0x27e5, {}, {0x4, 0x8, 0x4, 0x8, 0x7, 0x6, "96669900"}, 0x7, 0x0, @fd=r0, 0x9, 0x0, r2}) r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@struct={0x0, 0x0, 0x0, 0x4, 0x0, 0x9}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x1, 0x3f}}]}}, &(0x7f0000000080)=""/236, 0x3e, 0xec, 0x8}, 0x20) ioctl$EVIOCGLED(r3, 0x80404519, &(0x7f0000000580)=""/250) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) dup(0xffffffffffffffff) r5 = dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_CONGESTION(r5, 0x6, 0xd, &(0x7f0000000180)='lp\x00', 0x3) ioctl$VIDIOC_TRY_FMT(r5, 0xc0d05640, &(0x7f0000000400)={0xa, @raw_data="d456e651514154be56c23a0150374fec800b3363d0f8209aea95ae10a4bfe2bc4a059b555ffe32ee49657c21fdaeec9ff08b45f3c5b652502dd578edc616a43da8fa7411c10cf0be3062500d3923e6f93300ce6e6ca32a13179605ca95c9250023e974040392fcffaac49faad6d6549cb1f2e1c7492ba9a8e2d26787e1872027fbe8577edbc559354f305d4e05c26a2f708bb008ca01368edece7ac1108379664aea7622db8fe0f786d6a4177494b3766d3f6f8e4c69729d1cdef558344c8bab4dfc9bfc6bc56bfa"}) ioctl$BLKTRACESTART(r5, 0x1274, 0x0) [ 585.592574][T13897] ERROR: Out of memory at tomoyo_realpath_from_path. 08:17:54 executing program 4 (fault-call:9 fault-nth:6): mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [{}], {}, [], {0x10, 0x2}}, 0x2c, 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r3, 0x0) chdir(&(0x7f0000000100)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') 08:17:54 executing program 0: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)=ANY=[@ANYBLOB="02000000010000000000000002000000", @ANYRES32=0x0, @ANYBLOB="0400000000000000100002000000000020000000000000c4"], 0x2c, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r3, 0x0) chdir(&(0x7f0000000100)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') 08:17:54 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x305, &(0x7f0000000000)=ANY=[]}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1000000000000304, 0x0) [ 585.815835][T14021] BPF:[2] ARRAY (anon) [ 585.834792][T14021] BPF:type_id=5 index_type_id=1 nr_elems=63 08:17:54 executing program 5: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x305, &(0x7f0000000000)=ANY=[]}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1000000000000007, 0x400000000100) [ 585.869108][T14021] BPF: [ 585.895102][T14021] BPF:Invalid index [ 585.899596][T14031] FAULT_INJECTION: forcing a failure. [ 585.899596][T14031] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 585.912953][T14031] CPU: 0 PID: 14031 Comm: syz-executor.4 Not tainted 5.5.0-rc7-syzkaller #0 [ 585.918312][T14021] BPF: [ 585.918312][T14021] [ 585.921743][T14031] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 585.921778][T14031] Call Trace: [ 585.921803][T14031] dump_stack+0x197/0x210 [ 585.921828][T14031] should_fail.cold+0xa/0x15 [ 585.948932][T14031] ? is_bpf_text_address+0xac/0x160 [ 585.954253][T14031] ? fault_create_debugfs_attr+0x180/0x180 [ 585.960082][T14031] ? lock_downgrade+0x920/0x920 [ 585.964956][T14031] should_fail_alloc_page+0x50/0x60 [ 585.970166][T14031] __alloc_pages_nodemask+0x1a1/0x910 [ 585.975569][T14031] ? __alloc_pages_slowpath+0x2900/0x2900 [ 585.981309][T14031] ? __kasan_check_read+0x11/0x20 [ 585.986359][T14031] ? fault_create_debugfs_attr+0x180/0x180 [ 585.992350][T14031] cache_grow_begin+0x90/0xc60 [ 585.997134][T14031] ? tomoyo_realpath_from_path+0xc5/0x660 [ 586.003002][T14031] ? trace_hardirqs_off+0x62/0x240 [ 586.008140][T14031] __kmalloc+0x6b2/0x770 [ 586.012395][T14031] ? mark_held_locks+0xf0/0xf0 [ 586.017283][T14031] ? __kasan_check_read+0x11/0x20 [ 586.022333][T14031] ? tomoyo_realpath_from_path+0xc5/0x660 [ 586.028179][T14031] tomoyo_realpath_from_path+0xc5/0x660 [ 586.033829][T14031] ? tomoyo_path_perm+0x1cb/0x430 [ 586.038879][T14031] tomoyo_path_perm+0x230/0x430 08:17:54 executing program 3 (fault-call:3 fault-nth:0): sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x305, &(0x7f0000000000)=ANY=[]}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1000000000000304, 0x400000000100) 08:17:54 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x16, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000340)}, 0x42) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0xffffffffa0008000, 0xffffffffffffff3e, 0x0, &(0x7f0000000040)="a34747e865af5cf11e34bdff7a7a5ba0051aae5804d5a05d9b9ff68e12bb4d43a20375ea905795449b957e956aa6", 0x0, 0x401, 0x0, 0x0, 0xfffffffffffffff3}, 0x28) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f0000000240)={0x1ff, 0xc, 0x4, 0x0, 0x27e5, {}, {0x4, 0x8, 0x4, 0x8, 0x7, 0x6, "96669900"}, 0x7, 0x0, @fd=r0, 0x9, 0x0, r2}) r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000780)=ANY=[@ANYBLOB="9feb0e00189f5acdc5242e282844000000080000ffff000000240000000200000000eeffff170000000401bba1cfae02c35565370000800000000000000005c5c93059521ff6469e7c218c06440bb3e7000000f7ff0000010000003f0000000000cd2b07f22c877602ebeea54b67814a72f2b108cf90e703e07c70ccde40d525856d797f0e87df5a04b5983a021e5bce1589599acff641117a48bf0900000028b6271aa36a557397b3cd289161c04fd1e8b14916cf3697ad8784411be74cc16dcda921214cddb9a4cd2101c71bfc7f00"/218], &(0x7f0000000080)=""/236, 0x3e, 0xec, 0x8}, 0x20) ioctl$EVIOCGLED(r3, 0x80404519, &(0x7f0000000580)=""/250) r4 = socket(0x10, 0x803, 0x0) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/full\x00', 0x101c80, 0x0) recvfrom$rxrpc(r5, &(0x7f0000000300)=""/57, 0x39, 0x2000, &(0x7f0000000500)=@in6={0x21, 0x2, 0x2, 0x1c, {0xa, 0x4e20, 0x1, @rand_addr="cfa30d3f8cd63fbc645aeb61b778072e", 0xfffffffe}}, 0x24) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r6 = getgid() setresgid(0x0, r6, 0x0) setregid(r6, 0xffffffffffffffff) dup(0xffffffffffffffff) r7 = dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_CONGESTION(r7, 0x6, 0xd, &(0x7f0000000180)='lp\x00', 0x3) ioctl$VIDIOC_TRY_FMT(r7, 0xc0d05640, &(0x7f0000000400)={0xa, @raw_data="d456e651514154be56c23a0150374fec800b3363d0f8209aea95ae10a4bfe2bc4a059b555ffe32ee49657c21fdaeec9ff08b45f3c5b652502dd578edc616a43da8fa7411c10cf0be3062500d3923e6f93300ce6e6ca32a13179605ca95c9250023e974040392fcffaac49faad6d6549cb1f2e1c7492ba9a8e2d26787e1872027fbe8577edbc559354f305d4e05c26a2f708bb008ca01368edece7ac1108379664aea7622db8fe0f786d6a4177494b3766d3f6f8e4c69729d1cdef558344c8bab4dfc9bfc6bc56bfa"}) ioctl$BLKTRACESTART(r7, 0x1274, 0x0) [ 586.043741][T14031] ? tomoyo_path_perm+0x1cb/0x430 [ 586.048786][T14031] ? tomoyo_check_open_permission+0x3e0/0x3e0 [ 586.055034][T14031] ? kmem_cache_free+0x26b/0x320 [ 586.060036][T14031] tomoyo_path_symlink+0xaa/0xf0 [ 586.064996][T14031] ? tomoyo_inode_getattr+0x30/0x30 [ 586.070219][T14031] ? kern_path_mountpoint+0x40/0x40 [ 586.075433][T14031] ? strncpy_from_user+0x2b4/0x400 [ 586.080566][T14031] security_path_symlink+0x10a/0x170 [ 586.085871][T14031] do_symlinkat+0x137/0x290 [ 586.090393][T14031] ? __ia32_sys_unlink+0x50/0x50 08:17:54 executing program 5: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x305, &(0x7f0000000000)=ANY=[]}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1000000000000008, 0x400000000100) [ 586.095346][T14031] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 586.100828][T14031] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 586.106911][T14031] ? do_syscall_64+0x26/0x790 [ 586.111607][T14031] ? lockdep_hardirqs_on+0x421/0x5e0 [ 586.116914][T14031] __x64_sys_symlink+0x59/0x80 [ 586.121696][T14031] do_syscall_64+0xfa/0x790 [ 586.126226][T14031] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 586.132129][T14031] RIP: 0033:0x45b349 [ 586.136023][T14150] FAULT_INJECTION: forcing a failure. [ 586.136023][T14150] name failslab, interval 1, probability 0, space 0, times 0 [ 586.148604][T14031] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 586.168226][T14031] RSP: 002b:00007f2284701c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000058 [ 586.176649][T14031] RAX: ffffffffffffffda RBX: 00007f22847026d4 RCX: 000000000045b349 [ 586.184618][T14031] RDX: 0000000000000000 RSI: 00000000200007c0 RDI: 0000000020000800 [ 586.192718][T14031] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 586.200687][T14031] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 586.208759][T14031] R13: 0000000000000b42 R14: 00000000004cc2cf R15: 0000000000000006 [ 586.219945][T14150] CPU: 1 PID: 14150 Comm: syz-executor.3 Not tainted 5.5.0-rc7-syzkaller #0 [ 586.228659][T14150] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 586.238723][T14150] Call Trace: [ 586.242031][T14150] dump_stack+0x197/0x210 [ 586.246390][T14150] should_fail.cold+0xa/0x15 [ 586.251001][T14150] ? fault_create_debugfs_attr+0x180/0x180 [ 586.256849][T14150] ? ___might_sleep+0x163/0x2c0 [ 586.261726][T14150] __should_failslab+0x121/0x190 [ 586.266679][T14150] should_failslab+0x9/0x14 [ 586.271195][T14150] __kmalloc+0x2e0/0x770 [ 586.275457][T14150] ? __kasan_check_read+0x11/0x20 [ 586.280498][T14150] ? rw_copy_check_uvector+0x31a/0x390 [ 586.285971][T14150] rw_copy_check_uvector+0x31a/0x390 [ 586.291269][T14150] ? __lock_acquire+0x8a0/0x4a00 [ 586.296220][T14150] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 586.301946][T14150] ? kstrtouint+0x142/0x1a0 [ 586.306458][T14150] import_iovec+0xc9/0x410 [ 586.311022][T14150] ? dup_iter+0x260/0x260 [ 586.315365][T14150] ? __fget+0x35d/0x550 [ 586.319546][T14150] vfs_readv+0xc6/0x160 [ 586.323724][T14150] ? compat_rw_copy_check_uvector+0x4c0/0x4c0 [ 586.329804][T14150] ? __kasan_check_read+0x11/0x20 [ 586.334843][T14150] ? __fget+0x37f/0x550 [ 586.339014][T14150] ? ksys_dup3+0x3e0/0x3e0 [ 586.343478][T14150] ? wait_for_completion+0x440/0x440 [ 586.348785][T14150] ? __fget_light+0x1a9/0x230 [ 586.353484][T14150] do_preadv+0x1c4/0x280 [ 586.357742][T14150] ? do_readv+0x330/0x330 [ 586.362084][T14150] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 586.367554][T14150] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 586.373026][T14150] ? do_syscall_64+0x26/0x790 [ 586.377717][T14150] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 586.383796][T14150] ? do_syscall_64+0x26/0x790 [ 586.388478][T14150] __x64_sys_preadv+0x9a/0xf0 [ 586.393149][T14150] do_syscall_64+0xfa/0x790 [ 586.397643][T14150] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 586.403523][T14150] RIP: 0033:0x45b349 [ 586.407407][T14150] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 586.426994][T14150] RSP: 002b:00007f1ebe0a8c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 586.435403][T14150] RAX: ffffffffffffffda RBX: 00007f1ebe0a96d4 RCX: 000000000045b349 08:17:54 executing program 0: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [{0x2, 0x1}], {}, [], {0x10, 0x2}, {0x20, 0x6}}, 0x2c, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x2, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r1, 0x10e, 0xa, &(0x7f0000000000)=0x8, 0x4) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r3, 0x0) chdir(&(0x7f0000000100)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') 08:17:54 executing program 1: r0 = socket$inet(0x2, 0x3, 0x2) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000240)='/dev/md0\x00', 0x0, 0x0) ioctl$void(r0, 0x5451) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) mkdir(&(0x7f00000005c0)='./file0\x00', 0x100000000020) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x7f, 0x4, 0x0, 0x0, 0x9, 0xfc, 0x0, 0x9d7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0x7) lstat(&(0x7f00000002c0)='./file1\x00', &(0x7f0000000340)) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x591800, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/nullb0\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, 0x0) r4 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000180)=ANY=[], &(0x7f0000000140)) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}}, 0x98) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000040)={0x0, 0x3a8e}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f0000000600)={r5, 0x6, 0x140a09e5, 0x3, 0x9961, 0x3}, &(0x7f0000000540)=0x14) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r3, 0x84, 0x19, &(0x7f0000000580)={r6, 0x100}, 0xffffffffffffffe9) ioctl$DRM_IOCTL_GET_SAREA_CTX(r3, 0xc010641d, &(0x7f0000000300)={0x0, &(0x7f0000000480)=""/112}) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm-monitor\x00', 0x200000, 0x0) r7 = dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_CONGESTION(r7, 0x6, 0xd, &(0x7f0000000180)='lp\x00', 0x3) ioctl$VIDIOC_TRY_FMT(r7, 0xc0d05640, &(0x7f0000000400)={0xa, @raw_data="d456e651514154be56c23a0150374fec800b3363d0f8209aea95ae10a4bfe2bc4a059b555ffe32ee49657c21fdaeec9ff08b45f3c5b652502dd578edc616a43da8fa7411c10cf0be3062500d3923e6f93300ce6e6ca32a13179605ca95c9250023e974040392fcffaac49faad6d6549cb1f2e1c7492ba9a8e2d26787e1872027fbe8577edbc559354f305d4e05c26a2f708bb008ca01368edece7ac1108379664aea7622db8fe0f786d6a4177494b3766d3f6f8e4c69729d1cdef558344c8bab4dfc9bfc6bc56bfa"}) ioctl$GIO_UNIMAP(r7, 0x4b66, &(0x7f0000000840)={0x2, &(0x7f0000000280)=[{}, {}]}) clock_gettime(0x0, &(0x7f0000000a40)={0x0, 0x0}) select(0x40, &(0x7f0000000200)={0x4, 0x7, 0x3ff, 0x3, 0xffffffffffffffe1, 0x6, 0x4b4, 0x80000001}, &(0x7f00000009c0)={0x4ebe, 0x5, 0x1, 0x7, 0x1, 0x1000000000008, 0x7, 0x100}, &(0x7f0000000a00)={0x0, 0xffffffff, 0x80000001, 0x1f, 0xfffffffffffffffd, 0x6, 0x8, 0x8000}, &(0x7f0000000a80)={r8, r9/1000+10000}) ioprio_set$pid(0x7, 0x0, 0x9) ioctl$BLKPG(r1, 0x932, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0x7fff) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r10 = request_key(&(0x7f0000000740)='encrypted\x00', &(0x7f0000000b00)={'syz', 0x2}, &(0x7f0000000b40)='./cgroup\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000680)='asymmetric\x00', &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, r10) request_key(&(0x7f00000004c0)='pkcs7_test\x00', &(0x7f0000000500)={'syz', 0x1}, &(0x7f0000000540)='wlan0\x00', 0x0) 08:17:55 executing program 4 (fault-call:9 fault-nth:7): mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [{}], {}, [], {0x10, 0x2}}, 0x2c, 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r3, 0x0) chdir(&(0x7f0000000100)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') [ 586.443370][T14150] RDX: 1000000000000304 RSI: 00000000200017c0 RDI: 0000000000000003 [ 586.451331][T14150] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 586.459307][T14150] R10: 0000400000000100 R11: 0000000000000246 R12: 0000000000000005 [ 586.467278][T14150] R13: 000000000000082c R14: 00000000004c9a3e R15: 0000000000000000 08:17:55 executing program 5: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x305, &(0x7f0000000000)=ANY=[]}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1000000000000009, 0x400000000100) 08:17:55 executing program 3 (fault-call:3 fault-nth:1): sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x305, &(0x7f0000000000)=ANY=[]}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1000000000000304, 0x400000000100) 08:17:55 executing program 0: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) getsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000000), &(0x7f0000000040)=0xe) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="040000000000000010000200000000002000000000000000"], 0x2c, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket(0x10, 0x2, 0x0) r4 = dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_CONGESTION(r4, 0x6, 0xd, &(0x7f0000000180)='lp\x00', 0x3) ioctl$VIDIOC_TRY_FMT(r4, 0xc0d05640, &(0x7f0000000400)={0xa, @raw_data="d456e651514154be56c23a0150374fec800b3363d0f8209aea95ae10a4bfe2bc4a059b555ffe32ee49657c21fdaeec9ff08b45f3c5b652502dd578edc616a43da8fa7411c10cf0be3062500d3923e6f93300ce6e6ca32a13179605ca95c9250023e974040392fcffaac49faad6d6549cb1f2e1c7492ba9a8e2d26787e1872027fbe8577edbc559354f305d4e05c26a2f708bb008ca01368edece7ac1108379664aea7622db8fe0f786d6a4177494b3766d3f6f8e4c69729d1cdef558344c8bab4dfc9bfc6bc56bfa"}) ioctl$UI_END_FF_UPLOAD(r4, 0x406855c9, &(0x7f0000000280)={0xb, 0x7, {0x56, 0x5, 0x860, {0xffc0, 0xa0}, {0x3ff, 0x4}, @period={0x5a, 0x9, 0x100, 0x3, 0x8c46, {0x20, 0x3, 0x0, 0x7fff}, 0x3, &(0x7f0000000240)=[0x7, 0xfff, 0x7fff]}}, {0x55, 0x5, 0x401, {0x9, 0x4200}, {0x3a, 0xfffa}, @ramp={0x6, 0x7, {0x800, 0x1, 0x8, 0x100}}}}) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r5, 0x0) socket$l2tp(0x2, 0x2, 0x73) chdir(&(0x7f0000000100)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') 08:17:55 executing program 1: r0 = socket$inet(0x2, 0x3, 0x2) openat$md(0xffffffffffffff9c, &(0x7f0000000240)='/dev/md0\x00', 0x0, 0x0) ioctl$void(r0, 0x5451) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) mkdir(&(0x7f00000005c0)='./file0\x00', 0x100000000020) r1 = perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x944, 0x8, 0x0, 0x0, 0x0, 0x0, 0x3, 0x7f, 0x4, 0x0, 0x0, 0x9, 0xfc, 0x0, 0x9d7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa000, 0x0, @perf_config_ext={0xf70, 0x20}, 0x0, 0x0, 0x3, 0x4, 0x1, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x7) lstat(&(0x7f00000002c0)='./file1\x00', &(0x7f0000000340)) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x511900, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/nullb0\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f0000000180)={0x1, 0x1, {0x1a, 0x32, 0x15, 0xd, 0x0, 0x8, 0x2, 0x4bce, 0xffffffffffffffff}}) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, 0x0) r3 = openat$zero(0xffffffffffffff9c, 0x0, 0x400800, 0x0) close(0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000180)=ANY=[], &(0x7f0000000140)) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}}, 0x98) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000040)={0x0, 0x3a8e}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f0000000600)={r4, 0x7, 0x140a09e5, 0x2, 0x9961, 0x3}, &(0x7f0000000540)=0x14) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r2, 0x84, 0x19, &(0x7f0000000580)={r5, 0x100}, 0xffffffffffffffe9) socket(0x1, 0x0, 0x0) r6 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IP_VS_SO_SET_ADD(r6, 0x0, 0x482, &(0x7f0000000000)={0x84, @remote, 0x0, 0x1, 'dh\x00'}, 0x2c) ioctl$VFIO_IOMMU_UNMAP_DMA(0xffffffffffffffff, 0x3b72, &(0x7f00000000c0)={0x18, 0x1, 0xd763}) socket$inet_icmp_raw(0x2, 0x3, 0x1) 08:17:55 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x16, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000340)}, 0x42) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0xffffffffa0008000, 0xffffffffffffff3e, 0x0, &(0x7f0000000040)="a34747e865af5cf11e34bdff7a7a5ba0051aae5804d5a05d9b9ff68e12bb4d43a20375ea905795449b957e956aa6", 0x0, 0x401, 0x0, 0x0, 0xfffffffffffffff3}, 0x28) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f0000000240)={0x1ff, 0xc, 0x4, 0x0, 0x27e5, {}, {0x4, 0x8, 0x4, 0x8, 0x7, 0x6, "96669900"}, 0x7, 0x0, @fd=r0, 0x9, 0x0, r2}) r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@struct={0x0, 0x0, 0x0, 0x4, 0x0, 0x9}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x1, 0x3f}}]}}, &(0x7f0000000080)=""/236, 0x3e, 0xec, 0x8}, 0x20) ioctl$EVIOCGLED(r3, 0x80404519, &(0x7f0000000580)=""/250) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) dup(0xffffffffffffffff) r5 = dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_CONGESTION(r5, 0x6, 0xd, &(0x7f0000000180)='lp\x00', 0x3) ioctl$VIDIOC_TRY_FMT(r5, 0xc0d05640, &(0x7f0000000400)={0xa, @raw_data="d456e651514154be56c23a0150374fec800b3363d0f8209aea95ae10a4bfe2bc4a059b555ffe32ee49657c21fdaeec9ff08b45f3c5b652502dd578edc616a43da8fa7411c10cf0be3062500d3923e6f93300ce6e6ca32a13179605ca95c9250023e974040392fcffaac49faad6d6549cb1f2e1c7492ba9a8e2d26787e1872027fbe8577edbc559354f305d4e05c26a2f708bb008ca01368edece7ac1108379664aea7622db8fe0f786d6a4177494b3766d3f6f8e4c69729d1cdef558344c8bab4dfc9bfc6bc56bfa"}) ioctl$BLKTRACESTART(r5, 0x1274, 0x0) 08:17:55 executing program 4: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [{}], {}, [], {0x10, 0x2}}, 0x2c, 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r3, 0x0) chdir(&(0x7f0000000100)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') [ 586.882699][T14279] FAULT_INJECTION: forcing a failure. [ 586.882699][T14279] name failslab, interval 1, probability 0, space 0, times 0 08:17:55 executing program 5: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x305, &(0x7f0000000000)=ANY=[]}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x100000000000000a, 0x400000000100) [ 586.930203][T14285] BPF:[2] ARRAY (anon) [ 586.939084][T14285] BPF:type_id=5 index_type_id=1 nr_elems=63 [ 586.955371][T14279] CPU: 1 PID: 14279 Comm: syz-executor.3 Not tainted 5.5.0-rc7-syzkaller #0 [ 586.964098][T14279] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 586.974173][T14279] Call Trace: [ 586.977486][T14279] dump_stack+0x197/0x210 [ 586.981842][T14279] should_fail.cold+0xa/0x15 [ 586.986455][T14279] ? fault_create_debugfs_attr+0x180/0x180 [ 586.992280][T14279] ? ___might_sleep+0x163/0x2c0 [ 586.997157][T14279] __should_failslab+0x121/0x190 [ 587.002113][T14279] should_failslab+0x9/0x14 [ 587.006639][T14279] kmem_cache_alloc_node_trace+0x274/0x750 [ 587.012468][T14279] ? __this_cpu_preempt_check+0x35/0x190 [ 587.018129][T14279] __kmalloc_node+0x3d/0x70 [ 587.022665][T14279] kvmalloc_node+0x68/0x100 [ 587.027188][T14279] traverse+0x3e9/0x730 [ 587.031364][T14279] ? seq_open_private+0x50/0x50 [ 587.036774][T14279] seq_read+0x906/0x1170 [ 587.041048][T14279] ? seq_open_private+0x50/0x50 [ 587.045908][T14279] proc_reg_read+0x1fc/0x2c0 [ 587.050515][T14279] ? proc_reg_compat_ioctl+0x2a0/0x2a0 [ 587.055995][T14279] ? rw_verify_area+0x126/0x360 [ 587.060860][T14279] do_iter_read+0x4a4/0x660 [ 587.065372][T14279] ? dup_iter+0x260/0x260 [ 587.069719][T14279] vfs_readv+0xf0/0x160 [ 587.073889][T14279] ? compat_rw_copy_check_uvector+0x4c0/0x4c0 08:17:55 executing program 1: r0 = socket$inet(0x2, 0x3, 0x2) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000240)='/dev/md0\x00', 0x0, 0x0) ioctl$void(r0, 0x5451) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) mkdir(&(0x7f00000005c0)='./file0\x00', 0x100000000020) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x7f, 0x4, 0x0, 0x0, 0x9, 0xfc, 0x0, 0x9d7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0x7) lstat(&(0x7f00000002c0)='./file1\x00', &(0x7f0000000340)) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x591800, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/nullb0\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, 0x0) close(0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000180)=ANY=[], &(0x7f0000000140)) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}}, 0x98) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000040)={0x0, 0x3a8e}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f0000000600)={r4, 0x6, 0x140a09e5, 0x3, 0x9961, 0x3}, &(0x7f0000000540)=0x14) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r3, 0x84, 0x19, &(0x7f0000000580)={r5, 0x100}, 0xffffffffffffffe9) ioctl$DRM_IOCTL_GET_SAREA_CTX(r3, 0xc010641d, &(0x7f0000000300)={0x0, &(0x7f0000000480)=""/112}) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm-monitor\x00', 0x200000, 0x0) r6 = dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_CONGESTION(r6, 0x6, 0xd, &(0x7f0000000180)='lp\x00', 0x3) ioctl$VIDIOC_TRY_FMT(r6, 0xc0d05640, &(0x7f0000000400)={0xa, @raw_data="d456e651514154be56c23a0150374fec800b3363d0f8209aea95ae10a4bfe2bc4a059b555ffe32ee49657c21fdaeec9ff08b45f3c5b652502dd578edc616a43da8fa7411c10cf0be3062500d3923e6f93300ce6e6ca32a13179605ca95c9250023e974040392fcffaac49faad6d6549cb1f2e1c7492ba9a8e2d26787e1872027fbe8577edbc559354f305d4e05c26a2f708bb008ca01368edece7ac1108379664aea7622db8fe0f786d6a4177494b3766d3f6f8e4c69729d1cdef558344c8bab4dfc9bfc6bc56bfa"}) ioctl$GIO_UNIMAP(r6, 0x4b66, &(0x7f0000000840)={0x2, &(0x7f0000000280)=[{}, {}]}) clock_gettime(0x0, &(0x7f0000000a40)={0x0, 0x0}) select(0x40, &(0x7f0000000200)={0x4, 0x7, 0x3ff, 0x3, 0xffffffffffffffe1, 0x6, 0x4b4, 0x80000001}, &(0x7f00000009c0)={0x4ebe, 0x5, 0x1, 0x7, 0x1, 0x8, 0x7, 0x100}, &(0x7f0000000a00)={0x0, 0xffffffff, 0x80000001, 0x1f, 0xfffffffffffffffd, 0x1, 0x8, 0x8000}, &(0x7f0000000a80)={r7, r8/1000+10000}) ioprio_set$pid(0x7, 0x0, 0x9) ioctl$BLKPG(r1, 0x932, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0x7fff) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) add_key(&(0x7f0000000680)='asymmetric\x00', &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, 0x0) request_key(&(0x7f00000004c0)='pkcs7_test\x00', &(0x7f0000000500)={'syz', 0x1}, &(0x7f0000000540)='wlan0\x00', 0x0) [ 587.080315][T14279] ? __kasan_check_read+0x11/0x20 [ 587.085371][T14279] ? ksys_dup3+0x3e0/0x3e0 [ 587.089825][T14279] ? __fget_light+0x55/0x230 [ 587.094439][T14279] ? __fget_light+0x1a9/0x230 [ 587.099140][T14279] do_preadv+0x1c4/0x280 [ 587.103432][T14279] ? do_readv+0x330/0x330 [ 587.107773][T14279] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 587.113251][T14279] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 587.118727][T14279] ? do_syscall_64+0x26/0x790 [ 587.123425][T14279] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe 08:17:55 executing program 5: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x305, &(0x7f0000000000)=ANY=[]}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x100000000000000b, 0x400000000100) [ 587.129506][T14279] ? do_syscall_64+0x26/0x790 [ 587.134215][T14279] __x64_sys_preadv+0x9a/0xf0 [ 587.138918][T14279] do_syscall_64+0xfa/0x790 [ 587.143469][T14279] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 587.149376][T14279] RIP: 0033:0x45b349 [ 587.153285][T14279] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 587.172900][T14279] RSP: 002b:00007f1ebe0a8c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 08:17:55 executing program 4: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) write$FUSE_LK(0xffffffffffffffff, &(0x7f0000000000)={0x28, 0xffffffffffffffda, 0x5, {{0x8, 0x200, 0x2, r2}}}, 0x28) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [{}], {}, [], {0x10, 0x2}}, 0x2c, 0x0) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r4, 0x0) chdir(&(0x7f0000000100)='./file0\x00') r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) recvfrom$inet6(r5, &(0x7f0000000040)=""/80, 0x50, 0x0, &(0x7f0000000180)={0xa, 0x4e23, 0x7ff, @rand_addr="6a57971d86c4daab20af488cc348a9e3", 0x3f}, 0x1c) symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') [ 587.181335][T14279] RAX: ffffffffffffffda RBX: 00007f1ebe0a96d4 RCX: 000000000045b349 [ 587.189321][T14279] RDX: 1000000000000304 RSI: 00000000200017c0 RDI: 0000000000000003 [ 587.197304][T14279] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 587.205290][T14279] R10: 0000400000000100 R11: 0000000000000246 R12: 0000000000000005 [ 587.213269][T14279] R13: 000000000000082c R14: 00000000004c9a3e R15: 0000000000000001 08:17:55 executing program 0: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [{}], {}, [], {0x10, 0x2}}, 0x2c, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000000)='./file0/file0\x00', 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r3, 0x0) chdir(&(0x7f0000000100)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') [ 587.314869][T14285] BPF: [ 587.325547][T14285] BPF:Invalid index [ 587.348826][T14285] BPF: [ 587.348826][T14285] 08:17:56 executing program 5: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x305, &(0x7f0000000000)=ANY=[]}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x100000000000000c, 0x400000000100) 08:17:56 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x16, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffff1971a4f0ff00000000b7060000000000811e6403000000000045040400010000001704000001000a00b7040000000100006a0af2fe00000000850000001a000000b70000000000000095000000000000009e17890efaee5eab7ff8a8cdc21ce784909b849d5550ad855dab54d8877a6db61d69f2ffcaa10350e11cb97c8adf1bc9a0c4ee6d9674c77404ceb9971e43405d621ffbc9a4fd39b0b56bfe6508ebb3c44eb84049761451ce540c772e2d9f8004e26f7fcc059c062234d5595f6fba87b81d1106fb0289ce67a66afd9ac3d09e29a9d542ca9d85a5c9c88474895d679838def0a83a733dc6a39b63a5ed69d32394c53361d7480884bd8048a967d9b912ef9f1d6fee41f5b29d37acb91c61ccd1df673896450f859ce8122a79c3e4"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000340)}, 0x42) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0xffffffffa0008000, 0xffffffffffffff3e, 0x0, &(0x7f0000000040)="a34747e865af5cf11e34bdff7a7a5ba0051aae5804d5a05d9b9ff68e12bb4d43a20375ea905795449b957e956aa6", 0x0, 0x401, 0x0, 0x0, 0xfffffffffffffff3}, 0x28) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f0000000240)={0x1ff, 0xc, 0x4, 0x0, 0x27e5, {}, {0x4, 0x8, 0x4, 0x8, 0x7, 0x6, "96669900"}, 0x7, 0x0, @fd=r0, 0x9, 0x0, r2}) r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="9feb010018000000000000002498a400240000000200000000000000000000040900000000000000000000030000000005000000010000003f0000000000"], &(0x7f0000000080)=""/236, 0x3e, 0xec, 0x8}, 0x20) ioctl$EVIOCGLED(r3, 0x80404519, &(0x7f0000000580)=""/250) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000180)='lp\x00', 0x3) ioctl$VIDIOC_TRY_FMT(0xffffffffffffffff, 0xc0d05640, &(0x7f0000000400)={0xa, @raw_data="d456e651514154be56c23a0150374fec800b3363d0f8209aea95ae10a4bfe2bc4a059b555ffe32ee49657c21fdaeec9ff08b45f3c5b652502dd578edc616a43da8fa7411c10cf0be3062500d3923e6f93300ce6e6ca32a13179605ca95c9250023e974040392fcffaac49faad6d6549cb1f2e1c7492ba9a8e2d26787e1872027fbe8577edbc559354f305d4e05c26a2f708bb008ca01368edece7ac1108379664aea7622db8fe0f786d6a4177494b3766d3f6f8e4c69729d1cdef558344c8bab4dfc9bfc6bc56bfa"}) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) 08:17:56 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$alg(0x26, 0x5, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockname$unix(0xffffffffffffffff, &(0x7f00000004c0)=@abs, 0x0) sendmsg$IPCTNL_MSG_CT_GET(r0, &(0x7f0000000080)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000180)={0x14, 0x1, 0x1, 0x201, 0x0, 0x0, {0x2}}, 0x14}}, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 08:17:56 executing program 0: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [{}], {}, [], {0x10, 0x2}}, 0x2c, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x2, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000040)={&(0x7f0000000200)={0x54, 0x2, 0x6, 0x0, 0x0, 0x0, {0x7, 0x0, 0x2}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x7}, @IPSET_ATTR_DATA={0x28, 0x7, 0x0, 0x1, [@IPSET_ATTR_MARK={0x8, 0xa, 0x1, 0x0, 0xb32}, @IPSET_ATTR_CIDR={0x5, 0x3, 0x7f}, @IPSET_ATTR_MARKMASK={0x8, 0xb, 0x1, 0x0, 0x3}, @IPSET_ATTR_IP_TO={0xc, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @remote}}]}]}, 0x54}, 0x1, 0x0, 0x0, 0xc8d0}, 0x4000) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r3, 0x0) chdir(&(0x7f0000000100)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') 08:17:56 executing program 4: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000000)=ANY=[@ANYBLOB="02000000010000000000000002000000", @ANYRES32=0x0, @ANYBLOB="04000000000000001000029fff07dd0e7a3b950000002029cb87a1a65b28fb149c95b56dcb12ee51d64c358f38059525524cf95b54ea68146431469860f6af8a1e62d2c15b030b000000009ffe663a7c018efa58d3db0d310000000000000000478e000000000000000000"], 0x2c, 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r3, 0x0) chdir(&(0x7f0000000100)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') 08:17:56 executing program 3 (fault-call:3 fault-nth:2): sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x305, &(0x7f0000000000)=ANY=[]}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1000000000000304, 0x400000000100) 08:17:56 executing program 5: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x305, &(0x7f0000000000)=ANY=[]}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x100000000000000d, 0x400000000100) [ 587.615236][T14416] BPF:Total section length too long 08:17:56 executing program 5: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x305, &(0x7f0000000000)=ANY=[]}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x100000000000000e, 0x400000000100) 08:17:56 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x16, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffff1971a4f0ff00000000b7060000000000811e6403000000000045040400010000001704000001000a00b7040000000100006a0af2fe00000000850000001a000000b70000000000000095000000000000009e17890efaee5eab7ff8a8cdc21ce784909b849d5550ad855dab54d8877a6db61d69f2ffcaa10350e11cb97c8adf1bc9a0c4ee6d9674c77404ceb9971e43405d621ffbc9a4fd39b0b56bfe6508ebb3c44eb84049761451ce540c772e2d9f8004e26f7fcc059c062234d5595f6fba87b81d1106fb0289ce67a66afd9ac3d09e29a9d542ca9d85a5c9c88474895d679838def0a83a733dc6a39b63a5ed69d32394c53361d7480884bd8048a967d9b912ef9f1d6fee41f5b29d37acb91c61ccd1df673896450f859ce8122a79c3e4"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000340)}, 0x42) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0xffffffffa0008000, 0xffffffffffffff3e, 0x0, &(0x7f0000000040)="a34747e865af5cf11e34bdff7a7a5ba0051aae5804d5a05d9b9ff68e12bb4d43a20375ea905795449b957e956aa6", 0x0, 0x401, 0x0, 0x0, 0xfffffffffffffff3}, 0x28) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f0000000240)={0x1ff, 0xc, 0x4, 0x0, 0x27e5, {}, {0x4, 0x8, 0x4, 0x8, 0x7, 0x6, "96669900"}, 0x7, 0x0, @fd=r0, 0x9, 0x0, r2}) r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@struct={0x0, 0x0, 0x0, 0x4, 0x0, 0x9}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x1, 0x3f}}]}}, &(0x7f0000000080)=""/236, 0x3e, 0xec, 0x8}, 0x20) ioctl$EVIOCGLED(r3, 0x80404519, &(0x7f0000000580)=""/250) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) ioctl$PPPIOCGDEBUG(r3, 0x80047441, &(0x7f00000002c0)) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) dup(0xffffffffffffffff) r5 = dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_CONGESTION(r5, 0x6, 0xd, &(0x7f0000000180)='lp\x00', 0x3) ioctl$VIDIOC_TRY_FMT(r5, 0xc0d05640, &(0x7f0000000400)={0xa, @raw_data="d456e651514154be56c23a0150374fec800b3363d0f8209aea95ae10a4bfe2bc4a059b555ffe32ee49657c21fdaeec9ff08b45f3c5b652502dd578edc616a43da8fa7411c10cf0be3062500d3923e6f93300ce6e6ca32a13179605ca95c9250023e974040392fcffaac49faad6d6549cb1f2e1c7492ba9a8e2d26787e1872027fbe8577edbc559354f305d4e05c26a2f708bb008ca01368edece7ac1108379664aea7622db8fe0f786d6a4177494b3766d3f6f8e4c69729d1cdef558344c8bab4dfc9bfc6bc56bfa"}) ioctl$BLKTRACESTART(r5, 0x1274, 0x0) 08:17:56 executing program 0: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="02000000010000000000000002000000", @ANYRES32=0x0, @ANYBLOB="04000000000000001000020000000000200000000000000095fecdd4509ddd46754e8dfdd10abcb0f16d06385e6d3bfbfd77b68f48c634f51a667a6c15f756ebbccb91ed55bf2a8bb78e799056b7d9193ac1ce1f1a8fe8b82a33c029ce381682bf361bccb9902210bee97e39fffc14fe8f24c145ec6a0152eae5bcae1a9d51c67f4ea4240780"], 0x2c, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r3, 0x0) chdir(&(0x7f0000000100)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') 08:17:56 executing program 4: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000400)={{{@in6=@dev, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}}}, &(0x7f0000000240)=0xe8) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [{0x2, 0x0, r2}], {}, [], {0x10, 0x2}, {0x20, 0x1}}, 0x2c, 0x0) r3 = socket(0x10, 0x2, 0x0) r4 = socket(0x10, 0x803, 0x0) socket$inet_udp(0x2, 0x2, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000080)={0xffffffffffffffff}) r6 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r6, 0xc0096616, &(0x7f0000000280)={0x4, [0x0, 0x0, 0x0, 0x0]}) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) getsockopt$IP6T_SO_GET_REVISION_MATCH(r4, 0x29, 0x44, &(0x7f0000000000)={'HL\x00'}, &(0x7f0000000040)=0x1e) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r7, 0x0) chdir(&(0x7f0000000100)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') 08:17:56 executing program 5: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x305, &(0x7f0000000000)=ANY=[]}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x100000000000000f, 0x400000000100) [ 588.028346][T14539] BPF:[2] ARRAY (anon) [ 588.032698][T14539] BPF:type_id=5 index_type_id=1 nr_elems=63 [ 588.066972][T14539] BPF: [ 588.085262][T14539] BPF:Invalid index [ 588.105959][T14539] BPF: [ 588.105959][T14539] 08:17:56 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x3}, 0x1c) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000300)={0x0, 0x0, 0xffffffffffff3ffc}, 0x4) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast2, 0x2}, 0x1c) sendto$inet6(r1, &(0x7f0000000300), 0xfdb8, 0x0, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) 08:17:56 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x305, &(0x7f0000000000)=ANY=[]}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1000000000000304, 0x400000000100) 08:17:56 executing program 0: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)=ANY=[@ANYBLOB="02000000010000000000000002000000", @ANYRES32=0x0, @ANYBLOB="040000002000000000000000"], 0x2c, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) setxattr$trusted_overlay_origin(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pread64(r1, &(0x7f0000000200)=""/129, 0x81, 0x3) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r3, 0x0) chdir(&(0x7f0000000100)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') 08:17:56 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x16, 0xe, &(0x7f0000000680)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffff1971a4f0ff00000000b7060000000000811e6403000000000045040400010000001704000001000a00b7040000000100006a0af2fe00000000850000001a000000b70000000000000095000000000000009e17890efaee5eab7ff8a8cdc21ce784909b849d5550ad855dab54d8877a6db61d69f2ffcaa10350e11cb97c8adf1bc9a0c4ee6d9674c77404ceb9971e43405d621ffbc9a4fd39b0b56bfe6508ebb3c44eb84049761451ce540c772e2d9f8004e26f7fcc059c062234d5b0e047b348b3a8d306fb0289ce67a66afd9ac3d09e29a9d542ca9d85a5c9c88474895d679838def0a83a733daba39b63a5ed69d32394c53361d7480884bd8048b767d9b912ef9f1d6fee41f5b29d37acb91c61ccd1df673896450f859ce8122a79c3e479b5f1ebff4591459212d0d521beb70eb52714fc634e2e1bea3c11456b340579eec6a63a70034263b84330a49a684987352e5ab6af3601dc83fe272c332f98779b6f85ce5874d892901ec57a6dcc31607708d6a714737125c5abd73795500c70ffec1fbb31c3c86b652a812ad9a66352d042b08496a2a029f9c3ce1abdcc3d4c8e588d6dd4bdb12fa1c0de9c5595faf88c1c8733c4f5e350c1856edd6675ca9e0d938ee4df6f1fbf97701c9188194a1c37d11122ab30975c1f935d0b532983b27c935eb99d25d8393568b9de1358b54397ff4c6e5513"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000340)}, 0x42) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0xffffffffa0008000, 0xffffffffffffff3e, 0x0, &(0x7f0000000040)="a34747e865af5cf11e34bdff7a7a5ba0051aae5804d5a05d9b9ff68e12bb4d43a20375ea905795449b957e956aa6", 0x0, 0x401, 0x0, 0x0, 0xfffffffffffffff3}, 0x28) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f0000000240)={0x1ff, 0xc, 0x4, 0x0, 0x27e5, {}, {0x4, 0x8, 0x4, 0x8, 0x7, 0x6, "96669900"}, 0x7, 0x0, @fd=r0, 0x9, 0x0, r2}) r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@struct={0x0, 0x0, 0x0, 0x4, 0x0, 0x9}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x1, 0x3f}}]}}, &(0x7f0000000080)=""/236, 0x3e, 0xec, 0x8}, 0x20) ioctl$EVIOCGLED(r3, 0x80404519, &(0x7f0000000580)=""/250) r4 = socket(0x10, 0x803, 0x0) init_module(&(0x7f00000002c0)='GPL\x00', 0x4, &(0x7f0000000500)='keyringbdev\x00') sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) dup(0xffffffffffffffff) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r7 = accept$inet(r6, &(0x7f0000000380)={0x2, 0x0, @remote}, &(0x7f00000003c0)=0x10) r8 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r9) setsockopt$inet_IP_XFRM_POLICY(r7, 0x0, 0x11, &(0x7f00000008c0)={{{@in=@initdev={0xac, 0x1e, 0x1, 0x0}, @in=@multicast2, 0x4e23, 0x4, 0x4e24, 0x8103, 0x8, 0x20, 0x20, 0x2c, r5, r9}, {0xffffffffffffff7f, 0x7, 0x7, 0x7, 0x2, 0xffffffffffffff2d, 0x101, 0x5}, {0x8, 0xfff, 0x3, 0x4e}, 0x6, 0x6e6bb4, 0x2, 0x0, 0x1, 0x2}, {{@in=@empty, 0x4d5, 0x2b}, 0xa, @in6=@remote, 0x3500, 0x0, 0x0, 0xfa, 0x7, 0xff, 0x80}}, 0xe8) r10 = dup(0xffffffffffffffff) r11 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r11, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r11, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) setsockopt$inet_tcp_TCP_CONGESTION(r11, 0x6, 0xd, &(0x7f0000000300)='nv\x00', 0xffffffffffffffe3) ioctl$VIDIOC_TRY_FMT(r10, 0xc0d05640, &(0x7f0000000400)={0xa, @raw_data="d456e651514154be56c23a0150374fec800b3363d0f8209aea95ae10a4bfe2bc4a059b555ffe32ee49657c21fdaeec9ff08b45f3c5b652502dd578edc616a43da8fa7411c10cf0be3062500d3923e6f93300ce6e6ca32a13179605ca95c9250023e974040392fcffaac49faad6d6549cb1f2e1c7492ba9a8e2d26787e1872027fbe8577edbc559354f305d4e05c26a2f708bb008ca01368edece7ac1108379664aea7622db8fe0f786d6a4177494b3766d3f6f8e4c69729d1cdef558344c8bab4dfc9bfc6bc56bfa"}) ioctl$BLKTRACESTART(r10, 0x1274, 0x0) 08:17:56 executing program 4: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [{}], {}, [], {0x10, 0x2}}, 0x2c, 0x0) r2 = socket(0x10, 0x2, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xfffffffffffffed1) chown(&(0x7f00000001c0)='./file0\x00', r4, 0x0) chdir(&(0x7f0000000100)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') 08:17:56 executing program 5: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x305, &(0x7f0000000000)=ANY=[]}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1000000000000010, 0x400000000100) [ 588.354842][T14653] tpacket_rcv: packet too big, clamped from 64980 to 32624. macoff=96 [ 588.489376][T14660] BPF:[2] ARRAY (anon) [ 588.509034][T14660] BPF:type_id=5 index_type_id=1 nr_elems=63 08:17:57 executing program 5: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x305, &(0x7f0000000000)=ANY=[]}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1000000000000011, 0x400000000100) 08:17:57 executing program 0: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000000)=ANY=[@ANYBLOB="d0d43e9c9a9f9d0318558d09ff754d0fd9aa16b0bc51896b675588d24b43033240e8ebfb388511abe51dfb23fce4df68a0d7f257e811960d0a2b51224cc37117133c54b69bf6cd4b6adacf6286cd47f284a30fc5cc5595435b", @ANYRES32=0x0, @ANYBLOB="040000000000000010000200000000002000000000000000"], 0x2c, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r3, 0x0) chdir(&(0x7f0000000100)='./file0\x00') write$binfmt_aout(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="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"/308], 0x134) symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') [ 588.542651][T14660] BPF: [ 588.553777][T14660] BPF:Invalid index [ 588.570639][T14660] BPF: [ 588.570639][T14660] 08:17:57 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x305, &(0x7f0000000000)=ANY=[]}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1000000000000002, 0x400000000100) 08:17:57 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x35c, 0x20010003, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) 08:17:57 executing program 4: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000000)=ANY=[@ANYBLOB="02000000010000000000000002000000cced5993952054057bc9adb8bdcf8124a7be39a77662e296f33baa941b75debcf9a6903572c78c3a6ca73f0c11ea0d6dab5f3454b2336fc6d443043eadc8", @ANYRES32=0x0, @ANYBLOB="040000000000000010000200000000002000000000000000"], 0x2c, 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r3, 0x0) chdir(&(0x7f0000000100)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') 08:17:57 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x16, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000340)}, 0x42) r3 = dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f0000000180)='lp\x00', 0x3) ioctl$VIDIOC_TRY_FMT(r3, 0xc0d05640, &(0x7f0000000400)={0xa, @raw_data="d456e651514154be56c23a0150374fec800b3363d0f8209aea95ae10a4bfe2bc4a059b555ffe32ee49657c21fdaeec9ff08b45f3c5b652502dd578edc616a43da8fa7411c10cf0be3062500d3923e6f93300ce6e6ca32a13179605ca95c9250023e974040392fcffaac49faad6d6549cb1f2e1c7492ba9a8e2d26787e1872027fbe8577edbc559354f305d4e05c26a2f708bb008ca01368edece7ac1108379664aea7622db8fe0f786d6a4177494b3766d3f6f8e4c69729d1cdef558344c8bab4dfc9bfc6bc56bfa"}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r3, 0xffffffffa0008000, 0x2e, 0x0, &(0x7f0000000040)="a34747e865af5cf11e34bdff7a7a5ba0051aae5804d5a05d9b9ff68e12bb4d43a20375ea905795449b957e956aa6", 0x0, 0x40800401, 0x0, 0x0, 0x117, &(0x7f0000000300), &(0x7f0000000980)="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"}, 0x40) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f0000000240)={0x1ff, 0xc, 0x4, 0x0, 0x27e5, {}, {0x4, 0x8, 0x4, 0x8, 0x7, 0x6, "96669900"}, 0x7, 0x1, @fd=r0, 0x9, 0x0, r2}) r4 = fcntl$dupfd(r1, 0x0, r0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000840)=0x14) getsockopt$inet_dccp_buf(r5, 0x21, 0xc0, &(0x7f0000000300), &(0x7f0000000500)) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@struct={0x0, 0x0, 0x0, 0x4, 0x0, 0x9}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x1, 0x3f}}]}}, &(0x7f0000000080)=""/236, 0x3e, 0xec, 0x8}, 0x20) r6 = dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_CONGESTION(r6, 0x6, 0xd, &(0x7f0000000180)='lp\x00', 0x3) ioctl$VIDIOC_TRY_FMT(r6, 0xc0d05640, &(0x7f0000000400)={0xa, @raw_data="d456e651514154be56c23a0150374fec800b3363d0f8209aea95ae10a4bfe2bc4a059b555ffe32ee49657c21fdaeec9ff08b45f3c5b652502dd578edc616a43da8fa7411c10cf0be3062500d3923e6f93300ce6e6ca32a13179605ca95c9250023e974040392fcffaac49faad6d6549cb1f2e1c7492ba9a8e2d26787e1872027fbe8577edbc559354f305d4e05c26a2f708bb008ca01368edece7ac1108379664aea7622db8fe0f786d6a4177494b3766d3f6f8e4c69729d1cdef558344c8bab4dfc9bfc6bc56bfa"}) ioctl$VIDIOC_QUERY_EXT_CTRL(r6, 0xc0e85667, &(0x7f0000000ac0)={0x0, 0x5, "4f384238707fb432298685b67fef66f70323c11017251ae2b2b835ec6b1f053c", 0x1f, 0xffffffffffff6fa2, 0xffffffffc0000000, 0xc, 0x4b, 0x8001, 0x6, 0x3, [0x3ff, 0x20ee, 0x3, 0x9]}) ioctl$EVIOCGLED(r4, 0x80404519, &(0x7f0000000580)=""/250) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) dup(0xffffffffffffffff) r8 = dup(0xffffffffffffffff) r9 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) setsockopt$inet_tcp_TCP_CONGESTION(r9, 0x6, 0xd, &(0x7f0000000540)='vegas\x00', 0x6) ioctl$VIDIOC_TRY_FMT(r8, 0xc0d05640, &(0x7f0000000400)={0xa, @raw_data="d456e651514154be56c23a0150374fec800b3363d0f8209aea95ae10a4bfe2bc4a059b555ffe32ee49657c21fdaeec9ff08b45f3c5b652502dd578edc616a43da8fa7411c10cf0be3062500d3923e6f93300ce6e6ca32a13179605ca95c9250023e974040392fcffaac49faad6d6549cb1f2e1c7492ba9a8e2d26787e1872027fbe8577edbc559354f305d4e05c26a2f708bb008ca01368edece7ac1108379664aea7622db8fe0f786d6a4177494b3766d3f6f8e4c69729d1cdef558344c8bab4dfc9bfc6bc56bfa"}) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r4, 0x84, 0x6e, &(0x7f0000000680)=[@in={0x2, 0x4e21, @loopback}, @in={0x2, 0x4e23, @broadcast}, @in6={0xa, 0x4e23, 0x7fff, @mcast1, 0x6}, @in={0x2, 0x4e20, @broadcast}, @in6={0xa, 0x4e24, 0x80, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x3}, @in6={0xa, 0x4e23, 0x5, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x1}], 0x84) ioctl$BLKTRACESTART(r8, 0x1274, 0x0) 08:17:57 executing program 5: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x305, &(0x7f0000000000)=ANY=[]}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1000000000000012, 0x400000000100) 08:17:57 executing program 0: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [{}], {}, [], {0x10, 0x2}}, 0x2c, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000000)) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x2, 0x0) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x101800, 0x0) write$eventfd(r3, &(0x7f0000000180)=0x8, 0x8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r4, 0x0) chdir(&(0x7f0000000100)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') 08:17:57 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x305, &(0x7f0000000000)=ANY=[]}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1000000000000003, 0x400000000100) [ 588.932028][T14790] BPF:[2] ARRAY (anon) [ 588.948842][T14790] BPF:type_id=5 index_type_id=1 nr_elems=63 [ 588.992520][T14790] BPF: [ 588.995948][T14790] BPF:Invalid index [ 589.024842][T14790] BPF: [ 589.024842][T14790] 08:17:57 executing program 5: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x305, &(0x7f0000000000)=ANY=[]}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1000000000000013, 0x400000000100) 08:17:57 executing program 4: mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="02000000010000000000090002000000823da37f463e7445fc0ddafd164008d01be732d429ee95d2e8650a0294029cfe649ed7c6b89007ea1000247b90171d2087dc54c43557339e8e1b6f51a25b63ab65a321a5c124fec4ccdc922cd0266051efe5bf458e509251558e1e3e2730a028366e071d49ba15d178f9ba3f720993debf18880cbf8c552e8aa0aa4dcc51b645b35f2a9172b12de37ba7b1b5bbd0db0cd0750212adbdb0df7b252e199b94abbac0bebfc809697dedf8c103b258ad7a71e763eda1b57ee0bc864c5daeeb21610000000000", @ANYRES16=r1, @ANYRES32=r1], 0x3, 0x0) socket$inet(0x2, 0xf, 0x7) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r3, 0x0) chdir(&(0x7f0000000100)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') 08:17:57 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x305, &(0x7f0000000000)=ANY=[]}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1000000000000004, 0x400000000100) 08:17:57 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x16, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000340)}, 0x42) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0xffffffffa0008000, 0xffffffffffffff3e, 0x0, &(0x7f0000000040)="a34747e865af5cf11e34bdff7a7a5ba0051aae5804d5a05d9b9ff68e12bb4d43a20375ea905795449b957e956aa6", 0x0, 0x401, 0x0, 0x0, 0xfffffffffffffff3}, 0x28) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f0000000240)={0x1ff, 0xc, 0x4, 0x0, 0x27e5, {}, {0x4, 0x8, 0x4, 0x8, 0x7, 0x6, "96669900"}, 0x7, 0x0, @fd=r0, 0x9, 0x0, r2}) r4 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@struct={0x0, 0x0, 0x0, 0x4, 0x0, 0x9}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x1, 0x3f}}]}}, &(0x7f0000000080)=""/236, 0x3e, 0xec, 0x8}, 0x20) ioctl$EVIOCGLED(r4, 0x80404519, &(0x7f0000000580)=""/250) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) dup(0xffffffffffffffff) r6 = dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_CONGESTION(r6, 0x6, 0xd, &(0x7f0000000180)='lp\x00', 0x3) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r7, 0x84, 0x75, &(0x7f00000002c0)={0x0, 0x5}, &(0x7f0000000300)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r3, 0x84, 0x0, &(0x7f0000000500)={r8, 0x9, 0x2, 0x3f}, 0x10) ioctl$VIDIOC_TRY_FMT(r6, 0xc0d05640, &(0x7f0000000400)={0xa, @raw_data="d456e651514154be56c23a0150374fec800b3363d0f8209aea95ae10a4bfe2bc4a059b555ffe32ee49657c21fdaeec9ff08b45f3c5b652502dd578edc616a43da8fa7411c10cf0be3062500d3923e6f93300ce6e6ca32a13179605ca95c9250023e974040392fcffaac49faad6d6549cb1f2e1c7492ba9a8e2d26787e1872027fbe8577edbc559354f305d4e05c26a2f708bb008ca01368edece7ac1108379664aea7622db8fe0f786d6a4177494b3766d3f6f8e4c69729d1cdef558344c8bab4dfc9bfc6bc56bfa"}) ioctl$BLKTRACESTART(r6, 0x1274, 0x0) 08:17:57 executing program 5: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x305, &(0x7f0000000000)=ANY=[]}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1000000000000014, 0x400000000100) 08:17:57 executing program 4: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [{}], {}, [], {0x10, 0x2}}, 0x2c, 0x0) r2 = socket(0x10, 0x2, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x400800, 0x0) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') sendmsg$NL80211_CMD_STOP_SCHED_SCAN(r2, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000080)={&(0x7f0000000200)={0x8c, r3, 0x400, 0x70bd26, 0x25dfdbfd, {}, [@NL80211_ATTR_BSSID={0xa}, @NL80211_ATTR_SCHED_SCAN_MULTI={0x4}, @NL80211_ATTR_SCAN_FREQUENCIES={0x4c, 0x2c, [{0x8, 0x0, 0xfff}, {0x8, 0x0, 0x4}, {0x8, 0x0, 0x3}, {0x8, 0x0, 0x9}, {0x8, 0x0, 0xff}, {0x8, 0x0, 0xa0}, {0x8, 0x0, 0xffffffff}, {0x8, 0x0, 0xffffffff}, {0x8, 0x0, 0xfffff243}]}, @NL80211_ATTR_BSSID={0xa, 0xf5, @remote}, @NL80211_ATTR_SCHED_SCAN_DELAY={0x8, 0xdc, 0x1}, @NL80211_ATTR_BG_SCAN_PERIOD={0x6, 0x98, 0x6}]}, 0x8c}, 0x1, 0x0, 0x0, 0x4040880}, 0x810) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r4, 0x0) chdir(&(0x7f0000000100)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') [ 589.375442][T14917] BPF:[2] ARRAY (anon) [ 589.392598][T14917] BPF:type_id=5 index_type_id=1 nr_elems=63 [ 589.424567][T14917] BPF: [ 589.427516][T14917] BPF:Invalid index [ 589.454809][T14917] BPF: [ 589.454809][T14917] 08:17:58 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) r0 = socket(0x1, 0x2, 0x0) getsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000140), &(0x7f0000000100)=0x1002e) fcntl$getownex(r0, 0x10, &(0x7f0000000240)) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f00000000c0)) ptrace(0x10, r1) ptrace$getregset(0x4204, r1, 0x201, &(0x7f00000001c0)={0x0}) r2 = syz_open_procfs(r1, &(0x7f0000000380)='net/mcfilter6\x00') fchdir(r2) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x9) unshare(0x28020400) socket$inet6_sctp(0xa, 0x5, 0x84) epoll_create1(0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) fanotify_init(0x10, 0x80000) epoll_create1(0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r3 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r4 = clone3(0x0, 0x0) r5 = clone3(&(0x7f0000000280)={0x80040000, 0x0, &(0x7f00000000c0), 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) kcmp(r4, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) r6 = socket(0xb, 0x0, 0x0) getsockopt$sock_timeval(r6, 0x1, 0x15, &(0x7f0000000140), &(0x7f0000000100)=0x1002e) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r6, &(0x7f0000000100)={0x8}) process_vm_writev(r5, &(0x7f0000000780)=[{&(0x7f00000004c0)=""/175, 0xaf}, {0x0}, {0x0}, {0x0}], 0x4, &(0x7f0000000580)=[{&(0x7f0000000ac0)=""/252, 0xfc}, {0x0}, {0x0}], 0x3, 0x0) 08:17:58 executing program 0: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)=ANY=[@ANYBLOB="02000000010000000000000002000000", @ANYRES32=0x0, @ANYBLOB="040000000000000010000200000000200000000000000000"], 0x2c, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x4000, 0x0) accept4$vsock_stream(r4, &(0x7f0000000040)={0x28, 0x0, 0xfffffffe, @hyper}, 0x10, 0x80000) chown(&(0x7f00000001c0)='./file0\x00', r3, 0x0) chdir(&(0x7f0000000100)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') 08:17:58 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x305, &(0x7f0000000000)=ANY=[]}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1000000000000005, 0x400000000100) 08:17:58 executing program 5: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x305, &(0x7f0000000000)=ANY=[]}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1000000000000015, 0x400000000100) 08:17:58 executing program 4: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {0x1, 0x1}, [{}], {}, [], {0x10, 0x2}}, 0x2c, 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r3, 0x0) chdir(&(0x7f0000000100)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') 08:17:58 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x16, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffff1971a4f0ff00000000b7060000000000811e6403000000000045040400010000001704000001000a00b7040000000100006a0af2fe00000000850000001a000000b70000000000000095000000000000009e17890efaee5eab7ff8a8cdc21ce784909b849d5550ad855dab54d8877a6db61d69f2ffcaa10350e11cb97c8adf1bc9a0c4ee6d9674c77404ceb9971e43405d621ffbc9a4fd39b0b56bfe6508eba3c44eb84049761451ce540c772e2d9f8004e26f7fcc059c062234d5595f6fba87b81d1106fb0289ce67a66afd9ac3d09e29a9d542ca9d85a5c9c88474895d679838def0a83a733dc6a39b63a5ed69d32394c53361d7480884bd8048a967d9b912ef9f1d6fee41f5b29d032332f137acb91c61ccd1df673896450f859ce812"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000340)}, 0x42) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0xffffffffa0008000, 0xffffffffffffff3e, 0x0, &(0x7f0000000040)="a34747e865af5cf11e34bdff7a7a5ba0051aae5804d5a05d9b9ff68e12bb4d43a20375ea905795449b957e956aa6", 0x0, 0x401, 0x0, 0x0, 0xfffffffffffffff3}, 0x28) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f0000000240)={0x1ff, 0xc, 0x4, 0x0, 0x27e5, {}, {0x4, 0x8, 0x4, 0x8, 0x7, 0x6, "96669900"}, 0x7, 0x0, @fd=r0, 0x9, 0x0, r2}) r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@struct={0x0, 0x0, 0x0, 0x4, 0x0, 0x9}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x1, 0x3f}}]}}, &(0x7f0000000080)=""/236, 0x3e, 0xec, 0x8}, 0x20) ioctl$EVIOCGLED(r3, 0x80404519, &(0x7f0000000580)=""/250) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) dup(0xffffffffffffffff) r5 = dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_CONGESTION(r5, 0x6, 0xd, &(0x7f0000000180)='lp\x00', 0x3) ioctl$VIDIOC_TRY_FMT(r5, 0xc0d05640, &(0x7f0000000400)={0xa, @raw_data="d456e651514154be56c23a0150374fec800b3363d0f8209aea95ae10a4bfe2bc4a059b555ffe32ee49657c21fdaeec9ff08b45f3c5b652502dd578edc616a43da8fa7411c10cf0be3062500d3923e6f93300ce6e6ca32a13179605ca95c9250023e974040392fcffaac49faad6d6549cb1f2e1c7492ba9a8e2d26787e1872027fbe8577edbc559354f305d4e05c26a2f708bb008ca01368edece7ac1108379664aea7622db8fe0f786d6a4177494b3766d3f6f8e4c69729d1cdef558344c8bab4dfc9bfc6bc56bfa"}) ioctl$BLKTRACESTART(r5, 0x1274, 0x0) [ 589.815732][T15041] BPF:[2] ARRAY (anon) [ 589.827778][T15041] BPF:type_id=5 index_type_id=1 nr_elems=63 [ 589.842845][T15041] BPF: [ 589.851591][T15041] BPF:Invalid index 08:17:58 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x305, &(0x7f0000000000)=ANY=[]}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1000000000000006, 0x400000000100) 08:17:58 executing program 0: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [{0x2, 0x0, r1}], {}, [], {0x10, 0x2}}, 0x2c, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r5 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f00000002c0)='NLBL_UNLBL\x00') sendmsg$NLBL_UNLABEL_C_LIST(r4, &(0x7f0000000440)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)={0x54, r5, 0x200, 0x0, 0x25dfdbfe, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @loopback}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @rand_addr=0x8000}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @local}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @broadcast}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @multicast1}]}, 0x54}, 0x1, 0x0, 0x0, 0x20000000}, 0x20044841) r6 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r7, 0x0) sendmsg$NFT_MSG_GETSETELEM(r3, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000040)={&(0x7f0000000840)={0x3f80, 0xd, 0xa, 0x201, 0x0, 0x0, {0xc, 0x0, 0x6}, [@NFTA_SET_ELEM_LIST_SET_ID={0x8, 0x4, 0x1, 0x0, 0x3}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_ELEM_LIST_SET_ID={0x8}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_ELEM_LIST_ELEMENTS={0x3f24, 0x3, 0x0, 0x1, [{0x13b4, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_KEY={0x88, 0x1, 0x0, 0x1, [@NFTA_DATA_VALUE={0x84, 0x1, "3658a7fe7cbba79c2fe859ee7b1d8f77b6965b820d6016ab9820ea105cdebed2ed323b201048bb82edfa45dcf072fd9a523dd71722aa07d58f3147dc9477ec5a6d503ed3ad773eda2854c0e18130f75996855cb29aa6bb42e32d8775e6c6b3cf47b1fae1647514dcc308cb28164c399f972d474b883ecb081011bc1012ef3f6a"}]}, @NFTA_SET_ELEM_OBJREF={0x9, 0x9, 'syz2\x00'}, @NFTA_SET_ELEM_EXPIRATION={0xc, 0x5, 0x1, 0x0, 0x9}, @NFTA_SET_ELEM_KEY={0x11e0, 0x1, 0x0, 0x1, [@NFTA_DATA_VALUE={0x31, 0x1, "cfcef6778cb5d4c1b2c6d1b9aca22fc259e2309a1262ed790477d7e3359c892fec5d87488529b2a69ca0c8542f"}, @NFTA_DATA_VALUE={0x72, 0x1, "02c294cadca96d0e52818a613596da69a571ca47fcab0081a9ca7aacb9b8437029c08152b9a892a386185d2bc7a6da57e518a51a72e4e485112bec202c9545bc5f79bfa9ab611d088995c2e9c97afa43ce609d9651d1ebab1cef3ebf947e3e7d5f908f35b6bb89af72e210290d4f"}, @NFTA_DATA_VALUE={0x1004, 0x1, "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"}, @NFTA_DATA_VALUE={0x23, 0x1, "78d2c460d2892955bfd436113e35e64d532aaa9ef25e220e17450da014182f"}, @NFTA_DATA_VERDICT={0x54, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}]}, @NFTA_DATA_VALUE={0x7e, 0x1, "2a958a5e6e41cf0608c039b698daca7ac2ba1f54a116e659174505ea0421b231bf90d1f9b9cf15ff2470e2a205fc88e7fca3189ceb17131c1cc1306e2a554837f68b340dfb076f5fec990508ec1ca1caba69f4470e0438b3f288d54c0bbc0452f55ef5c01c3235f9daa62315044ca69625d9f57633dd6ea5a80a"}, @NFTA_DATA_VERDICT={0x4}, @NFTA_DATA_VALUE={0x33, 0x1, "0054e8faf094222a1dfa6cb1ea03e320dd771133cb0300a737bd3671c3dea3aef9a52795a3b4678388f4a86cb21c0d"}]}, @NFTA_SET_ELEM_USERDATA={0xbd, 0x6, 0x1, 0x0, "ebdb580f1607dc57186301f9f1250a3c28de974ca992f0b31b622f8fcebb6a0c76037291de94d9538853707cc6afcb703060ff1c8d51e72c54ab8464da4730525cc2804cb8c5b7ca565ddb0cdaff74de1d8e83d40e17c36a15e1ea67ceb62911b9bf916f4160ce7d88963ad184a54dc9e2e63789e1e74f98d963e449e660033afe479474a9cabfc278ceb1c5fa92ae1c0c2d27e730a98de1ca40298c31e34cf484a6cd051de03a0ce86bb3ee30450994f3af84bf9bf8752d1d"}, @NFTA_SET_ELEM_TIMEOUT={0xc, 0x4, 0x1, 0x0, 0x648}, @NFTA_SET_ELEM_USERDATA={0x61, 0x6, 0x1, 0x0, "83e573aced89d9fa7df1288bd5bf19bc5d7d7b9a3604be4d984b3b57e5eeaf4a89b458f9747e58859467f4e8297d5928fb6478e7b5313e13dc77ac62a1fe799fe6a74e1c94ee2a20021c0059e67638f6e41e483beb9caac5db94d76d0c"}]}, {0x208, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_KEY={0xb4, 0x1, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x30, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}]}, @NFTA_DATA_VERDICT={0x10, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}]}, @NFTA_DATA_VERDICT={0x2c, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}]}, @NFTA_DATA_VERDICT={0x10, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}]}, @NFTA_DATA_VERDICT={0x34, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffd}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}]}]}, @NFTA_SET_ELEM_DATA={0x130, 0x2, 0x0, 0x1, [@NFTA_DATA_VALUE={0x7f, 0x1, "27bfff698724718251f34182f8f31b492b47246f159094b244431de3817746596a33f5f88895a2f615d1b2b61fb4549d0235c1cf86b2ff2392451e0656628567b6d7cf78b68d924a5c1ea1a2d25e0164b678d14de38927111b5e7634cf1e7a7c345bc864ecd2eddf3f0fa422aa65499eb1739f1c59e4d630593a5e"}, @NFTA_DATA_VERDICT={0x18, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}]}, @NFTA_DATA_VALUE={0x93, 0x1, "ebdfc725998d697cb5aafd80230370b007483ca2ae5bd5482aab4798686a1de9a0bfd57d3988b8beae710f2e5c35f38a82679bac43059896283a49aac1408ba89ed699264e31589c7286850170f4f7ab5af223bb05fef10dfbcb020a697fff0b431b7a37682fd2e2c34933392869173a5b66d436f92db09b3818a1eff935e6506faae7f3ef0be72d13079d40e52c11"}]}, @NFTA_SET_ELEM_TIMEOUT={0xc, 0x4, 0x1, 0x0, 0x5}, @NFTA_SET_ELEM_OBJREF={0x9, 0x9, 'syz1\x00'}, @NFTA_SET_ELEM_FLAGS={0x8, 0x3, 0x1, 0x0, 0x1}]}, {0x177c, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_FLAGS={0x8, 0x3, 0x1, 0x0, 0x1}, @NFTA_SET_ELEM_DATA={0x2e4, 0x2, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x20, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}]}, @NFTA_DATA_VALUE={0xe0, 0x1, "fe542eda6f0bd8228c248a31404569f7d0ab75d96d27081d1236278a6e1c0e826facef73f7bcb0631377771733a1a6eb355ee6face9e78f438e08a558a2452d3b04e17e791771922e5355542848c7ff49f43acd4742fd2f9642c57943debbdbf2e63afc1afa3cdb94b19f8dfb965163f08b9469669d2939e0ff21ab9a79220c12de9a35160e58c26007d778f8dcbee513a0304ddc7e71f7a814cfa11a7dae4feeb8c25e452cce769404e1b9fd54217f5bf6c60c61d2a78cd6a782f42de55bba591f81b01a703490761d7916a76508329a726b62299e240e105b70b4e"}, @NFTA_DATA_VALUE={0xce, 0x1, "6c2552b53cfafeec2831871a1b8d480e92bf1c5a711fb5d639ebc52df808191991744aca82ef6193dd7cd512207d8e43984cbdf0831e7bf7578029c8db0cede57c278f8cdc5cba146ce85af4ce0da502f10d794d1e36cbc94f4690ea2f3935927c889ca1fc7a58ef595ba36eae7ae4cbad8d1b6096939e19911ea6715e6dd3de5350f71f951b9815a0f7b196d093ef889e0ef4961c0e2ca4ff013b69448f37523d5b5a051200a90cf8aaa58659465bbb521f060ae30c4a03ee2897d50791ff95d84d07732fb7e3eb6ae3"}, @NFTA_DATA_VERDICT={0x60, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffd}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}]}, @NFTA_DATA_VALUE={0x25, 0x1, "a85a9c4ee89be976226704628ceeef518675bf2df834fb6118eabc895a7015ecf7"}, @NFTA_DATA_VERDICT={0xc, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8}]}, @NFTA_DATA_VERDICT={0x2c, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffd}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}]}, @NFTA_DATA_VERDICT={0x50, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}]}]}, @NFTA_SET_ELEM_KEY={0x168, 0x1, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x48, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}]}, @NFTA_DATA_VALUE={0xb8, 0x1, "17c9a6d5ab6a4d7cd96c93e43b7fa7cf6e26dfc5e734f5865f7d272ebd56fa0b387be67c7f5c6ec982f68315a864ab6902761dcb9714b19c005388c7efe55b07b3b9ae423283dfab3cdf669846965ef1772ee2aecd3eef1bcf0429c43d06daa5a3e4afbee73cdc57700266d9472d9adf1616a6e41326a7c2d058c99a65f91bacae50b627613b85a2f369d7b6aa21be9bd40c46fbdd811ab4db3a3d2bf596cbe4ade76c1c8154f2bb2ad03ba3e9a2ec22142e9c0f"}, @NFTA_DATA_VALUE={0x63, 0x1, "1bf8ed2c2a690c09d9f0675f630c1c12fe1a0fa9749a3f1c56149570484e545bf7bcbea8fa03e2cdbe4130ec76e2e8dbc5f9d5eb4b1ed21c8a0c69a6e9adf64c523a3a8e04f17d723fd642ffbd442db2cbe1d3beece313849c8528fc616c11"}]}, @NFTA_SET_ELEM_EXPR={0x4}, @NFTA_SET_ELEM_DATA={0x1300, 0x2, 0x0, 0x1, [@NFTA_DATA_VERDICT={0xc, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffd}]}, @NFTA_DATA_VALUE={0x77, 0x1, "db82a08f0d520931c348d1d81db71abc7f0d9e8cb6177c310f44b9441b7f8b52dbf4c351022a48c5a1d86655f3b0d0b2f8e4c9a006e3281683671d74c3de2a34cc939011dd1f0e4fcef80a6a36ca9bd54b1bd01f69a2bd8421ee7f5c3f2659ea873fb55c6dc1b4ee92f5b4a0982c6ab69e525d"}, @NFTA_DATA_VERDICT={0x24, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}]}, @NFTA_DATA_VERDICT={0x18, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}]}, @NFTA_DATA_VERDICT={0x60, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffd}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}]}, @NFTA_DATA_VALUE={0xb6, 0x1, "c7506af52ca522fc4c429de53ee97461a8b947c54a9346f057df41f463f8c0ce85d3f44e87616375b8c9b5d285c6d4886d2664d4f09020018ccddd437a014e39e9484f3ed228cc93fab51965ae68fc64bf6ed8fed1a9fab7ec809d4d8ae8373030201387f601ef619269e49cd032a8ac2a4fa83875888910c6ebc3a27ee8679b29d4e3c004c5aa703ecf31b2e01ed196caedd7fbf2ccb22b1d75a482de874839bac8169aaa0afdc79d83bc551eb806bd291d"}, @NFTA_DATA_VALUE={0x1004, 0x1, "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"}, @NFTA_DATA_VALUE={0xe9, 0x1, "0317442b650f8c8889fc5206374dd450000656fb8cee490fbffbe1ce34f699c88e51572d5d71b0763e1f40d356953195cc42377680f6e6ee7aee637f33f7b97c3d9f947b12301639c1f77b1cc685ab392743cfcd504d8da9f2faec1b45b1f6d7b2edd71ee105148a03f5eb488c2737571d47a1b818e9c16a5a64233f5dad2bcfab411b6d70b229e80d3a47b1dbffc0d913474671b4b936d0fa5705ec0f0284d0d09f1be5902414a3d7f80952fc3447b5da9e32ff16d447009cc7980510a7e36f97e2c36c755154726881d04b54ff9b9631a6cf2ff83fa6c64e88464a85792d0f57d1a4e444"}, @NFTA_DATA_VERDICT={0x2c, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffd}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}]}, @NFTA_DATA_VALUE={0x7, 0x1, "e3ac92"}]}, @NFTA_SET_ELEM_EXPR={0x4}, @NFTA_SET_ELEM_OBJREF={0x9, 0x9, 'syz2\x00'}, @NFTA_SET_ELEM_DATA={0x10, 0x2, 0x0, 0x1, [@NFTA_DATA_VERDICT={0xc, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}]}]}]}, {0x11e8, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_KEY={0x4c, 0x1, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x48, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0x455b13604803495e}]}]}, @NFTA_SET_ELEM_KEY={0x118c, 0x1, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x14, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffd}]}, @NFTA_DATA_VALUE={0x1004, 0x1, "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"}, @NFTA_DATA_VERDICT={0x3c, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}]}, @NFTA_DATA_VALUE={0x16, 0x1, "53821cac24d5f8409c4e8766eccfb4654e4d"}, @NFTA_DATA_VERDICT={0x38, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}]}, @NFTA_DATA_VALUE={0x87, 0x1, "0c0aa14b435e534e24aed7159ea9d833e34807ebc06b949212496a47c55a5c8cc9803ac864b332e41b5f74b77722b5125044f31906bead115536e889955b9eac98ef95196c2193255a0740e82d74eab69ee80683d1e905f35325cdfddbd13adfc7a7f0e86495c80346be05c805c3c8fd61d5587f67275d834a7bffa04b583832bf099c"}, @NFTA_DATA_VERDICT={0x4c, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}]}, @NFTA_DATA_VERDICT={0x10, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}]}]}, @NFTA_SET_ELEM_TIMEOUT={0xc, 0x4, 0x1, 0x0, 0x3}]}]}, @NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_ELEM_LIST_SET_ID={0x8, 0x4, 0x1, 0x0, 0x1}, @NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz2\x00'}]}, 0x3f80}, 0x1, 0x0, 0x0, 0x40041}, 0x14) chdir(&(0x7f0000000100)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') [ 589.865193][T15041] BPF: [ 589.865193][T15041] 08:17:58 executing program 4: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)=ANY=[@ANYBLOB="02000000010000000000000002000000", @ANYRES32=0x0, @ANYBLOB="44000000000000001000020000f9b9ebcbdf413cbe000000"], 0x2c, 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r3, 0x0) chdir(&(0x7f0000000100)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') 08:17:58 executing program 5: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x305, &(0x7f0000000000)=ANY=[]}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1000000000000016, 0x400000000100) 08:17:58 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) r0 = socket(0x1, 0x2, 0x0) getsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000140), &(0x7f0000000100)=0x1002e) fcntl$getownex(r0, 0x10, &(0x7f0000000240)) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f00000000c0)) ptrace(0x10, r1) ptrace$getregset(0x4204, r1, 0x201, &(0x7f00000001c0)={0x0}) r2 = syz_open_procfs(r1, &(0x7f0000000380)='net/mcfilter6\x00') fchdir(r2) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x9) unshare(0x28020400) socket$inet6_sctp(0xa, 0x5, 0x84) epoll_create1(0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) fanotify_init(0x10, 0x80000) epoll_create1(0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r3 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r4 = clone3(0x0, 0x0) r5 = clone3(&(0x7f0000000280)={0x80040000, 0x0, &(0x7f00000000c0), 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) kcmp(r4, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) r6 = socket(0xb, 0x0, 0x0) getsockopt$sock_timeval(r6, 0x1, 0x15, &(0x7f0000000140), &(0x7f0000000100)=0x1002e) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r6, &(0x7f0000000100)={0x8}) process_vm_writev(r5, &(0x7f0000000780)=[{&(0x7f00000004c0)=""/175, 0xaf}, {0x0}, {0x0}, {0x0}], 0x4, &(0x7f0000000580)=[{&(0x7f0000000ac0)=""/252, 0xfc}, {0x0}, {0x0}], 0x3, 0x0) 08:17:58 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x16, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000340)}, 0x42) clock_gettime(0x0, &(0x7f0000001880)) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f00000018c0)={0x1000, 0x5, 0x4, 0x0, 0x6, {0x0, 0x7530}, {0x2, 0x1, 0xaa, 0x9, 0x3f, 0x5, "718a99c5"}, 0xffffffff, 0x1, @offset=0x81, 0x7, 0x0, r3}) ioctl$SIOCX25GDTEFACILITIES(r4, 0x89ea, &(0x7f0000001940)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0xffffffffa0008000, 0xffffffffffffff3e, 0x0, &(0x7f0000000040)="a34747e865af5cf11e34bdff7a7a5ba0051aae5804d5a05d9b9ff68e12bb4d43a20375ea905795449b957e956aa6", 0x0, 0x401, 0x0, 0x0, 0xfffffffffffffff3}, 0x28) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f0000000240)={0x1ff, 0xc, 0x4, 0x0, 0x27e5, {}, {0x4, 0x8, 0x4, 0x8, 0x7, 0x6, "96669900"}, 0x7, 0x0, @fd=r0, 0x9, 0x0, r2}) r5 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@struct={0x0, 0x0, 0x0, 0x4, 0x0, 0x9}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x1, 0x3f}}]}}, &(0x7f0000000080)=""/236, 0x3e, 0xec, 0x8}, 0x20) ioctl$EVIOCGLED(r5, 0x80404519, &(0x7f0000000580)=""/250) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) openat$random(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x2000, 0x0) dup(0xffffffffffffffff) r7 = dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_CONGESTION(r7, 0x6, 0xd, &(0x7f0000000180)='lp\x00', 0x3) ioctl$VIDIOC_TRY_FMT(r7, 0xc0d05640, &(0x7f0000000400)={0xa, @raw_data="d456e651514154be56c23a0150374fec800b3363d0f8209aea95ae10a4bfe2bc4a059b555ffe32ee49657c21fdaeec9ff08b45f3c5b652502dd578edc616a43da8fa7411c10cf0be3062500d3923e6f93300ce6e6ca32a13179605ca95c9250023e974040392fcffaac49faad6d6549cb1f2e1c7492ba9a8e2d26787e1872027fbe8577edbc559354f305d4e05c26a2f708bb008ca01368edece7ac1108379664aea7622db8fe0f786d6a4177494b3766d3f6f8e4c69729d1cdef558344c8bab4dfc9bfc6bc56bfa"}) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r4, 0x84, 0x7, &(0x7f0000000680)={0x7}, 0x4) ioctl$BLKTRACESTART(r7, 0x1274, 0x0) recvfrom$unix(r7, &(0x7f0000000300)=""/50, 0x32, 0x121a2, &(0x7f0000000500)=@file={0x1, './file0\x00'}, 0x6e) 08:17:58 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x305, &(0x7f0000000000)=ANY=[]}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1000000000000007, 0x400000000100) 08:17:58 executing program 5: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x305, &(0x7f0000000000)=ANY=[]}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1000000000000017, 0x400000000100) [ 590.252697][T15175] BPF:[2] ARRAY (anon) [ 590.266914][T15175] BPF:type_id=5 index_type_id=1 nr_elems=63 08:17:58 executing program 0: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) statx(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x6000, 0x8, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = getgid() setresgid(0x0, r1, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000040)={{}, {}, [{}], {}, [{0x8, 0x2, r0}, {0x8, 0x1, r1}], {0x10, 0x2}}, 0x3c, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r5, 0x0) ioctl$ASHMEM_GET_SIZE(r3, 0x7704, 0x0) chdir(&(0x7f0000000100)='./file0\x00') ioctl$BLKPBSZGET(r4, 0x127b, &(0x7f0000000180)) symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') 08:17:58 executing program 4: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)=ANY=[@ANYBLOB="02000000010000000000d036a9570000", @ANYRES32=0x0, @ANYBLOB="04000000000000002000000000000000"], 0x2c, 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r3, 0x0) chdir(&(0x7f0000000100)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') [ 590.293689][T15175] BPF: [ 590.345449][T15175] BPF:Invalid index [ 590.362277][T15175] BPF: [ 590.362277][T15175] 08:17:59 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x305, &(0x7f0000000000)=ANY=[]}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1000000000000008, 0x400000000100) 08:17:59 executing program 5: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x305, &(0x7f0000000000)=ANY=[]}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1000000000000018, 0x400000000100) 08:17:59 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) r0 = socket(0x1, 0x2, 0x0) getsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000140), &(0x7f0000000100)=0x1002e) fcntl$getownex(r0, 0x10, &(0x7f0000000240)) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f00000000c0)) ptrace(0x10, r1) ptrace$getregset(0x4204, r1, 0x201, &(0x7f00000001c0)={0x0}) r2 = syz_open_procfs(r1, &(0x7f0000000380)='net/mcfilter6\x00') fchdir(r2) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x9) unshare(0x28020400) socket$inet6_sctp(0xa, 0x5, 0x84) epoll_create1(0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) fanotify_init(0x10, 0x80000) epoll_create1(0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r3 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r4 = clone3(0x0, 0x0) r5 = clone3(&(0x7f0000000280)={0x80040000, 0x0, &(0x7f00000000c0), 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) kcmp(r4, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) r6 = socket(0xb, 0x0, 0x0) getsockopt$sock_timeval(r6, 0x1, 0x15, &(0x7f0000000140), &(0x7f0000000100)=0x1002e) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r6, &(0x7f0000000100)={0x8}) process_vm_writev(r5, &(0x7f0000000780)=[{&(0x7f00000004c0)=""/175, 0xaf}, {0x0}, {0x0}, {0x0}], 0x4, &(0x7f0000000580)=[{&(0x7f0000000ac0)=""/252, 0xfc}, {0x0}, {0x0}], 0x3, 0x0) 08:17:59 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x16, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000340)}, 0x42) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0xffffffffa0008000, 0xffffffffffffff3e, 0x0, &(0x7f0000000040)="a34747e865af5cf11e34bdff7a7a5ba0051aae5804d5a05d9b9ff68e12bb4d43a20375ea905795449b957e956aa6", 0x0, 0x401, 0x0, 0x0, 0xfffffffffffffff3}, 0x28) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f0000000240)={0x1ff, 0xc, 0x4, 0x0, 0x27e5, {}, {0x4, 0x8, 0x4, 0x8, 0x7, 0x6, "96669900"}, 0x7, 0x0, @fd=r0, 0x9, 0x0, r2}) r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@struct={0x0, 0x0, 0x0, 0x4, 0x0, 0x9}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x1, 0x3f}}]}}, &(0x7f0000000080)=""/236, 0x3e, 0xec, 0x8}, 0x20) ioctl$EVIOCGLED(r3, 0x80404519, &(0x7f0000000580)=""/250) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r5 = dup(0xffffffffffffffff) ioctl$SNDRV_PCM_IOCTL_INFO(r5, 0x81204101, &(0x7f0000000680)) dup(0xffffffffffffffff) r6 = dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_CONGESTION(r6, 0x6, 0xd, &(0x7f0000000180)='lp\x00', 0x3) ioctl$VIDIOC_TRY_FMT(r6, 0xc0d05640, &(0x7f0000000400)={0xa, @raw_data="d456e651514154be56c23a0150374fec800b3363d0f8209aea95ae10a4bfe2bc4a059b555ffe32ee49657c21fdaeec9ff08b45f3c5b652502dd578edc616a43da8fa7411c10cf0be3062500d3923e6f93300ce6e6ca32a13179605ca95c9250023e974040392fcffaac49faad6d6549cb1f2e1c7492ba9a8e2d26787e1872027fbe8577edbc559354f305d4e05c26a2f708bb008ca01368edece7ac1108379664aea7622db8fe0f786d6a4177494b3766d3f6f8e4c69729d1cdef558344c8bab4dfc9bfc6bc56bfa"}) ioctl$BLKTRACESTART(r6, 0x1274, 0x0) 08:17:59 executing program 4: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {0x1, 0x5}, [{}], {}, [], {0x10, 0x2}}, 0x2c, 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r3, 0x0) chdir(&(0x7f0000000100)='./file0\x00') r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000000)=[@sack_perm, @window={0x3, 0x100, 0x82}, @window={0x3, 0x401, 0x7}, @sack_perm, @mss={0x2, 0x1}, @timestamp, @sack_perm, @sack_perm, @window={0x3, 0x1ff, 0x690e}], 0x9) symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') 08:17:59 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x305, &(0x7f0000000000)=ANY=[]}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1000000000000009, 0x400000000100) 08:17:59 executing program 0: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)=ANY=[@ANYBLOB="02000000010000000000000002000000", @ANYRES32=0x0, @ANYBLOB="0400"/24], 0x2c, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r3, 0x0) chdir(&(0x7f0000000100)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') r4 = dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_CONGESTION(r4, 0x6, 0xd, &(0x7f0000000180)='lp\x00', 0x3) ioctl$VIDIOC_TRY_FMT(r4, 0xc0d05640, &(0x7f0000000400)={0xa, @raw_data="d456e651514154be56c23a0150374fec800b3363d0f8209aea95ae10a4bfe2bc4a059b555ffe32ee49657c21fdaeec9ff08b45f3c5b652502dd578edc616a43da8fa7411c10cf0be3062500d3923e6f93300ce6e6ca32a13179605ca95c9250023e974040392fcffaac49faad6d6549cb1f2e1c7492ba9a8e2d26787e1872027fbe8577edbc559354f305d4e05c26a2f708bb008ca01368edece7ac1108379664aea7622db8fe0f786d6a4177494b3766d3f6f8e4c69729d1cdef558344c8bab4dfc9bfc6bc56bfa"}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r4, 0xc05c5340, &(0x7f0000000000)={0x196d, 0x4, 0x9, {0x243, 0xffffffdd}, 0x8, 0x3}) 08:17:59 executing program 5: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x305, &(0x7f0000000000)=ANY=[]}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1000000000000019, 0x400000000100) [ 590.758052][T15315] BPF:[2] ARRAY (anon) [ 590.796514][T15315] BPF:type_id=5 index_type_id=1 nr_elems=63 [ 590.815262][T15315] BPF: [ 590.834021][T15315] BPF:Invalid index [ 590.859681][T15315] BPF: [ 590.859681][T15315] 08:17:59 executing program 5: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x305, &(0x7f0000000000)=ANY=[]}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x100000000000001a, 0x400000000100) 08:17:59 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) r0 = socket(0x1, 0x2, 0x0) getsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000140), &(0x7f0000000100)=0x1002e) fcntl$getownex(r0, 0x10, &(0x7f0000000240)) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f00000000c0)) ptrace(0x10, r1) ptrace$getregset(0x4204, r1, 0x201, &(0x7f00000001c0)={0x0}) r2 = syz_open_procfs(r1, &(0x7f0000000380)='net/mcfilter6\x00') fchdir(r2) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x9) unshare(0x28020400) socket$inet6_sctp(0xa, 0x5, 0x84) epoll_create1(0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) fanotify_init(0x10, 0x80000) epoll_create1(0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r3 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r4 = clone3(0x0, 0x0) r5 = clone3(&(0x7f0000000280)={0x80040000, 0x0, &(0x7f00000000c0), 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) kcmp(r4, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) r6 = socket(0xb, 0x0, 0x0) getsockopt$sock_timeval(r6, 0x1, 0x15, &(0x7f0000000140), &(0x7f0000000100)=0x1002e) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r6, &(0x7f0000000100)={0x8}) process_vm_writev(r5, &(0x7f0000000780)=[{&(0x7f00000004c0)=""/175, 0xaf}, {0x0}, {0x0}, {0x0}], 0x4, &(0x7f0000000580)=[{&(0x7f0000000ac0)=""/252, 0xfc}, {0x0}, {0x0}], 0x3, 0x0) 08:17:59 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x305, &(0x7f0000000000)=ANY=[]}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x100000000000000a, 0x400000000100) 08:17:59 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x16, 0xe, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000340)}, 0x42) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0xffffffffa0008000, 0xffffffffffffff3e, 0x0, &(0x7f0000000040)="a34747e865af5cf11e34bdff7a7a5ba0051aae5804d5a05d9b9ff68e12bb4d43a20375ea905795449b957e956aa6", 0x0, 0x401, 0x0, 0x0, 0xfffffffffffffff3}, 0x28) r3 = syz_open_dev$mouse(&(0x7f00000002c0)='/dev/input/mouse#\x00', 0x1, 0x400000) connect$bt_sco(r3, &(0x7f0000000300)={0x1f, @none}, 0x8) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f0000000240)={0x1ff, 0xc, 0x4, 0x0, 0x27e5, {}, {0x4, 0x8, 0x4, 0x8, 0x7, 0x6, "96669900"}, 0x7, 0x0, @fd=r0, 0x9, 0x0, r2}) r4 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@struct={0x0, 0x0, 0x0, 0x4, 0x0, 0x9}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x1, 0x3f}}]}}, &(0x7f0000000080)=""/236, 0x3e, 0xec, 0x8}, 0x20) ioctl$EVIOCGLED(r4, 0x80404519, &(0x7f0000000580)=""/250) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r6 = dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_CONGESTION(r6, 0x6, 0xd, &(0x7f0000000180)='lp\x00', 0x3) ioctl$VIDIOC_TRY_FMT(r6, 0xc0d05640, &(0x7f0000000400)={0xa, @raw_data="d456e651514154be56c23a0150374fec800b3363d0f8209aea95ae10a4bfe2bc4a059b555ffe32ee49657c21fdaeec9ff08b45f3c5b652502dd578edc616a43da8fa7411c10cf0be3062500d3923e6f93300ce6e6ca32a13179605ca95c9250023e974040392fcffaac49faad6d6549cb1f2e1c7492ba9a8e2d26787e1872027fbe8577edbc559354f305d4e05c26a2f708bb008ca01368edece7ac1108379664aea7622db8fe0f786d6a4177494b3766d3f6f8e4c69729d1cdef558344c8bab4dfc9bfc6bc56bfa"}) ioctl$USBDEVFS_DROP_PRIVILEGES(r6, 0x4004551e, &(0x7f0000000500)=0x80000001) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) dup(0xffffffffffffffff) r7 = dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_CONGESTION(r7, 0x6, 0xd, &(0x7f0000000180)='lp\x00', 0x3) ioctl$VIDIOC_TRY_FMT(r7, 0xc0d05640, &(0x7f0000000400)={0xa, @raw_data="d456e651514154be56c23a0150374fec800b3363d0f8209aea95ae10a4bfe2bc4a059b555ffe32ee49657c21fdaeec9ff08b45f3c5b652502dd578edc616a43da8fa7411c10cf0be3062500d3923e6f93300ce6e6ca32a13179605ca95c9250023e974040392fcffaac49faad6d6549cb1f2e1c7492ba9a8e2d26787e1872027fbe8577edbc559354f305d4e05c26a2f708bb008ca01368edece7ac1108379664aea7622db8fe0f786d6a4177494b3766d3f6f8e4c69729d1cdef558344c8bab4dfc9bfc6bc56bfa"}) ioctl$BLKTRACESTART(r7, 0x1274, 0x0) 08:17:59 executing program 5: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x305, &(0x7f0000000000)=ANY=[]}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x100000000000001b, 0x400000000100) [ 591.256764][T15472] BPF:[2] ARRAY (anon) 08:17:59 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x305, &(0x7f0000000000)=ANY=[]}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x100000000000000b, 0x400000000100) [ 591.291631][T15472] BPF:type_id=5 index_type_id=1 nr_elems=63 [ 591.314608][T15472] BPF: [ 591.334830][T15472] BPF:Invalid index 08:17:59 executing program 4: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000400)='nl80211\x00') accept4$packet(0xffffffffffffffff, &(0x7f0000000740)={0x11, 0x0, 0x0}, &(0x7f0000000780)=0x14, 0x0) sendmsg$NL80211_CMD_NEW_INTERFACE(r1, &(0x7f0000000900)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000008c0)={&(0x7f0000000840)={0x4c, r2, 0x200, 0x70bd2a, 0x25dfdbff, {}, [@NL80211_ATTR_IFTYPE={0x8, 0x5, 0x5}, @NL80211_ATTR_IFNAME={0x14, 0x4, 'dummy0\x00'}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r3}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x0, 0x2}}, @NL80211_ATTR_IFTYPE={0x8, 0x5, 0xb}]}, 0x4c}, 0x1, 0x0, 0x0, 0x840}, 0x2004c004) r4 = fcntl$dupfd(r0, 0x0, r0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000000440)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r6, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r7, 0x805}, 0x30}}, 0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r5, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8008000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x28, r7, 0x924, 0x70bd2a, 0x25dfdbfc, {{}, {}, {0xc, 0x14, 'syz0\x00'}}, ["", "", "", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x4880}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r8 = getgid() setresgid(0x0, r8, 0x0) getresgid(&(0x7f0000000240), &(0x7f0000000280)=0x0, &(0x7f00000002c0)) r10 = getgid() setresgid(0x0, r10, 0x0) r11 = getgid() setresgid(0x0, r11, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000340)='./file0/file0\x00', &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2000) r13 = getgid() setresgid(0x0, r13, 0x0) statx(r4, &(0x7f0000000380)='./file0/file0\x00', 0x4000, 0x200, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000006c0)={{}, {}, [{0x2, 0x1}], {}, [{0x8, 0x5, r8}, {0x8, 0x2, r9}, {0x8, 0x7, r10}, {0x8, 0x1, r11}, {0x8, 0x4, r12}, {0x8, 0x0, r12}, {0x8, 0x2, r8}, {0x8, 0x3, r13}, {0x8, 0x2, r14}], {0x10, 0x2}}, 0x74, 0x0) r15 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r15, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r16, 0x0) chdir(&(0x7f0000000100)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') [ 591.359370][T15472] BPF: [ 591.359370][T15472] 08:18:00 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) r0 = socket(0x1, 0x2, 0x0) getsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000140), &(0x7f0000000100)=0x1002e) fcntl$getownex(r0, 0x10, &(0x7f0000000240)) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f00000000c0)) ptrace(0x10, r1) ptrace$getregset(0x4204, r1, 0x201, &(0x7f00000001c0)={0x0}) r2 = syz_open_procfs(r1, &(0x7f0000000380)='net/mcfilter6\x00') fchdir(r2) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x9) unshare(0x28020400) socket$inet6_sctp(0xa, 0x5, 0x84) epoll_create1(0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) fanotify_init(0x10, 0x80000) epoll_create1(0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r3 = clone3(0x0, 0x0) r4 = clone3(&(0x7f0000000280)={0x80040000, 0x0, &(0x7f00000000c0), 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) kcmp(r3, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) r5 = socket(0xb, 0x0, 0x0) getsockopt$sock_timeval(r5, 0x1, 0x15, &(0x7f0000000140), &(0x7f0000000100)=0x1002e) process_vm_writev(r4, &(0x7f0000000780)=[{&(0x7f00000004c0)=""/175, 0xaf}, {0x0}, {0x0}, {0x0}], 0x4, &(0x7f0000000580)=[{&(0x7f0000000ac0)=""/252, 0xfc}, {0x0}, {0x0}], 0x3, 0x0) 08:18:00 executing program 5: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x305, &(0x7f0000000000)=ANY=[]}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x100000000000001c, 0x400000000100) 08:18:00 executing program 0: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [{}], {}, [], {0x10, 0x2}}, 0x2c, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x1d7) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r6, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002011400010000000000", @ANYRES32=0x0, @ANYBLOB="00008f2b137d10db8762c4a79270a73561582d26481439000000c76f4503775e3a3ca76b940ae108b24a5a073ab87e"], 0x48}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000240)=@newneigh={0x30, 0x1c, 0x205, 0x0, 0x0, {0xa, 0x0, 0x0, r6, 0x0, 0xa}, [@NDA_DST_IPV6={0x14, 0x1, @loopback}]}, 0x30}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000003f00)=ANY=[@ANYBLOB="20000000110001040000000000000000020000fd", @ANYRES32=r6, @ANYBLOB="ee023c8efaa10834eaabf1c60ad950ee2f2d47f7ce2a4322b0086dc768b2207574c9fc1d00b3bca86c9906f797f5640158f72e864bfd43274f13c4e4c99a23b3439ebbc59867c9d701745c4835f89571caf2f62b8925ede0a1326caf99f1b2e47596746b91973a459f15aa766d68d555df4c752876e712c9c73239c2bb60788f1901e05f5d324dcceee1e7f6c92e6f90f163b1f90000000000000000006f00000000f295a5"], 0x20}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000400)={'vxcan1\x00', r6}) r7 = socket$nl_route(0x10, 0x3, 0x0) r8 = socket$nl_route(0x10, 0x3, 0x0) r9 = socket$netlink(0x10, 0x3, 0x0) r10 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r10, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r10, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x1d7) sendmsg$nl_route(r9, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r11, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002011400010000000000", @ANYRES32=0x0, @ANYBLOB="00008f2b137d10db8762c4a79270a73561582d26481439000000c76f4503775e3a3ca76b940ae108b24a5a073ab87e"], 0x48}}, 0x0) sendmsg$nl_route(r8, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000240)=@newneigh={0x30, 0x1c, 0x205, 0x0, 0x0, {0xa, 0x0, 0x0, r11, 0x0, 0xa}, [@NDA_DST_IPV6={0x14, 0x1, @loopback}]}, 0x30}}, 0x0) sendmsg$nl_route(r7, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000900)=ANY=[@ANYBLOB="20000000110001040000000000000000020000fd", @ANYRES32=r11, @ANYBLOB="ee023c8efaa10834eaabf1c60ad950ee2f2d47f7ce2a4322b0086dc768b2207574c9fc1d00b3bca86c9906f797f5640158f72e864bfd43274f13c4e4c99a23b3439ebbc59867c9d701745c4835f89571caf2f62b8925ede0a1324af1f15643a5ac4a276caf99f1b2e47596746b91973a459f15aa766d68d555df4c752876e712c9c73239c2bb60788f1901e05f5d324dcceee1e7f6c92e6f90f163b1f9"], 0x20}}, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000440), &(0x7f0000000480)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000004000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000004040)=0x14, 0x80000) r13 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r13, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r13, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) getsockopt$inet_IP_XFRM_POLICY(r13, 0x0, 0x11, &(0x7f0000004080)={{{@in=@broadcast, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000004180)=0xe8) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000006300)=[{{&(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10, &(0x7f0000000180)=[{&(0x7f0000000200)="6f3f1f9665b8fd132d9bf192854aedc7c77dca3af39dbcc5f465be18af8c1c0ad657d9bd4da8eb52054527e11324a972c852e950fcec58f4e2c923910b69642496ca41c6c66557b8274dd40a43724f70bf4afc28e77a76f8a566a212e1020c321b4d92aae72e776ab4fe774f6e393362060ee960cd9bc9be194ef82ae0bee5ad9a94c51e024fd77cd1226e56a6cb4e13895b43443fea82a67deece3bc6aff316bd9e01a14ffd0dd51c8da2c9abbd9b3ddbbe2bd24c1f521215f62297873ebce469856c18cd4e7ec05b31cb5608b482225c6ae95f95b463a73a58a04284a23cfc0b90480fe51968091cf3", 0xea}, {&(0x7f0000000840)="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", 0x1000}, {&(0x7f0000000340)="df921b15227324706b09d3ea7feeffadae7c0ecb0d3bdc49a3136336dca0d610d1a1920ec7d8fd091da20b6cdfd92302dedf59a11fb41ed13edd188259afcf20b55ba03360ac437ca5953f0d795baf350efac6f5de02df843713a5b3092a3fc8d46e6351780a02513cde4f168af63ce6c78594ac0c3b382a3f68", 0x7a}, {&(0x7f0000000040)="353d456d816e0dcdd7f792ae5f0712d5d423ae2942d9fb380cf3091dab92909d9387e7ddfa1658d3ead474357a98d3eb1bc9029dee5f70", 0x37}], 0x4, &(0x7f0000006580)}}, {{&(0x7f00000005c0)={0x2, 0x4e24, @loopback}, 0x10, &(0x7f0000002ac0)=[{&(0x7f0000000600)="b0610aa5f40f37b634c47a8e411ffa0ee0f5281c2214525cd6ee3d6b91530758bd0b32170b5df08358f0463f4b393a9cf27d5058241ee1a96075781655835c727e5b1ab24c367d5272dcf8782f832bffadd9f0cc8a59c23da104efa7c0f192911479fb68c0ad4d9d23a70bcb9cc010f0b3b5d732e1a92f3e50ae0b5e576a5191beda893928c14e7c4ba0254329f0459f4fbb0c62c63c674d7275460281b4916b", 0xa0}, {&(0x7f0000001840)="30d85e5539c48313e0f7674eae5c5c42025ea7db6d2663e074d6c2214357012292de2c3842565677fa99e2856330f1986d93f45202cbbf16f7a4b3c4c154e1a374b5f31972ce40e8e2c018a9c54655b4d22b6b12105dc22565f7008ff8721c0125c76a757472790ec97a7c15b9a0cca79f0b2f3b4625313991c4cce7f7815d558ee37c2f2dba41ca136b8fbb5134a2afff2ccb6fb4b440b47597159bb9c5c348585b202563b7e4fc4174648afce7a7dcbcb436d9f411f7ad546e8f906cc733ef36dc274ff447a75a003a85e8deb00b7a5ee815b5145ff36d60cfd1d2f59a25dc881a4900a8351135cfc2a1fa76eef8da70d01b8b6d95e048e9420d2973657d8166c34ce5ff546e8cdf8ac76170db773755074bc4afef09903585e2aa1dc8be0df95d71a99d99ebbf32f8e2ef57ddb3bf310ae0b7139a7bdc9f21eb4549c7bfe07cbc372b98f09feee8aca7297987316030f705f8862759446ac860cd9e6a574b3add1109e1a97400e56cfefe2d6f1f52154d85a120681ef65f057b4d78b609ad75cf3c70dea68a3e4b3ccd46a942963c4a071a418f074760a0b3b4df9f3da546383127a6fd7329b14f941c5976540e3a9572f0dacabc30602f5ebd043a5ef24cd1cceced0db88b86ef74699e7161f04f114a2f8425e28412ec5342dda6e9e22286bcd9980d05a633b89a0a6dc472eb7e00a7fcf2611dad278a521e1478d108aa27a64e6dfe498d59786c6d0cd64c564a0cbf8689870443164cd01d5875e9d7e0f80354e9e756fad42cf696d35ed3a0f1eea28caffa4ca54a169c4973ad3267ede7f3585d03b4c0bf058f678a9404d421a7b923859e0d37a16f9d3d1342d99361398f4d3fbd093b3a3bd2160f2afbac5aa9e1b97e30448ae8d7a78e41552f91b1304185c8f777df198f428bdf7e6a4f76406a213e3c9dbd82e3ff008f9a8ae60bf23e218c0fd0f02920b85c7926f5f17771a3443804bf988fa94f2415cb9355330100e7654c44cbfadaac7377a507069158000732123ef21d4abc5b601fcfb67e328e7a5c3e67ad987d7b0f93124899e24f522b8e4d4dba1bcbce35c33387ba44d921cc5faa4619ee9cefdc1bfc1faec45f5e80427ef5f7e2c707fddad40a3b8c27340e7ad12e5f4450d2b9fb09806435c80db86948dbc45ba4fec98b6e83af290b38a334e40b82740db797c062a50cd7be037fc6f2e3fca90112b9daf012863ae5f49e23d90c9a162c37feadefba10e9698453fc2ec69a71bf1e7c34d7e808a5b71a8b57181c03bce1b996e51f09eec3bc11f9996373537f3b7b87d5a73d4bcb327795b92fdb8ba52f8b287916cceb1603f837a8b469145bf18186fbe47d402c5482ad25e178c07dfba74e5284eae56b8187a208cd6b3a2aff56f9ec2daeb47b609471e5d99d7d3e59180205a3b60c01864ccf096385c74d4b315bafd1b78fd11376f8290176ff0aafe827ab1742c250b6c9fb971cdaa6494d59f3177aee6c7f914c4b8efb0a7be65630a66f3bc4594cd756b8345d55404b9893b05fe5eba2eaf1a1a6c66fee0e7cf5ae6c8efe5902afd0072b055292330cc72ccc0f916a50347e0c717d0f803c75166f1f9026465d92fa6b7d25271d22e6e74a8f7497c69a08edbd6d3a53299ac76856f2db0878d9f74843ca85a3bd671a592b2d441886f7d5b6156efc4d2332590fa2051cda7b5ff28556fd33c7667dfb426c9e6a53aa2e24a55037f4b2f0a34f2d0891b0f691d7ea0d0e01de6a6b60972589e9a481169c15ad074f9a7fad84ca6c8b3577577d24f4e682d3ad839620613e5aa89d8f89c2fe40a7d9dfd954afe806a7ab81a4c32e007458affce89a06a859d3fef33e6c75c4509e2f48dbe7d580f5c1d1981e807fc580987e5ecced28c6a3b291c53ef2428cda51b2f79b0bedbec7a826c2a87ecef23c1d30f3132909da4b2a719f16b99ddbd19c67d64b6c80cffba447c82f3f2fb092ff4eef720763047d1449f39a61d384c608e64e54866273b8a04698f5fbfc6216a527b51617853ec531e1605eb7a1e530ec78af90253274d1f0eb8fe9255eb5d936db61e04acd346bc87df52e60b644e62379d640617daa32411a8e24639397a8f94d65ba4c61636eaa3d6899fe378e05996519fa6e284150bc6f08ad6fda5826a6a1b20dd32cbf45f460dcb4a249576c7b3c03890e3c4fec66d4be697aa0c5f6774f8e48edafa16a8ca390ffe5ef8383227d9174a8180150a72582de23d8f74bf2a6fcb31511d4d7eeadff46d3fce05af17e58fb4a2c82dfa5b7347c4af4c8d9aa5b167d635938f02257f879374fe1693546316a1333b9c273d689e1d80954a5cc3483b1f1b5ce29efbbc2b69cbfc0fcdd8d49faeeeeba35238385b7f3aeaada7f3d44a494d1fb0668002b8498e6ee04bc6c96a425937bed31bfe0ba606771ed5bf1ca41c332f9a09e007cfa3a59ddc14ab3ebe11cc0e4a38a58a33c8bf3b0b06449a0f4624864f4c1b6b155bf6c80551634a08f5513c9b9608545e073f680d2cf1e09d76188816c7e00878fa445916d95a3eed6402c3b624a103b581395cead69af0469060a7fbc8bd12769979e46162d6b017eec3ddca9fb3d9921d6cffd918500e7fcd5403d8b394ba6997a3985fe9b8d26a938e07e600c66047c6bc7e2632d9f01ef1bab6adc874347bd3e49346fb389356b2c4c5fe09ca4fcbba738c43918322fcc70bb8d8cc06715f6579c5af2d415106a8672aa8ffa87da4236613f597b3b5a3722b5916cc6e9c278f98089fc8d76d950925398a32d2aa8aa528a220c34b07fc0aeffdfa65ed1d699573c380e54313c36c2932e9de76630bc2aeaebdc0f3a26f245213df8ed7ef2050f10bab996b39d2656d600053a5aabad512282267ccc4ab71593d9fb9bc1e4fc8259266c4b7fae2f0ad55a71580deaaced5a1ec748f68339a3759803df403f9b0e587bf22640f066e6b13cc0d619f68afc2f473f6393264ee050ac86e764d6985965d596f79ffa56251790fafb42f91673d3602c9f4e9af9d6f72572c1e91aa7c6c2335e9f3128102b6b98d0b046acc15d043fabbf41d2231acdb6eb832ca3e2aa2bbce6b7a9a6d8e4720c35b2434539ce4ee84d99d1c9267b5a49993df9cead3e16bb31d8d337a463a4943624fb650d6cc1593358a4f43ca9cb43bbfb25a3dffa34f35852661b92f467c2527ce8b3aea2abe20543d7e32eec90bc1d59aa1dcc7cebe6c969593414e0ff56617c7235e6b4baea39f6db5832f851dd690566de439340273f921370704b90810bbb7b7b4564f346825d16c072610476f872d4082406ca1b687a33d8a0fa8818235c827dca8fbe08e03cc73452ae4ba5fe77886fb5f77d845d7303237b61a90a0d0b2c454a8ed938a4b400765cdea6840ffa82d29e5c0540f6cf8e25db26115a7082fc422e3c946f9d0da39a2f1aaa2723a1d8af4460a31a6c17c1c0bf61f677b2291d4e79b2a7bd41e79fa67c1822fd458159ddc073534d84dabf7a0106f9bb560042763a752179e9d1dac25350ce811c7a6bb9a457a1310cbd8e0f208908acdf5ff8e04b18be6e0b8a82338b4e82f482ba92de0b4bfc9eb61a534269a19720b6a534ec532ebc456105c39057c9716b1d4a3fea2f663db778b0cf2bea8691f50a93ae1131ceb64c5bf012d41e6f2a36dfdc9114d3819c029bb49a4d83058fa15e5ea291330ff2a62ba3a0261ec1378005a14f888ddb49779e94daee8b29ae51e0582236c0d77aa40129beba380f3aa5a6ceef29c7a3b5458324632f80323818dc1ce52fbff87acc89ed53c8c950be1539b1c1985086b88796ddfd0981e0576bfd3d9762ac73a7e37d003d0fa0100e7d5e1600b5a7df873db4e0e2f5cb93a91cf8887b6f5193d380ecd274b850f92b6b7c401be93cfca97f191afaebedbee89e3262262d16a8964df14e90b129ed40f4300c02da8b77d4a525b5315b17fd5ab7a6c6ffcbac5a33493788e379bec4ea315db074e12b6aeaee1d353d67f4fc5ea89018b04d57f0c0700f1ca40cd5b5c94df030378d0b65c10e9fc20ba5c886327db3c8903fb77f63a1457397c93913c1adfb087b6e0d1ef6bb1084d8b5061d1898fd78d7363c48c5836e7aec0ce6dd061856473766c901feba3714992e05c8904560224a348dbbea37a39ae4d59184a8308ab1250a368a14e347bdc6f3c25169e171bc2e8c270f8e99c35d1250b8cc8655e286ac4d5a29f804568023b8714a1b1b898b5b4a4481172cf1b5573ed37218b8177b5a19cb56d3c9507af750de62539cee78824925d06c468dbdb52a0698e60c400a116b8ebac20364b20e4f132065f21d4d5a7c8c3234158cc55bad7439fba03900a3bf3f00a7b723f602e480b87f40319f26ae574ce4d4bff7f790b8c27e7a22fcd154a4f822cc2d9d2cc495de61a9ace81183a5cad3cd9821f597f34a7ab43745a69b8bb41d1abc99b5006ad13478532ff4cf9dc96357c1d3152f7f788936e33c62069d79ff3e333ea5d69278d211ac04596834804d5aaa4ae8b89e30ff7022f1371db62abd85ec3ee767da2126068f2d42581928313f87e7e3e4b5f9d26f83c144bc6770872d2d9d4b9e7a661e67ae05bc6d24d4cef92e153b5bc7acf0c1ea79b422eef9c79b5054e5d8710c8af4d5fcab1a1146225db6a342c0a19d778c4db010d3d0de5802248bc7360b5d03e349d86dbddf359e3f03a2c2af60219ec3081d02015c1370e8f66fba27411d56f429b46ff4521281938a98af53deab24fb814c8963aa00cbfdefb9e2e54fa061b0dc492ae8fc3a45131bbe4f55b2d5d291b5afc39cfa7a70f982ca7d0d954e02217b361153f5bffd54a29f1373c455029229c711203987b7818cfe3b092cde21194e938abaf75dea0e5bd74b7b8c5cc5c341e39265cdf68eec1db6efb13fd0adb238b231ee9c1acc03f88307217b9ccf220e0a9b4f770fe341c45f9de901ce92cfe75af781042df4f6a819aa327b807f74afe56b866e238e050ec843402457f250e434ae42ddd9316a36352a765d193c15a5fb06e1a5252a691a7c9704110a7fe9487c3c38e25f771b6037db7f0391b3e56af626c7e7d73af5c0275a33fa7b3d274e63684783743f629e4dad8e995ad66d6f83ce3b4b26dcd10d82e98eb5314812740396af34164758bba4e4e87d35aca2baeeb4b8a3be3eaac6290e637617c8f0df0f2c4fcf2e8ffdbede77f14790ee3c211ef650549d76214ba584932b439633325075686c1d5b7779848ff3cbaa58431620e72eb2192a18ac879ce159ee0672ac5267382fa1c4270e124de3fcb985e5f8de4ebca2b935889dae8472f2b014225203da3819da67a415d98f1c628a04760c4a6195fa036c27344def3cab4e912b79084ea006bc7e394ff780e27124c814421b51646c9b5e1ea91d9d04988420cc42e8532009d765b151fd604cfee37902ab8d38a4a96a8da4b8acd555e521f961eb27644a9cb5d1680afb8222e0ea3d27a0038657414a0f90b783251e9a234eab6a1a9edf826d83937450428a2b2dbe96c285d6668d8c196ce382dbef468019f67b27ac93ee41fe424c89d96e8514dbd00ee21188623f17856c7805b90e9d8417f091134963d53001b9faf9633f4f3f177fbbb32069381b4a315b69df942d5a358d4109e469f82d45d6fbdd4fb72b7fbb226fef62b2a09a46f18b20e231ffdb001c0a32447ba00ed828b02148c7f4423ee9632313c0d15cf4a350e3bbfa83a4530a960458f2e412c7ff7fc87c997011d30f0c6d1c9795a99bef3fa8c0b21ed600c7740aed7f399f57a1b13e18a167a62ed7de38cb30ed192a", 0x1000}, {&(0x7f00000006c0)="621b91b3605da20e3dd19d6035be62df50d66596a84756aed36e2abbdf304e3ca77ad23a215c4f45643073b445c5e1fa8238d739f4a771fc4405acd79e100b555494aa170712ffbdb9c605a77aa3bf01df80f96684eda1ee936b2836bf69a7bcd3e9c23c2934772994fda2a2b6d31a069e13e50af49bbecd5e6f3fa63e83a288af958762b41a156ae737b090d6ef1544e71541cf152441f9ada3a7a2f46fe45f53677f1c5fcb4ebebe91429d5825697d6773203bfc1f125a86e1f2c15a7eac434d8c5d28748e5fcc90311b48d5793244af6653c7bb74f1c4b7721dfdbe4e9b60216a9fe3bd2576", 0xe7}, {&(0x7f0000002840)="5bbdb7ae3c22a57a3803cfde1630ada7b4c13c05252331c8b689f832b11752a597922e039f0b49ed1f07bfaabf3708403dc49483ad9f8a9e679010b196f7b48fec630ad7b130adcb42e77d3cadb3b2008e915e6362e6930758a37cddfb91061b6b5e299c715853380eadc2944ba3662353a95f267815e6017a5b51ab51ec8a483c9141bbecc99dbd26eadd2dbbce6ade0d325939f839a1c26291750f3a9e4fccf3d31b8fc62db4dc531d2439f17cf773501c7458cb048b672e384a3cd0", 0xbd}, {&(0x7f0000002900)="a2e9ef7d4852e468424f2b41ddd721fea8c709d02b238c04f7382c8d335bbe5b12f47b54770f829dcc74a72f417f36c84c667930e212d9dcc18954fc7dd62eafa063d3ba2beb174dea5b052c15d8f73d58a2ae43ce1f53a4553920d9105aac4db68ceaec276eeb250bf4735c55c4d723018c357fe75b06cd91721156af172aed5205c3144c2939fbb03a9f1c1eb28e4a388753498071e3cca242aef1469b33eb9fe6320fa27a87faad877a5a15c6c2f334956f1883d373e5ec6e0b65a3887503838868c206c9eb4b9822a3a859245ab5041cc18ff893436ff848462c721ffedd9353f73a347b7178fb5738e60b7e", 0xee}, {&(0x7f0000002a00)="92e326e41bc15ff45b2f24f6aa42fd1bcbc03459aa8585ceb325eb2b634010256153963a1c3ca7a56c84a26a72d4c3a05f9a23d7c937710fecd3eb5b91cbfd0251781edd26a409ff808fbd9929b6e65823568e75ca271aabd6ad96f62a79d55294d2b7197f52966a492754ebd46939dab0c718c0359274df52583233973c9f0e100a962f74fb494d7f82d229e5f6f36bd60568c496c25a944de6031b668a47eb11535f74", 0xa4}], 0x6}}, {{&(0x7f0000002b40)={0x2, 0x4e21, @local}, 0x10, &(0x7f0000003e80)=[{&(0x7f0000002b80)="6c25eb1bd07121c522f342e8addceb5833d3433d84a6b92b71676c598663990f24cdc093edac19ca9dacc9b3c8170b1562906853dca8d339a00eb446190ef373bfa65e85567585f4e025208d6ef1b65921c782ca1b77343377119a0f5bcd2e547f3754d00db6f07bc75ccd96a77bf1384940acffe0205f77d7b5ac7ca1661d3f60d7da639282993f70d551e1f5fa98", 0x8f}, {&(0x7f0000002c40)="8c9a0284fb0e89aa5ebfd01de03e4b9203f82624b9803a919d0703cd7c219201325652f5137e6bdd191bbf42111b0afee795e6958a042b0cd21200e481f23c4d3a8aac0be08c8ef1f24f948a6482a6b111c7bef5afc4515fad4359e507e87a9d7283e4e94964da49162aabbecb7e4b8cbb7e34e49b76ee58", 0x78}, {&(0x7f0000002cc0)="b63404afc0c94154f04a3220ce41f87497c912c71ef94f32f8020ff0498a6de6bce3806a2b9b5206fe02c9e2c7991cb88b2b583f9b8c188e7bc4f2eb2f58ecce6c5873e4a37201c80567cb8f1310bf73a10159d4a9c2305196d249f93905cfa4cae6b127f31d403f181b93043c5f501e0f3df702358c442283c8b99c326bb09963f515d2a346d2abd9ae0c", 0x8b}, {&(0x7f0000002d80)="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", 0x1000}, {&(0x7f0000003d80)="ae33e081e8eeaac67077a5b2ae9e2970beb2dd4f185bb9a72cf622573e211cdccecf264b8d29aa4bdc2e3ab9b2bfaea59c8f6e8053a4f05bb9b29e2b8a56113a87421b1177a12bcc34abc093d3a6b6500132169115c0dcc39d03ada0707bc2f7df089b685c64a43b38d9b7b386e0d2298b1e6687d850816a8972ba7060be4fbdc72beb696a8b2cb85d32fd7907af259575387bfb6e8072b4321a683647a8e888ac9ecc718cd5c12a669db6bead8610804e2906a62545ea1adb3bafd7b0fb73cb08f969dab28eaf3f77d96d4f03fd88628f666d4a1e3d", 0xd6}], 0x5, &(0x7f00000041c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r12, @remote, @empty}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r14, @remote, @empty}}}, @ip_retopts={{0x40, 0x0, 0x7, {[@cipso={0x86, 0x2d, 0xffffffffffffffff, [{0x6, 0x3, '['}, {0x5, 0xa, "35ac249be0136e1d"}, {0x6, 0xc, "67bce10f755211224afc"}, {0x0, 0x9, "e49b0d3c027266"}, {0x1, 0x5, "76b000"}]}]}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x3}}, @ip_ttl={{0x14}}], 0xb0}}, {{0x0, 0x0, &(0x7f0000004380)=[{&(0x7f0000004280)="ea7a479f9be913f397b6e16ae08058afee3586fe7ee47b40b8dbdd8a040f635befe9647d63d55dd46c7029ee2c1b1cca8f4b5b7077af94bdbf1771855128b8bd080530040f1a8fa243c4e01b493487ee0dedbe1c9fa1eb56843c5b92ec975710b4815abf693c4d4c0ff91683b0765df00ec641d6d90cd55df386e8bd7fb8f1b741703c2f3a1aca118655f033de60c2063262f56e8fb1e9f4713ed983d9bc2731f6ed4d8cbd2b6177ae0b4b240165a0a0e1ca3c20b7aed6", 0xb7}, {&(0x7f0000004340)="ea672140fa920aee38aabed63b13fa", 0xf}], 0x2}}, {{&(0x7f00000043c0)={0x2, 0x4e23, @multicast1}, 0x10, &(0x7f00000045c0)=[{&(0x7f0000004400)="db0ed41b3899ba139fb58031e26809521ccd0fe9fbab1308c3fabf576258ec806b0fa2a11d21a42b22319057eb970cfddd9f8ad72beffdf356e1df489d4a93cc1944bbdc80e2bbc75fe1c2696584cf524bcf21cbf067f6ac2313c49e4956c240aab4e90e2febab3d3ecafdbcaaa6f13c8777adbeb58edbbeb47e5f3a8623a83833721655b16a48f035d13c82ff3d5468b6d863", 0x93}, {&(0x7f00000044c0)="ea82e85b675d03450605d93600c4aaca81f0affa0ca39824b91f7930c094a1307ea473dbdf8b9e25e5ab1f7abd1c267635fc2d5893125a7dbdf634ab18e4bd6c54aacba89c538dfc5cf6e1bf3ec65df21d1acdb65a02fce56c09a158288fd0c77284578785b6ef27c9786bde56f981d0", 0x70}, {&(0x7f0000004540)="71fdec5f76cae4722f0f833f0c71785a40f1a08b6dfff33184affb14ef1a4c8e44b7225b4da5bc240af0fd64fbb81b3bced5c6030f32ed114bbcef9623122d191d499b2aadc0e5de3c8fb86e00dd5c54e92ba70472c05188fe3092cc0086e50d4118d23463d66f6766995fbf2f45cd3d05069a61e36aaa38", 0x78}], 0x3, &(0x7f0000004600)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0x2}}, @ip_retopts={{0xb8, 0x0, 0x7, {[@end, @end, @rr={0x7, 0x7, 0x97, [@broadcast]}, @generic={0x89, 0xa, "dc721d5660d4e665"}, @ssrr={0x89, 0x1b, 0xa5, [@initdev={0xac, 0x1e, 0x1, 0x0}, @remote, @remote, @dev={0xac, 0x14, 0x14, 0x1c}, @rand_addr=0x9, @rand_addr=0x1]}, @generic={0x82, 0xc, "34feb002fa51c798af3b"}, @ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0x1b, 0xa, [@rand_addr=0x7, @broadcast, @multicast1, @multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, @rand_addr=0xb23d]}, @timestamp_addr={0x44, 0x4c, 0x99, 0x1, 0x4, [{@local, 0x12ad409d}, {@multicast2, 0x6}, {@local, 0x1}, {@broadcast, 0x4}, {@loopback, 0x465}, {@dev={0xac, 0x14, 0x14, 0x2f}, 0x20}, {@dev={0xac, 0x14, 0x14, 0x2e}, 0x7}, {@multicast2, 0x10000}, {@local, 0x800}]}]}}}], 0xd0}}, {{&(0x7f0000004700)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000004880)=[{&(0x7f0000004740)="2a21e3417f0907b781635b68fecd5cf1316ee1474ac212b23ac560d037e69cb894e146d4a4d57ad37a6a28b85f3a9db5a5cd9342ff680ccdda140383e7ab0308927e185c2c18d693068cb2979749dd1c6229926c483fbd3777281ded0235b3721dc3799c1ca28f755cec05b8f4f7ccf8725219b9d2b58192202650", 0x7b}, {&(0x7f00000047c0)="e8161ea7dee58c0d281a7fa63eb0de6947288c91795323b2f37810ff2d7cbf9f1160c466adcd9926bbe32df1832fb752fa5b2b93491db4d6dac737ff1ccd07613a8b195ffafdca7d1ce307b9d09d9be4b1f84b65a73e0dcf1bfcf86a7b5d2ed99d7bd3cb8f758199d0a0afd3e4", 0x6d}, {&(0x7f0000004840)="3ffdd40de7b2cb033697d4c4a06ebe0375a67b0f01f661", 0x17}], 0x3, &(0x7f00000048c0)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7}}, @ip_ttl={{0x14, 0x0, 0x2, 0x5}}, @ip_retopts={{0x38, 0x0, 0x7, {[@timestamp_addr={0x44, 0x14, 0x4e, 0x1, 0x7, [{@dev={0xac, 0x14, 0x14, 0x3a}}, {@remote}]}, @timestamp_addr={0x44, 0x14, 0xd4, 0x1, 0x6, [{@empty, 0x4}, {@empty, 0x21}]}]}}}, @ip_tos_u8={{0x11}}, @ip_ttl={{0x14, 0x0, 0x2, 0x1}}, @ip_retopts={{0x34, 0x0, 0x7, {[@generic={0x83, 0x8, "d4cba7ce8a84"}, @ra={0x94, 0x4, 0x1}, @timestamp={0x44, 0xc, 0x24, 0x0, 0x3, [0x0, 0x2e]}, @ssrr={0x89, 0xb, 0x9a, [@initdev={0xac, 0x1e, 0x1, 0x0}, @dev={0xac, 0x14, 0x14, 0x2e}]}]}}}, @ip_retopts={{0x78, 0x0, 0x7, {[@ra={0x94, 0x4}, @ra={0x94, 0x4, 0x1}, @ra={0x94, 0x4}, @generic={0x44, 0xc, "9be54c86169657d42258"}, @generic={0x88, 0xf, "3a334130089d2c412c4b895225"}, @lsrr={0x83, 0xb, 0xc0, [@rand_addr=0x1ff, @broadcast]}, @timestamp_addr={0x44, 0x34, 0x61, 0x1, 0x6, [{@broadcast, 0x8001}, {@dev={0xac, 0x14, 0x14, 0x3c}, 0x20}, {@multicast2, 0x9}, {@broadcast, 0xfffffff7}, {@multicast2, 0x3}, {@loopback, 0x1}]}]}}}, @ip_retopts={{0x58, 0x0, 0x7, {[@timestamp_addr={0x44, 0x1c, 0x57, 0x1, 0x4, [{@multicast2, 0x800}, {@remote, 0x1}, {@loopback, 0x80}]}, @ra={0x94, 0x4}, @generic={0x86, 0xc, "aa6d89c97df9f91eb459"}, @ssrr={0x89, 0x7, 0xf8, [@rand_addr=0x3]}, @timestamp_addr={0x44, 0x14, 0x18, 0x1, 0x2, [{@remote, 0x2}, {@loopback, 0x3}]}]}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0xda}}], 0x1b8}}, {{0x0, 0x0, &(0x7f0000004b80)=[{&(0x7f0000004a80)="71f73d22062c4b268482309642710bd3ae6d88a811ddaa490fdd1368f3378637a81db7ef1bc92edc97d2734cfe69093546a8f94c26e6605066dfa73ce660058f41305982440a41158b55b3e76fb97c968855d71bcb787b4c905dc09cb27f0ddbf5523d84294e841fd0217d7eabe2e8f657d2f1a99bdaca7c839c06e024a42bc890483ad7a596e6bf68caebe88288d89af782484d39a49254b074996ade150fad1a3f5360078087389a52955da845c6230c89b2d2b159bbbf0e00d0a4b15594dbc7631502b2e2a40c46257690e66c396fce5145783758f6dd9036303378b5eb2d515b", 0xe2}], 0x1}}, {{0x0, 0x0, &(0x7f0000005f40)=[{&(0x7f0000004bc0)="6456123c7fae378ba53a67aa58befaf69d160c6f7c0f56992c2223b6e7ebb2c4e04963adfdc9e260aa64a61185ef119e1a457cf1310fa8b6ee6c557cdd8579d494", 0x41}, {&(0x7f0000004c40)="1779a3b6aa0a8f11ae049e16d6a929b77b564d4e11e162cf86e10f7805c828361ecef539e51e2aa251b8303e95e58d5bf98accbc07d4487dd6ca21e7d0340a20b474b87521f36a966356e1372f1a2e93ea5c987d51df1f3736bf170399325eb546fd45036bad5f8cacf820f2aafbf385aec904e681d56da5d24277044df99bb91af9002639bcd44a0094c688277a478e4ca23de922db6fe95702918def08a7c717ab51fb3f0dae1df32e8cf074d761cd9db2c36cb6e3abfebced6e7e9099e9134c33aeade6d39a7fa99d5a0ccb282763494c3a15506fe157653027f6d7aefde347cecbf08cdc0f66", 0xe8}, {&(0x7f0000004d40)="0dfd991e0e86dc265e0804b4507f0fb88e9813", 0x13}, {&(0x7f0000004d80)="ef0937cb9b4d6a9b6b40fa99de88c69e205778c98d3e3cd817b9e1cb7ea8968233e0470ba8ad0d514fe78b7ab9b52c19013fed76082456ed783db36e2b27fe66cc393a44b0e6252820d9", 0x4a}, {&(0x7f0000004e00)="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", 0x1000}, {&(0x7f0000005e00)="b7a8c375560ece19b9f1340be5c3d247ff6028d7643b23887185e2ae378805f5c9eb1fc481d90fd400ed4a12af2fc30a607b464370716bb3e6b139d5a751231345ca26c67387c6f5e00495e60e071b654653d4393aaa516b7243b531d60538a9d489b709ea9980b6ad227044ab3f3047155a73182901c12ce854763eb4248bbf538c4a46fbd14196386c28ae551476fae07e5b143ee93675883a8dd2b4fd3e8fce89af550ac0", 0xa6}, {&(0x7f0000005ec0)="0a5f530da7e6609dc8932c8abf8397581ce571ac9d704cb6d91373026240f865c0e13a7b2dddf1fd8b10cb751d4c9bc512e0c2868d51b4d8ebbb446eaf116f67be3d70f649f02f762de600aad59bb0f0a47488f55c32a1b9232931c118aa01a57f5566c19cdf0a6c82bf83f1cf75077046", 0x71}], 0x7}}, {{0x0, 0x0, &(0x7f0000005fc0), 0x0, &(0x7f0000006000)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x8}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x7}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x6}}, @ip_retopts={{0x6c, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x2c, 0xf4, 0x3, 0x6, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0x7}, {@dev={0xac, 0x14, 0x14, 0x39}, 0x35a}, {@broadcast, 0x1}, {@local, 0x61}, {@empty, 0x83d}]}, @ssrr={0x89, 0x2b, 0x7a, [@multicast2, @local, @empty, @loopback, @broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x1, 0x0}, @broadcast, @rand_addr=0x200, @loopback]}, @ra={0x94, 0x4, 0x1}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x20000}}, @ip_retopts={{0xb0, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x14, 0xf1, 0x3, 0x6, [{@broadcast, 0x48dbbfa0}, {@multicast1, 0x8}]}, @generic={0x7, 0xf, "6cf787d11e466330110dfa5918"}, @timestamp_addr={0x44, 0x14, 0xd, 0x1, 0x3, [{@empty, 0xfff}, {@local, 0x80}]}, @lsrr={0x83, 0x1b, 0x4, [@rand_addr=0x1, @local, @remote, @multicast2, @broadcast, @loopback]}, @cipso={0x86, 0x4b, 0x3, [{0x5, 0x9, "f19a21cb351a4a"}, {0x0, 0x3, "df"}, {0x7, 0xa, "df0bab9c772083d8"}, {0x7, 0x2}, {0x0, 0x11, "b2520757cd1d557477b0d391e380a4"}, {0x5, 0x6, "4ac68090"}, {0x5, 0x2}, {0x2, 0xe, "d6faf8f83378f59e885c60cf"}, {0x7, 0x6, "54054d0e"}]}]}}}, @ip_ttl={{0x14, 0x0, 0x2, 0x10001}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xffffffff}}], 0x1b0}}, {{0x0, 0x0, &(0x7f0000006240)=[{&(0x7f00000061c0)="7e22471540ad3648b6b86be30bccdd9e9eac8de331b05d04595e022ee049df0358a4cfce184eca80e93499c87373a0712cef2c6eb6abdcf24ead08b23450a380cb62d3", 0x43}], 0x1, &(0x7f0000006280)=[@ip_retopts={{0x44, 0x0, 0x7, {[@timestamp={0x44, 0x10, 0x5b, 0x0, 0x5, [0x8, 0x4, 0x9]}, @ssrr={0x89, 0x23, 0x63, [@broadcast, @multicast2, @multicast1, @initdev={0xac, 0x1e, 0x1, 0x0}, @local, @dev={0xac, 0x14, 0x14, 0x25}, @multicast2, @remote]}]}}}], 0x48}}], 0xa, 0x12) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r15 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r15, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r16, 0x0) chdir(&(0x7f0000000100)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') 08:18:00 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x305, &(0x7f0000000000)=ANY=[]}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x100000000000000c, 0x400000000100) 08:18:00 executing program 4: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x8, 0x101481) setxattr$trusted_overlay_origin(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x2) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)=ANY=[@ANYBLOB="02fa0000010000000000000002000000", @ANYRES32=0x0, @ANYBLOB="040000000000000010000200000000002000000000000000"], 0x2c, 0x0) r2 = dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000180)='lp\x00', 0x3) ioctl$VIDIOC_TRY_FMT(r2, 0xc0d05640, &(0x7f0000000400)={0xa, @raw_data="d456e651514154be56c23a0150374fec800b3363d0f8209aea95ae10a4bfe2bc4a059b555ffe32ee49657c21fdaeec9ff08b45f3c5b652502dd578edc616a43da8fa7411c10cf0be3062500d3923e6f93300ce6e6ca32a13179605ca95c9250023e974040392fcffaac49faad6d6549cb1f2e1c7492ba9a8e2d26787e1872027fbe8577edbc559354f305d4e05c26a2f708bb008ca01368edece7ac1108379664aea7622db8fe0f786d6a4177494b3766d3f6f8e4c69729d1cdef558344c8bab4dfc9bfc6bc56bfa"}) ioctl$KVM_SET_TSS_ADDR(r2, 0xae47, 0xd000) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r4, 0x0) chdir(&(0x7f0000000100)='./file0\x00') r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r6 = accept4$tipc(r5, 0x0, &(0x7f0000000200), 0x80800) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r6, 0xc080661a, &(0x7f0000000240)={{0x2, 0x0, @descriptor="17bc064f0d8c54ae"}}) symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') 08:18:00 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x16, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000340)}, 0x42) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0xffffffffa0008000, 0xffffffffffffff3e, 0x0, &(0x7f0000000040)="a34747e865af5cf11e34bdff7a7a5ba0051aae5804d5a05d9b9ff68e12bb4d43a20375ea905795449b957e956aa6", 0x0, 0x401, 0x0, 0x0, 0xfffffffffffffff3}, 0x28) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f0000000240)={0x1ff, 0xc, 0x4, 0x0, 0x27e5, {}, {0x4, 0x8, 0x4, 0x8, 0x7, 0x6, "96669900"}, 0x7, 0x0, @fd=r0, 0x9, 0x0, r2}) r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_CONGESTION(r4, 0x6, 0xd, &(0x7f0000000180)='lp\x00', 0x3) ioctl$VIDIOC_TRY_FMT(r4, 0xc0d05640, &(0x7f0000000400)={0xa, @raw_data="d456e651514154be56c23a0150374fec800b3363d0f8209aea95ae10a4bfe2bc4a059b555ffe32ee49657c21fdaeec9ff08b45f3c5b652502dd578edc616a43da8fa7411c10cf0be3062500d3923e6f93300ce6e6ca32a13179605ca95c9250023e974040392fcffaac49faad6d6549cb1f2e1c7492ba9a8e2d26787e1872027fbe8577edbc559354f305d4e05c26a2f708bb008ca01368edece7ac1108379664aea7622db8fe0f786d6a4177494b3766d3f6f8e4c69729d1cdef558344c8bab4dfc9bfc6bc56bfa"}) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) ioctl$VIDIOC_S_EXT_CTRLS(r4, 0xc0205648, &(0x7f0000000500)={0xa20000, 0x1, 0x1, r5, 0x0, &(0x7f0000000300)={0x5005c, 0xc3, [], @p_u16=&(0x7f00000002c0)=0xe3bf}}) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@struct={0x0, 0x0, 0x0, 0x4, 0x0, 0x9}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x1, 0x3f}}]}}, &(0x7f0000000080)=""/236, 0x3e, 0xec, 0x8}, 0x20) ioctl$EVIOCGLED(r3, 0x80404519, &(0x7f0000000580)=""/250) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) dup(0xffffffffffffffff) r7 = dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_CONGESTION(r7, 0x6, 0xd, &(0x7f0000000180)='lp\x00', 0x3) ioctl$VIDIOC_TRY_FMT(r7, 0xc0d05640, &(0x7f0000000400)={0xa, @raw_data="d456e651514154be56c23a0150374fec800b3363d0f8209aea95ae10a4bfe2bc4a059b555ffe32ee49657c21fdaeec9ff08b45f3c5b652502dd578edc616a43da8fa7411c10cf0be3062500d3923e6f93300ce6e6ca32a13179605ca95c9250023e974040392fcffaac49faad6d6549cb1f2e1c7492ba9a8e2d26787e1872027fbe8577edbc559354f305d4e05c26a2f708bb008ca01368edece7ac1108379664aea7622db8fe0f786d6a4177494b3766d3f6f8e4c69729d1cdef558344c8bab4dfc9bfc6bc56bfa"}) ioctl$BLKTRACESTART(r7, 0x1274, 0x0) 08:18:00 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) r0 = socket(0x1, 0x2, 0x0) getsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000140), &(0x7f0000000100)=0x1002e) fcntl$getownex(r0, 0x10, &(0x7f0000000240)) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f00000000c0)) ptrace(0x10, r1) ptrace$getregset(0x4204, r1, 0x201, &(0x7f00000001c0)={0x0}) r2 = syz_open_procfs(r1, &(0x7f0000000380)='net/mcfilter6\x00') fchdir(r2) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x9) unshare(0x28020400) socket$inet6_sctp(0xa, 0x5, 0x84) epoll_create1(0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) fanotify_init(0x10, 0x80000) epoll_create1(0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r3 = clone3(0x0, 0x0) r4 = clone3(&(0x7f0000000280)={0x80040000, 0x0, &(0x7f00000000c0), 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) kcmp(r3, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) r5 = socket(0xb, 0x0, 0x0) getsockopt$sock_timeval(r5, 0x1, 0x15, &(0x7f0000000140), &(0x7f0000000100)=0x1002e) process_vm_writev(r4, &(0x7f0000000780)=[{&(0x7f00000004c0)=""/175, 0xaf}, {0x0}, {0x0}, {0x0}], 0x4, &(0x7f0000000580)=[{&(0x7f0000000ac0)=""/252, 0xfc}, {0x0}, {0x0}], 0x3, 0x0) 08:18:00 executing program 5: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x305, &(0x7f0000000000)=ANY=[]}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x100000000000001d, 0x400000000100) [ 591.787162][T15609] BPF:[2] ARRAY (anon) 08:18:00 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x305, &(0x7f0000000000)=ANY=[]}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x100000000000000d, 0x400000000100) [ 591.824601][T15609] BPF:type_id=5 index_type_id=1 nr_elems=63 [ 591.854971][T15609] BPF: [ 591.874592][T15609] BPF:Invalid index [ 591.894540][T15609] BPF: [ 591.894540][T15609] 08:18:00 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) r0 = socket(0x1, 0x2, 0x0) getsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000140), &(0x7f0000000100)=0x1002e) fcntl$getownex(r0, 0x10, &(0x7f0000000240)) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f00000000c0)) ptrace(0x10, r1) ptrace$getregset(0x4204, r1, 0x201, &(0x7f00000001c0)={0x0}) r2 = syz_open_procfs(r1, &(0x7f0000000380)='net/mcfilter6\x00') fchdir(r2) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x9) unshare(0x28020400) socket$inet6_sctp(0xa, 0x5, 0x84) epoll_create1(0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) fanotify_init(0x10, 0x80000) epoll_create1(0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r3 = clone3(0x0, 0x0) r4 = clone3(&(0x7f0000000280)={0x80040000, 0x0, &(0x7f00000000c0), 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) kcmp(r3, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) socket(0xb, 0x0, 0x0) process_vm_writev(r4, &(0x7f0000000780)=[{&(0x7f00000004c0)=""/175, 0xaf}, {0x0}, {0x0}, {0x0}], 0x4, &(0x7f0000000580)=[{&(0x7f0000000ac0)=""/252, 0xfc}, {0x0}, {0x0}], 0x3, 0x0) 08:18:00 executing program 5: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x305, &(0x7f0000000000)=ANY=[]}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x100000000000001e, 0x400000000100) 08:18:00 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x16, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000340)}, 0x42) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0xffffffffa0008000, 0xffffffffffffff3e, 0x0, &(0x7f0000000040)="a34747e865af5cf11e34bdff7a7a5ba0051aae5804d5a05d9b9ff68e12bb4d43a20375ea905795449b957e956aa6", 0x0, 0x401, 0x0, 0x0, 0xfffffffffffffff3}, 0x28) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f0000000240)={0x1ff, 0xc, 0x4, 0x0, 0x27e5, {}, {0x4, 0x8, 0x4, 0x8, 0x7, 0x6, "96669900"}, 0x7, 0x0, @fd=r0, 0x9, 0x0, r2}) r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@struct={0x0, 0x0, 0x0, 0x4, 0x0, 0x9}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x1, 0x3f}}]}}, &(0x7f0000000080)=""/236, 0x3e, 0xec, 0x8}, 0x20) ioctl$EVIOCGLED(r3, 0x80404519, &(0x7f0000000580)=""/250) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r5 = syz_open_dev$mice(&(0x7f00000002c0)='/dev/input/mice\x00', 0x0, 0x1210c0) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, &(0x7f0000000680)={{{@in6, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6}}, &(0x7f0000000300)=0xe8) ioctl$TUNSETOWNER(r5, 0x400454cc, r6) dup(0xffffffffffffffff) r7 = dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_CONGESTION(r7, 0x6, 0xd, &(0x7f0000000180)='lp\x00', 0x3) ioctl$VIDIOC_TRY_FMT(r7, 0xc0d05640, &(0x7f0000000400)={0xa, @raw_data="d456e651514154be56c23a0150374fec800b3363d0f8209aea95ae10a4bfe2bc4a059b555ffe32ee49657c21fdaeec9ff08b45f3c5b652502dd578edc616a43da8fa7411c10cf0be3062500d3923e6f93300ce6e6ca32a13179605ca95c9250023e974040392fcffaac49faad6d6549cb1f2e1c7492ba9a8e2d26787e1872027fbe8577edbc559354f305d4e05c26a2f708bb008ca01368edece7ac1108379664aea7622db8fe0f786d6a4177494b3766d3f6f8e4c69729d1cdef558344c8bab4dfc9bfc6bc56bfa"}) ioctl$BLKTRACESTART(r7, 0x1274, 0x0) 08:18:00 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x305, &(0x7f0000000000)=ANY=[]}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x100000000000000e, 0x400000000100) 08:18:00 executing program 4: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) mknod(&(0x7f0000000000)='./file0\x00', 0x8000, 0x3) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [{}], {}, [], {0x10, 0x2}}, 0x2c, 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r3, 0x0) chdir(&(0x7f0000000100)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') [ 592.358167][T15739] BPF:[2] ARRAY (anon) [ 592.362393][T15739] BPF:type_id=5 index_type_id=1 nr_elems=63 [ 592.397192][T15739] BPF: [ 592.428460][T15739] BPF:Invalid index [ 592.459765][T15739] BPF: [ 592.459765][T15739] 08:18:01 executing program 5: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x305, &(0x7f0000000000)=ANY=[]}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1000000000000021, 0x400000000100) 08:18:01 executing program 0: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [{}], {}, [], {0x10, 0x2}}, 0x2c, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) prctl$PR_SET_FPEMU(0xa, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r3, 0x0) chdir(&(0x7f0000000100)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') 08:18:01 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) r0 = socket(0x1, 0x2, 0x0) getsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000140), &(0x7f0000000100)=0x1002e) fcntl$getownex(r0, 0x10, &(0x7f0000000240)) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f00000000c0)) ptrace(0x10, r1) ptrace$getregset(0x4204, r1, 0x201, &(0x7f00000001c0)={0x0}) r2 = syz_open_procfs(r1, &(0x7f0000000380)='net/mcfilter6\x00') fchdir(r2) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x9) unshare(0x28020400) socket$inet6_sctp(0xa, 0x5, 0x84) epoll_create1(0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) fanotify_init(0x10, 0x80000) epoll_create1(0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r3 = clone3(0x0, 0x0) r4 = clone3(&(0x7f0000000280)={0x80040000, 0x0, &(0x7f00000000c0), 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) kcmp(r3, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) process_vm_writev(r4, &(0x7f0000000780)=[{&(0x7f00000004c0)=""/175, 0xaf}, {0x0}, {0x0}, {0x0}], 0x4, &(0x7f0000000580)=[{&(0x7f0000000ac0)=""/252, 0xfc}, {0x0}, {0x0}], 0x3, 0x0) 08:18:01 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x305, &(0x7f0000000000)=ANY=[]}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x100000000000000f, 0x400000000100) 08:18:01 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x16, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000340)}, 0x42) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0xffffffffa0008000, 0xffffffffffffff3e, 0x0, &(0x7f0000000040)="a34747e865af5cf11e34bdff7a7a5ba0051aae5804d5a05d9b9ff68e12bb4d43a20375ea905795449b957e956aa6", 0x0, 0x401, 0x0, 0x0, 0xfffffffffffffff3}, 0x28) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f0000000240)={0x1ff, 0xc, 0x4, 0x0, 0x27e5, {}, {0x4, 0x8, 0x4, 0x8, 0x7, 0x6, "96669900"}, 0x7, 0x0, @fd=r0, 0x9, 0x0, r2}) r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@struct={0x0, 0x0, 0x0, 0x4, 0x0, 0x9}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x1, 0x3f}}]}}, &(0x7f0000000080)=""/236, 0x3e, 0xec, 0x8}, 0x20) r4 = socket(0xa, 0x1, 0x0) r5 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r4, 0x84, 0x11, &(0x7f0000000100)={r6}, 0x8) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r3, 0x84, 0x78, &(0x7f00000002c0)=r6, 0x4) ioctl$EVIOCGLED(r3, 0x80404519, &(0x7f0000000580)=""/250) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r8 = dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_CONGESTION(r8, 0x6, 0xd, &(0x7f0000000180)='lp\x00', 0x3) ioctl$VIDIOC_TRY_FMT(r8, 0xc0d05640, &(0x7f0000000400)={0xa, @raw_data="d456e651514154be56c23a0150374fec800b3363d0f8209aea95ae10a4bfe2bc4a059b555ffe32ee49657c21fdaeec9ff08b45f3c5b652502dd578edc616a43da8fa7411c10cf0be3062500d3923e6f93300ce6e6ca32a13179605ca95c9250023e974040392fcffaac49faad6d6549cb1f2e1c7492ba9a8e2d26787e1872027fbe8577edbc559354f305d4e05c26a2f708bb008ca01368edece7ac1108379664aea7622db8fe0f786d6a4177494b3766d3f6f8e4c69729d1cdef558344c8bab4dfc9bfc6bc56bfa"}) ioctl$BLKTRACETEARDOWN(r8, 0x1276, 0x0) dup(0xffffffffffffffff) r9 = dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_CONGESTION(r9, 0x6, 0xd, &(0x7f0000000180)='lp\x00', 0x3) ioctl$VIDIOC_TRY_FMT(r9, 0xc0d05640, &(0x7f0000000400)={0xa, @raw_data="d456e651514154be56c23a0150374fec800b3363d0f8209aea95ae10a4bfe2bc4a059b555ffe32ee49657c21fdaeec9ff08b45f3c5b652502dd578edc616a43da8fa7411c10cf0be3062500d3923e6f93300ce6e6ca32a13179605ca95c9250023e974040392fcffaac49faad6d6549cb1f2e1c7492ba9a8e2d26787e1872027fbe8577edbc559354f305d4e05c26a2f708bb008ca01368edece7ac1108379664aea7622db8fe0f786d6a4177494b3766d3f6f8e4c69729d1cdef558344c8bab4dfc9bfc6bc56bfa"}) io_uring_register$IORING_UNREGISTER_BUFFERS(r3, 0x1, 0x0, 0x0) ioctl$BLKTRACESTART(r9, 0x1274, 0x0) 08:18:01 executing program 4: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)=ANY=[@ANYBLOB="080600001cba0c435d91bc", @ANYRES32=0x0, @ANYBLOB="040000000000000010000200000000002000000000000000"], 0x2c, 0x0) r2 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDSETKEYCODE(r2, 0x4b4d, &(0x7f0000000000)={0x69, 0x3}) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r4, 0x0) chdir(&(0x7f0000000100)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') [ 593.035579][T15865] BPF:[2] ARRAY (anon) 08:18:01 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x305, &(0x7f0000000000)=ANY=[]}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1000000000000010, 0x400000000100) 08:18:01 executing program 5: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x305, &(0x7f0000000000)=ANY=[]}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1000000000000022, 0x400000000100) [ 593.066669][T15865] BPF:type_id=5 index_type_id=1 nr_elems=63 [ 593.085263][T15865] BPF: [ 593.088419][T15865] BPF:Invalid index [ 593.135194][T15865] BPF: [ 593.135194][T15865] 08:18:01 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) r0 = socket(0x1, 0x2, 0x0) getsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000140), &(0x7f0000000100)=0x1002e) fcntl$getownex(r0, 0x10, &(0x7f0000000240)) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f00000000c0)) ptrace(0x10, r1) ptrace$getregset(0x4204, r1, 0x201, &(0x7f00000001c0)={0x0}) r2 = syz_open_procfs(r1, &(0x7f0000000380)='net/mcfilter6\x00') fchdir(r2) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x9) unshare(0x28020400) socket$inet6_sctp(0xa, 0x5, 0x84) epoll_create1(0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) fanotify_init(0x10, 0x80000) epoll_create1(0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone3(0x0, 0x0) r3 = clone3(&(0x7f0000000280)={0x80040000, 0x0, &(0x7f00000000c0), 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) process_vm_writev(r3, &(0x7f0000000780)=[{&(0x7f00000004c0)=""/175, 0xaf}, {0x0}, {0x0}, {0x0}], 0x4, &(0x7f0000000580)=[{&(0x7f0000000ac0)=""/252, 0xfc}, {0x0}, {0x0}], 0x3, 0x0) 08:18:01 executing program 4: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="0200d100000002000000789cb53527473ac0b88a1c92f8996c74f33c4ff79f562b0382b4484d90871c089f08553e98d6a6f0633a1ae58e0680d695846a041cc188ecfccf6e63569af470f30658b1ee22a951f7cd3b425e88cb8122c759f2a14e799adc44cf626ec2aaa6b35f0ebe83074af99faf301b58823c75c78b1cfe179891ea6bd50100771f55746f96e1a268bc5b49e098b98474113edb1cf7b69438aaf679a1f63b12eb31afa260ff189971f53833b9e90b85e1cb9f30c0390468817de4ed281910c350e122b1792a", @ANYRES32=0x0, @ANYBLOB="040000000000000010000200000000002000000000000000"], 0x2c, 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file1\x00', r3, 0x0) chdir(&(0x7f0000000100)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') 08:18:01 executing program 0: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="02000000010000000000000002000000", @ANYRES32=0x0, @ANYBLOB="0400000400000000100002001000e84868a5ebc16702d093b8c549c45b00a98faf52564e4c9d66b15b2a02007a16c22415b354a726f789a4c4e5f93e4eb66c68754b3a99a48782ed280a00000000000022e59642bed9807614a68fcb1509e8e86442aaf02906fdc1e9d7e7bdf369ec3791621ea295c91ba4f7"], 0x2c, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x2, 0x2) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r3, 0x0) chdir(&(0x7f0000000100)='./file0\x00') r4 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x0, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r5, 0x84, 0xf, &(0x7f0000000340)={0x0, @in6={{0xa, 0x4e23, 0x7, @empty, 0xc85}}, 0x3, 0x9, 0x9, 0x3, 0x101}, &(0x7f0000000040)=0x98) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r4, 0x84, 0x72, &(0x7f0000000180)={r6, 0x7}, &(0x7f00000002c0)=0xc) symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') 08:18:01 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x16, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000340)}, 0x42) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0xffffffffa0008000, 0xffffffffffffff3e, 0x0, &(0x7f0000000040)="a34747e865af5cf11e34bdff7a7a5ba0051aae5804d5a05d9b9ff68e12bb4d43a20375ea905795449b957e956aa6", 0x0, 0x401, 0x0, 0x0, 0xfffffffffffffff3}, 0x28) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f0000000240)={0x1ff, 0xc, 0x4, 0x0, 0x27e5, {}, {0x4, 0x8, 0x4, 0x8, 0x7, 0x6, "96669900"}, 0x7, 0x0, @fd=r0, 0x9, 0x0, r2}) r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000500)={'bond_slave_0\x00', 0x0}) ioctl$sock_inet6_SIOCADDRT(r4, 0x890b, &(0x7f0000000680)={@ipv4={[], [], @local}, @dev={0xfe, 0x80, [], 0x3f}, @mcast2, 0x80000001, 0x4515, 0x5, 0x400, 0xffff, 0x800089, r5}) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@struct={0x0, 0x0, 0x0, 0x4, 0x0, 0x9}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x1, 0x3f}}]}}, &(0x7f0000000080)=""/236, 0x3e, 0xec, 0x8}, 0x20) r6 = openat$autofs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/autofs\x00', 0x121080, 0x0) ioctl$SG_GET_NUM_WAITING(r6, 0x227d, &(0x7f0000000300)) ioctl$EVIOCGLED(r3, 0x80404519, &(0x7f0000000580)=""/250) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) dup(0xffffffffffffffff) r8 = dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_CONGESTION(r8, 0x6, 0xd, &(0x7f0000000180)='lp\x00', 0x3) ioctl$VIDIOC_TRY_FMT(r8, 0xc0d05640, &(0x7f0000000400)={0xa, @raw_data="d456e651514154be56c23a0150374fec800b3363d0f8209aea95ae10a4bfe2bc4a059b555ffe32ee49657c21fdaeec9ff08b45f3c5b652502dd578edc616a43da8fa7411c10cf0be3062500d3923e6f93300ce6e6ca32a13179605ca95c9250023e974040392fcffaac49faad6d6549cb1f2e1c7492ba9a8e2d26787e1872027fbe8577edbc559354f305d4e05c26a2f708bb008ca01368edece7ac1108379664aea7622db8fe0f786d6a4177494b3766d3f6f8e4c69729d1cdef558344c8bab4dfc9bfc6bc56bfa"}) ioctl$BLKTRACESTART(r8, 0x1274, 0x0) 08:18:02 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x305, &(0x7f0000000000)=ANY=[]}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1000000000000011, 0x400000000100) 08:18:02 executing program 5: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x305, &(0x7f0000000000)=ANY=[]}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1000000000000023, 0x400000000100) 08:18:02 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) r0 = socket(0x1, 0x2, 0x0) getsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000140), &(0x7f0000000100)=0x1002e) fcntl$getownex(r0, 0x10, &(0x7f0000000240)) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f00000000c0)) ptrace(0x10, r1) ptrace$getregset(0x4204, r1, 0x201, &(0x7f00000001c0)={0x0}) r2 = syz_open_procfs(r1, &(0x7f0000000380)='net/mcfilter6\x00') fchdir(r2) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x9) unshare(0x28020400) socket$inet6_sctp(0xa, 0x5, 0x84) epoll_create1(0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) fanotify_init(0x10, 0x80000) epoll_create1(0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone3(0x0, 0x0) r3 = clone3(&(0x7f0000000280)={0x80040000, 0x0, &(0x7f00000000c0), 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) process_vm_writev(r3, &(0x7f0000000780)=[{&(0x7f00000004c0)=""/175, 0xaf}, {0x0}, {0x0}, {0x0}], 0x4, &(0x7f0000000580)=[{&(0x7f0000000ac0)=""/252, 0xfc}, {0x0}, {0x0}], 0x3, 0x0) 08:18:02 executing program 4: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [{}], {}, [], {0x10, 0x2}}, 0x2c, 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r3, 0x0) r4 = dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_CONGESTION(r4, 0x6, 0xd, &(0x7f0000000180)='lp\x00', 0x3) ioctl$VIDIOC_TRY_FMT(r4, 0xc0d05640, &(0x7f0000000200)={0xa, @win={{0x200, 0xb11, 0x5, 0x100}, 0x4, 0x1, &(0x7f0000000340)={{0x7ff, 0x4, 0x9, 0x80}, &(0x7f0000000080)={{0xffff8001, 0x3ff, 0x3, 0x8}, &(0x7f0000000040)={{0x7, 0x0, 0xe9a, 0x5}}}}, 0x2, &(0x7f0000000500)="203f4d2c829bbe88e709f2cfa2e0004a7f3683262b6723554e4190e1351122052766131324b27716fae5fc0e800e247605d896ce2e5d20e7043ed53a6eba87de39aa1d431ef6ee7c53ce3e98ef86a76df15b4f9b5b185299", 0x86}}) mkdirat(r4, &(0x7f0000000000)='./file0/file0\x00', 0x1) chdir(&(0x7f0000000100)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') [ 593.555056][T15994] BPF:[2] ARRAY (anon) [ 593.564760][T15994] BPF:type_id=5 index_type_id=1 nr_elems=63 [ 593.584575][T15994] BPF: [ 593.603005][T15994] BPF:Invalid index [ 593.613281][T15994] BPF: [ 593.613281][T15994] 08:18:02 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x305, &(0x7f0000000000)=ANY=[]}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1000000000000012, 0x400000000100) 08:18:02 executing program 5: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x305, &(0x7f0000000000)=ANY=[]}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1000000000000024, 0x400000000100) 08:18:02 executing program 0: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [{}], {}, [], {0x10, 0x2}}, 0x2c, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb3c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) r1 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOGETCMAP(r1, 0x4604, &(0x7f00000001c0)={0x6, 0x2, &(0x7f00000000c0)=[0x0, 0x0], &(0x7f0000000100)=[0x0], &(0x7f0000000140)=[0x0, 0x0], 0x0}) r2 = dup(r0) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xfffffffffffffffd, 0x10000) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) getsockopt$IPT_SO_GET_REVISION_MATCH(r2, 0x0, 0x42, &(0x7f0000000200)={'NETMAP\x00'}, &(0x7f0000000180)=0x1e) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r4 = socket(0x10, 0x2, 0x0) getpeername$tipc(r3, &(0x7f0000000040), &(0x7f0000000240)=0x10) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r5, 0x0) chdir(&(0x7f0000000100)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') 08:18:02 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) r0 = socket(0x1, 0x2, 0x0) getsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000140), &(0x7f0000000100)=0x1002e) fcntl$getownex(r0, 0x10, &(0x7f0000000240)) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f00000000c0)) ptrace(0x10, r1) ptrace$getregset(0x4204, r1, 0x201, &(0x7f00000001c0)={0x0}) r2 = syz_open_procfs(r1, &(0x7f0000000380)='net/mcfilter6\x00') fchdir(r2) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x9) unshare(0x28020400) socket$inet6_sctp(0xa, 0x5, 0x84) epoll_create1(0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) fanotify_init(0x10, 0x80000) epoll_create1(0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone3(0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000780)=[{&(0x7f00000004c0)=""/175, 0xaf}, {0x0}, {0x0}, {0x0}], 0x4, &(0x7f0000000580)=[{&(0x7f0000000ac0)=""/252, 0xfc}, {0x0}, {0x0}], 0x3, 0x0) 08:18:02 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x16, 0x27, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffff1971a4f0ff00000000b7060000000000811e6403000000000045040400010000001704000001000a00b7040000000100006a0af2fe00000000850000001a000000b70000000000000095000000000000009e17890efaee5eab7ff8a8cdc21ce784909b849d5550ad855dab54d8877a6db61d69f2ffcaa10350e11cb97c8adf1bc9a0c4ee6d9674c77404ceb9971e43405d621ffbc9a4fd39b0b56bfe6508ebb3c44eb84049761451ce540c772e2d9f8004e26f7fcc059c062234d5595f6fba87b81d1106fb0289ce67a66afd9ac3d09e29a9d542ca9d85a5c9c88474895d679838def0a83a733dc6a39b63a5ed69d32394c53361d7480884bd8048a967d9b912ef9f1d6fee41f5b29d37acb91c61ccd1df673896450f859ce8122a79c3e4"], &(0x7f00000002c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000340)={0xffffffff}, 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0xffffffffa0008000, 0xffffffffffffff3e, 0x0, &(0x7f0000000040)="a34747e865af5cf11e34bdff7a7a5ba0051aae5804d5a05d9b9ff68e12bb4d43a20375ea905795449b957e956aa6", 0x0, 0x401, 0x0, 0x0, 0xfffffffffffffff3}, 0x28) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f0000000240)={0x1ff, 0xc, 0x4, 0x0, 0x27e5, {}, {0x4, 0x8, 0x4, 0x8, 0x7, 0x6, "96669900"}, 0x7, 0x0, @fd=r0, 0x9, 0x0, r2}) r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@struct={0x0, 0x0, 0x0, 0x4, 0x0, 0x9}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x1, 0x3f}}]}}, &(0x7f0000000080)=""/236, 0x3e, 0xec, 0x8}, 0x20) ioctl$EVIOCGLED(r3, 0x80404519, &(0x7f0000000580)=""/250) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) dup(0xffffffffffffffff) r5 = dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_CONGESTION(r5, 0x6, 0xd, &(0x7f0000000180)='lp\x00', 0x3) ioctl$VIDIOC_TRY_FMT(r5, 0xc0d05640, &(0x7f0000000400)={0xa, @raw_data="d456e651514154be56c23a0150374fec800b3363d0f8209aea95ae10a4bfe2bc4a059b555ffe32ee49657c21fdaeec9ff08b45f3c5b652502dd578edc616a43da8fa7411c10cf0be3062500d3923e6f93300ce6e6ca32a13179605ca95c9250023e974040392fcffaac49faad6d6549cb1f2e1c7492ba9a8e2d26787e1872027fbe8577edbc559354f305d4e05c26a2f708bb008ca01368edece7ac1108379664aea7622db8fe0f786d6a4177494b3766d3f6f8e4c69729d1cdef558344c8bab4dfc9bfc6bc56bfa"}) ioctl$BLKTRACESTART(r5, 0x1274, 0x0) 08:18:02 executing program 4: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000000)=ANY=[@ANYBLOB="02000000010000000000000002000000", @ANYRES32=0x0, @ANYBLOB="0400000000000000634a1a783cb06fa6d85862a304ef03e19000a95a476a1de4a6c68e5a00607ec1171eeb9cd39d4c355fad1e5e5a"], 0x2c, 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r3, 0x0) chdir(&(0x7f0000000100)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') 08:18:02 executing program 5: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x305, &(0x7f0000000000)=ANY=[]}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1000000000000025, 0x400000000100) 08:18:02 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x305, &(0x7f0000000000)=ANY=[]}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1000000000000013, 0x400000000100) 08:18:02 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) r0 = socket(0x1, 0x2, 0x0) getsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000140), &(0x7f0000000100)=0x1002e) fcntl$getownex(r0, 0x10, &(0x7f0000000240)) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f00000000c0)) ptrace(0x10, r1) ptrace$getregset(0x4204, r1, 0x201, &(0x7f00000001c0)={0x0}) r2 = syz_open_procfs(r1, &(0x7f0000000380)='net/mcfilter6\x00') fchdir(r2) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x9) unshare(0x28020400) socket$inet6_sctp(0xa, 0x5, 0x84) epoll_create1(0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) fanotify_init(0x10, 0x80000) epoll_create1(0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone3(0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000780)=[{&(0x7f00000004c0)=""/175, 0xaf}, {0x0}, {0x0}, {0x0}], 0x4, &(0x7f0000000580)=[{&(0x7f0000000ac0)=""/252, 0xfc}, {0x0}, {0x0}], 0x3, 0x0) 08:18:02 executing program 5: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x305, &(0x7f0000000000)=ANY=[]}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1000000000000026, 0x400000000100) 08:18:02 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x16, 0xe, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000340)}, 0x42) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0xffffffffa0008000, 0xffffffffffffff3e, 0x0, &(0x7f0000000040)="a34747e865af5cf11e34bdff7a7a5ba0051aae5804d5a05d9b9ff68e12bb4d43a20375ea905795449b957e956aa6", 0x0, 0x401, 0x0, 0x0, 0xfffffffffffffff3}, 0x28) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f0000000240)={0x1ff, 0xc, 0x4, 0x0, 0x27e5, {}, {0x4, 0x8, 0x4, 0x8, 0x7, 0x6, "96669900"}, 0x7, 0x0, @fd=r0, 0x9, 0x0, r2}) r3 = dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f0000000180)='lp\x00', 0x3) ioctl$VIDIOC_TRY_FMT(r3, 0xc0d05640, &(0x7f0000000400)={0xa, @raw_data="d456e651514154be56c23a0150374fec800b3363d0f8209aea95ae10a4bfe2bc4a059b555ffe32ee49657c21fdaeec9ff08b45f3c5b652502dd578edc616a43da8fa7411c10cf0be3062500d3923e6f93300ce6e6ca32a13179605ca95c9250023e974040392fcffaac49faad6d6549cb1f2e1c7492ba9a8e2d26787e1872027fbe8577edbc559354f305d4e05c26a2f708bb008ca01368edece7ac1108379664aea7622db8fe0f786d6a4177494b3766d3f6f8e4c69729d1cdef558344c8bab4dfc9bfc6bc56bfa"}) ioctl$BLKREPORTZONE(r3, 0xc0101282, &(0x7f0000000800)={0x9, 0x4, 0x0, [{0xae29, 0x7, 0x9, 0x4, 0x7, 0x2, 0x7}, {0x54, 0x2, 0x0, 0x5, 0x11, 0x0, 0xd8}, {0xffffffffffffff77, 0xe56b, 0x9a63, 0x9, 0x0, 0x2f, 0x3}, {0x80000001, 0x401, 0x10000, 0x9, 0x3, 0x80}]}) r4 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="9feb0100180000000000000024000000240800000200000000000000000000040900000000000000000000030000000005000000010000003f00000000ba"], &(0x7f0000000080)=""/236, 0x3e, 0xec, 0x8}, 0x20) ioctl$EVIOCGLED(r4, 0x80404519, &(0x7f0000000580)=""/250) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) dup(0xffffffffffffffff) r6 = dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_CONGESTION(r6, 0x6, 0xd, &(0x7f0000000180)='lp\x00', 0x3) ioctl$VIDIOC_TRY_FMT(r6, 0xc0d05640, &(0x7f0000000400)={0xa, @raw_data="d456e651514154be56c23a0150374fec800b3363d0f8209aea95ae10a4bfe2bc4a059b555ffe32ee49657c21fdaeec9ff08b45f3c5b652502dd578edc616a43da8fa7411c10cf0be3062500d3923e6f93300ce6e6ca32a13179605ca95c9250023e974040392fcffaac49faad6d6549cb1f2e1c7492ba9a8e2d26787e1872027fbe8577edbc559354f305d4e05c26a2f708bb008ca01368edece7ac1108379664aea7622db8fe0f786d6a4177494b3766d3f6f8e4c69729d1cdef558344c8bab4dfc9bfc6bc56bfa"}) ioctl$BLKTRACESTART(r6, 0x1274, 0x0) 08:18:02 executing program 0: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [{}], {}, [], {0x10, 0x2}}, 0x2c, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) setsockopt$inet_mreq(r1, 0x0, 0x24, &(0x7f00000002c0)={@multicast2, @broadcast}, 0x8) r2 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) r5 = syz_open_dev$vcsu(&(0x7f0000000000)='/dev/vcsu#\x00', 0x1f, 0x701681) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r6, 0x84, 0x10, &(0x7f0000000040)=@assoc_value={0x0, 0x9}, &(0x7f0000000180)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r5, 0x84, 0x1f, &(0x7f0000000200)={r7, @in6={{0xa, 0x4e21, 0x2, @ipv4={[], [], @broadcast}, 0x100}}, 0x8000, 0x8000}, 0x90) chown(&(0x7f00000001c0)='./file0\x00', r4, 0x0) chdir(&(0x7f0000000100)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') 08:18:02 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x305, &(0x7f0000000000)=ANY=[]}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1000000000000014, 0x400000000100) 08:18:02 executing program 4: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) write$FUSE_POLL(r1, &(0x7f0000000000)={0x18, 0x0, 0x4, {0xf5fd}}, 0x18) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [{}], {}, [], {0x10, 0x2}}, 0x2c, 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r3, 0x0) chdir(&(0x7f0000000100)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') 08:18:03 executing program 5: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x305, &(0x7f0000000000)=ANY=[]}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1000000000000027, 0x400000000100) 08:18:03 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) r0 = socket(0x1, 0x2, 0x0) getsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000140), &(0x7f0000000100)=0x1002e) fcntl$getownex(r0, 0x10, &(0x7f0000000240)) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f00000000c0)) ptrace(0x10, r1) ptrace$getregset(0x4204, r1, 0x201, &(0x7f00000001c0)={0x0}) r2 = syz_open_procfs(r1, &(0x7f0000000380)='net/mcfilter6\x00') fchdir(r2) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x9) unshare(0x28020400) socket$inet6_sctp(0xa, 0x5, 0x84) epoll_create1(0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) fanotify_init(0x10, 0x80000) epoll_create1(0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone3(0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000780)=[{&(0x7f00000004c0)=""/175, 0xaf}, {0x0}, {0x0}, {0x0}], 0x4, &(0x7f0000000580)=[{&(0x7f0000000ac0)=""/252, 0xfc}, {0x0}, {0x0}], 0x3, 0x0) 08:18:03 executing program 0: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r0 = getegid() r1 = getgid() setresgid(0x0, r1, 0x0) r2 = getgid() setresgid(0x0, r2, 0x0) r3 = getgid() setresgid(0x0, r3, 0x0) r4 = getgid() setresgid(0x0, r4, 0x0) r5 = getgid() setresgid(0x0, r5, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000100)='./file0/file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000000)={{}, {}, [{}], {}, [{0x8, 0x4, r0}, {0x8, 0x4, r1}, {0x8, 0x0, r2}, {0x8, 0x4, r3}, {0x8, 0x2, r4}, {0x8, 0x4, r2}, {0x8, 0x6, r5}], {0x10, 0x2}}, 0x64, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r9, 0x0) symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') 08:18:03 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x16, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000340)}, 0x42) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0xffffffffa0008000, 0xffffffffffffff3e, 0x0, &(0x7f0000000040)="a34747e865af5cf11e34bdff7a7a5ba0051aae5804d5a05d9b9ff68e12bb4d43a20375ea905795449b957e956aa6", 0x0, 0x401, 0x0, 0x0, 0xfffffffffffffff3}, 0x28) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f0000000240)={0x1ff, 0xc, 0x4, 0x80000, 0x27e5, {}, {0x4, 0x8, 0x4, 0x8, 0x7, 0x6, "96669900"}, 0x7, 0x0, @fd=r0, 0x9, 0x0, r2}) r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@struct={0x0, 0x0, 0x0, 0x4, 0x0, 0x9}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x1, 0x3f}}]}}, &(0x7f0000000080)=""/236, 0x3e, 0xec, 0x8}, 0x20) ioctl$EVIOCGLED(r3, 0x80404519, &(0x7f0000000580)=""/250) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket$nl_route(0x10, 0x3, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) r9 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x1d7) sendmsg$nl_route(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r10, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002011400010000000000", @ANYRES32=0x0, @ANYBLOB="00008f2b137d10db8762c4a79270a73561582d26481439000000c76f4503775e3a3ca76b940ae108b24a5a073ab87e"], 0x48}}, 0x0) sendmsg$nl_route(r7, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000240)=@newneigh={0x30, 0x1c, 0x205, 0x0, 0x0, {0xa, 0x0, 0x0, r10, 0x0, 0xa}, [@NDA_DST_IPV6={0x14, 0x1, @loopback}]}, 0x30}}, 0x0) sendmsg$nl_route(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000900)=ANY=[@ANYBLOB="20000000110001040000000000000000020000fd", @ANYRES32=r10, @ANYBLOB="ee023c8efaa10834eaabf1c60ad950ee2f2d47f7ce2a4322b0086dc768b2207574c9fc1d00b3bca86c9906f797f5640158f72e864bfd43274f13c4e4c99a23b3439ebbc59867c9d701745c4835f89571caf2f62b8925ede0a1324af1f15643a5ac4a276caf99f1b2e47596746b91973a459f15aa766d68d555df4c752876e712c9c73239c2bb60788f1901e05f5d324dcceee1e7f6c92e6f90f163b1f9"], 0x20}}, 0x0) ioctl$sock_inet6_SIOCADDRT(r5, 0x890b, &(0x7f00000002c0)={@local, @rand_addr="079341c8cf72f49fcf2fa3b6c4d657f7", @remote, 0x0, 0x9, 0xe8af, 0x0, 0x10001, 0x2410040, r10}) dup(0xffffffffffffffff) r11 = dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_CONGESTION(r11, 0x6, 0xd, &(0x7f0000000180)='lp\x00', 0x3) ioctl$VIDIOC_TRY_FMT(r11, 0xc0d05640, &(0x7f0000000400)={0xa, @raw_data="d456e651514154be56c23a0150374fec800b3363d0f8209aea95ae10a4bfe2bc4a059b555ffe32ee49657c21fdaeec9ff08b45f3c5b652502dd578edc616a43da8fa7411c10cf0be3062500d3923e6f93300ce6e6ca32a13179605ca95c9250023e974040392fcffaac49faad6d6549cb1f2e1c7492ba9a8e2d26787e1872027fbe8577edbc559354f305d4e05c26a2f708bb008ca01368edece7ac1108379664aea7622db8fe0f786d6a4177494b3766d3f6f8e4c69729d1cdef558344c8bab4dfc9bfc6bc56bfa"}) ioctl$BLKTRACESTART(r11, 0x1274, 0x0) 08:18:03 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x305, &(0x7f0000000000)=ANY=[]}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1000000000000015, 0x400000000100) 08:18:03 executing program 5: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x305, &(0x7f0000000000)=ANY=[]}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1000000000000028, 0x400000000100) 08:18:03 executing program 4: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [{}], {}, [], {0x10, 0x2}}, 0x2c, 0x0) r2 = socket(0x10, 0x2, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000540)={{0x0, 0x7}, 'port1\x00', 0x8, 0x10000, 0x80000000, 0x1000, 0x1, 0x6, 0x5f, 0x0, 0x7}) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) setsockopt$inet6_dccp_buf(r3, 0x21, 0xc, &(0x7f0000000280)="3b765e67b1f4b54568b67220f9e95ee9e1ad617fbf4abc801f6a273f83a71820e9930227dfcfe5bb43c5de43a155d103be29defd0606", 0x36) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000000040)=0xfffffffffffffe7f) chown(&(0x7f00000001c0)='./file0\x00', r4, 0x0) chdir(&(0x7f0000000100)='./file0\x00') r5 = dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_CONGESTION(r5, 0x6, 0xd, &(0x7f0000000180)='lp\x00', 0x3) ioctl$VIDIOC_TRY_FMT(r5, 0xc0d05640, &(0x7f0000000400)={0xa, @raw_data="d456e651514154be56c23a0150374fec800b3363d0f8209aea95ae10a4bfe2bc4a059b555ffe32ee49657c21fdaeec9ff08b45f3c5b652502dd578edc616a43da8fa7411c10cf0be3062500d3923e6f93300ce6e6ca32a13179605ca95c9250023e974040392fcffaac49faad6d6549cb1f2e1c7492ba9a8e2d26787e1872027fbe8577edbc559354f305d4e05c26a2f708bb008ca01368edece7ac1108379664aea7622db8fe0f786d6a4177494b3766d3f6f8e4c69729d1cdef558344c8bab4dfc9bfc6bc56bfa"}) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) ioctl$VIDIOC_QUERYBUF(r5, 0xc0585609, &(0x7f0000000200)={0x1e, 0xa, 0x4, 0x10, 0x1000, {0x0, 0x2710}, {0x4, 0x0, 0x6, 0x0, 0x7, 0x9, "fa7b9187"}, 0x0, 0x2, @userptr=0x7, 0x0, 0x0, r6}) r8 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080)='batadv\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000400)={{{@in6=@dev, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@remote}}, &(0x7f00000002c0)=0xe8) sendmsg$BATADV_CMD_GET_HARDIF(r7, &(0x7f0000000500)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[@ANYBLOB="1c800200", @ANYRES16=r8, @ANYBLOB="02002abd7000fddbdf250500000008000600", @ANYRES32=r9, @ANYBLOB], 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0x20000005) symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') 08:18:03 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) r0 = socket(0x1, 0x2, 0x0) getsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000140), &(0x7f0000000100)=0x1002e) fcntl$getownex(r0, 0x10, &(0x7f0000000240)) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f00000000c0)) ptrace(0x10, r1) ptrace$getregset(0x4204, r1, 0x201, &(0x7f00000001c0)={0x0}) r2 = syz_open_procfs(r1, &(0x7f0000000380)='net/mcfilter6\x00') fchdir(r2) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x9) unshare(0x28020400) socket$inet6_sctp(0xa, 0x5, 0x84) epoll_create1(0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) fanotify_init(0x10, 0x80000) epoll_create1(0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r3 = clone3(&(0x7f0000000280)={0x80040000, 0x0, &(0x7f00000000c0), 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) process_vm_writev(r3, &(0x7f0000000780)=[{&(0x7f00000004c0)=""/175, 0xaf}, {0x0}, {0x0}, {0x0}], 0x4, &(0x7f0000000580)=[{&(0x7f0000000ac0)=""/252, 0xfc}, {0x0}, {0x0}], 0x3, 0x0) 08:18:03 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x16, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffff1971a4f0ff00000000b7060000000000811e6403000000000045040400010000001704000001000a00b7040000000100006a0af2fe00000000850000001a000000b70000000000000095000000000000009e17890efaee5eab7ff8a8cdc21ce78490d8877a6db61d69f2ffcaa10350e11cb97c8adf1bc9a0c4ee6d9674c77404ceb9971e43405d621ffbc9a4fd39b0b56bfe6508ebb3c44eb84049761451ce540c772e2d9f8004e26f7fcc059c062234d5595f6fba87b81d1106fb0289ce67a66afd9ac3d09e29a9d542ca9d85a5c9c88474895d679838def0a83a733dc6a39b63a5ed69d32394c53361d7480884bd8048a967d9b912ef9f1d6fee41f5b29d37acb91c61ccd1df673896450f859ce8122a79c3f6"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000340)}, 0x42) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0xffffffffa0008000, 0xffffffffffffff3e, 0x0, &(0x7f0000000040)="a34747e865af5cf11e34bdff7a7a5ba0051aae5804d5a05d9b9ff68e12bb4d43a20375ea905795449b957e956aa6", 0x0, 0x401, 0x0, 0x0, 0xfffffffffffffff3}, 0x28) clock_gettime(0x0, &(0x7f00000002c0)={0x0, 0x0}) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f0000000240)={0x1ff, 0xc, 0x4, 0x0, 0x27e5, {r3, r4/1000+10000}, {0x4, 0x8, 0x4, 0x8, 0x7, 0x6, "96669900"}, 0x7, 0x0, @offset=0x8000, 0x9, 0x0, r2}) r5 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@struct={0x0, 0x0, 0x0, 0x4, 0x0, 0x9}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x1, 0x3f}}]}}, &(0x7f0000000080)=""/236, 0x3e, 0xec, 0x8}, 0x20) ioctl$EVIOCGLED(r5, 0x80404519, &(0x7f0000000580)=""/250) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) dup(0xffffffffffffffff) r7 = dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_CONGESTION(r7, 0x6, 0xd, &(0x7f0000000180)='lp\x00', 0x3) ioctl$VIDIOC_TRY_FMT(r7, 0xc0d05640, &(0x7f0000000400)={0xa, @raw_data="d456e651514154be56c23a0150374fec800b3363d0f8209aea95ae10a4bfe2bc4a059b555ffe32ee49657c21fdaeec9ff08b45f3c5b652502dd578edc616a43da8fa7411c10cf0be3062500d3923e6f93300ce6e6ca32a13179605ca95c9250023e974040392fcffaac49faad6d6549cb1f2e1c7492ba9a8e2d26787e1872027fbe8577edbc559354f305d4e05c26a2f708bb008ca01368edece7ac1108379664aea7622db8fe0f786d6a4177494b3766d3f6f8e4c69729d1cdef558344c8bab4dfc9bfc6bc56bfa"}) ioctl$BLKTRACESTART(r7, 0x1274, 0x0) 08:18:03 executing program 0: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)=ANY=[@ANYBLOB="0200006465fe5712378dde0002000000", @ANYRES32=0x0, @ANYBLOB="040000000000000010000200000000002000000000000000"], 0x2c, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x20000, 0x0) r1 = socket(0xa, 0x1, 0x0) r2 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x11, &(0x7f0000000100)={r3}, 0x8) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000040)={r3, 0x5}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000200)=@assoc_value={r4, 0x4b}, &(0x7f0000000240)=0x8) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r8, 0x0) chdir(&(0x7f0000000100)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') 08:18:03 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x305, &(0x7f0000000000)=ANY=[]}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1000000000000016, 0x400000000100) 08:18:03 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) r0 = socket(0x1, 0x2, 0x0) getsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000140), &(0x7f0000000100)=0x1002e) fcntl$getownex(r0, 0x10, &(0x7f0000000240)) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f00000000c0)) ptrace(0x10, r1) ptrace$getregset(0x4204, r1, 0x201, &(0x7f00000001c0)={0x0}) r2 = syz_open_procfs(r1, &(0x7f0000000380)='net/mcfilter6\x00') fchdir(r2) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x9) unshare(0x28020400) socket$inet6_sctp(0xa, 0x5, 0x84) epoll_create1(0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) fanotify_init(0x10, 0x80000) epoll_create1(0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) r3 = clone3(&(0x7f0000000280)={0x80040000, 0x0, &(0x7f00000000c0), 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) process_vm_writev(r3, &(0x7f0000000780)=[{&(0x7f00000004c0)=""/175, 0xaf}, {0x0}, {0x0}, {0x0}], 0x4, &(0x7f0000000580)=[{&(0x7f0000000ac0)=""/252, 0xfc}, {0x0}, {0x0}], 0x3, 0x0) 08:18:03 executing program 5: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x305, &(0x7f0000000000)=ANY=[]}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1000000000000029, 0x400000000100) 08:18:03 executing program 4: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [{}], {}, [], {0x10, 0x2}}, 0x2c, 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r3, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) getsockname$inet(r4, &(0x7f0000000000)={0x2, 0x0, @multicast2}, &(0x7f0000000040)=0x10) chdir(&(0x7f0000000100)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') [ 595.086106][T16491] BPF:[2] ARRAY (anon) [ 595.101032][T16491] BPF:type_id=5 index_type_id=1 nr_elems=63 08:18:03 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x305, &(0x7f0000000000)=ANY=[]}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1000000000000017, 0x400000000100) 08:18:03 executing program 5: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x305, &(0x7f0000000000)=ANY=[]}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x100000000000002a, 0x400000000100) [ 595.145130][T16491] BPF: [ 595.148527][T16491] BPF:Invalid index [ 595.178949][T16491] BPF: [ 595.178949][T16491] 08:18:03 executing program 0: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [{}], {}, [], {0x10, 0x2}}, 0x2c, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r3, 0x0) chdir(&(0x7f0000000100)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') r4 = socket(0x10, 0x803, 0x0) r5 = dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_CONGESTION(r5, 0x6, 0xd, &(0x7f0000000180)='lp\x00', 0x3) ioctl$VIDIOC_TRY_FMT(r5, 0xc0d05640, &(0x7f0000000400)={0xa, @raw_data="d456e651514154be56c23a0150374fec800b3363d0f8209aea95ae10a4bfe2bc4a059b555ffe32ee49657c21fdaeec9ff08b45f3c5b652502dd578edc616a43da8fa7411c10cf0be3062500d3923e6f93300ce6e6ca32a13179605ca95c9250023e974040392fcffaac49faad6d6549cb1f2e1c7492ba9a8e2d26787e1872027fbe8577edbc559354f305d4e05c26a2f708bb008ca01368edece7ac1108379664aea7622db8fe0f786d6a4177494b3766d3f6f8e4c69729d1cdef558344c8bab4dfc9bfc6bc56bfa"}) ioctl$USBDEVFS_SUBMITURB(r5, 0x8038550a, &(0x7f00000002c0)=@urb_type_bulk={0x3, {0xc, 0x1}, 0xf6, 0x3, &(0x7f0000000280)="b373a267", 0x4, 0x6, 0x6, 0x0, 0x101, 0x1, &(0x7f0000000400)="a133cec68f5e915705a1d66449c80cbb9e8885b53567d2f9ced8aa679581d7924009cef47ad0dbbc99977393354b1c5b90c9e76a16f25f55a800374f081f644b5e6488e340efd9b3ffc1b5461f1b20048393016d744dece82db80f020c180738bbc6b1e2c9ca8fa978cf0a9d750eca57cc9b6d7d2d7dc529b2e10f9404d016fcaba8"}) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$NFNL_MSG_ACCT_GET_CTRZERO(r4, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000040)={&(0x7f0000000200)=ANY=[@ANYBLOB="7c000000020701040000000000000086253c0100a800000008000540000000032c0007800800024000000401080001400000fde2080001400000010008000140000000ee08000240000004000c00034000000000000000020c00034000000000000000051c000780080001400000000308000140ffffffe008000240"], 0x7c}, 0x1, 0x0, 0x0, 0x4084}, 0x400) 08:18:03 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) r0 = socket(0x1, 0x2, 0x0) getsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000140), &(0x7f0000000100)=0x1002e) fcntl$getownex(r0, 0x10, &(0x7f0000000240)) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f00000000c0)) ptrace(0x10, r1) ptrace$getregset(0x4204, r1, 0x201, &(0x7f00000001c0)={0x0}) r2 = syz_open_procfs(r1, &(0x7f0000000380)='net/mcfilter6\x00') fchdir(r2) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x9) unshare(0x28020400) socket$inet6_sctp(0xa, 0x5, 0x84) epoll_create1(0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) fanotify_init(0x10, 0x80000) epoll_create1(0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r3 = clone3(&(0x7f0000000280)={0x80040000, 0x0, &(0x7f00000000c0), 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) process_vm_writev(r3, &(0x7f0000000780)=[{&(0x7f00000004c0)=""/175, 0xaf}, {0x0}, {0x0}, {0x0}], 0x4, &(0x7f0000000580)=[{&(0x7f0000000ac0)=""/252, 0xfc}, {0x0}, {0x0}], 0x3, 0x0) 08:18:03 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x16, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffff1971a4f0ff00000000b7060000000000811e6403000000000045040400010000001704000001000a00b7040000000100006a0af2fe00000000850000001a000000b70000000000000095000000000000009e17890efaee5eab7ff8a8cdc21ce784909b849d5550ad855dab54d8877a6db61d69f2ffcaa10350e11cb97c8adf1bc9a0c4ee6d9674c77404ceb9971e43405d621ffbc9a4fd39b0b56bfe6508ebb3c44eb84049761451ce540c772e2d9f8004e26f7fcc059c062234d5595f6fba87b81d1106fb0289ce67a66afd9ac3d09e29a9d542ca9d85a5c9c88474895d679838def0a83a733dc6a39b63a5ed69d32394c53361d7480884bd8048a967d9b912ef9f1d6fee41f5b29d37acb91c61ccd1df673896450f859ce8122a79c3e4"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000340)}, 0x42) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0xffffffffa0008000, 0xffffffffffffff3e, 0x0, &(0x7f0000000040)="a34747e865af5cf11e34bdff7a7a5ba0051aae5804d5a05d9b9ff68e12bb4d43a20375ea905795449b957e956aa6", 0x0, 0x401, 0x0, 0x0, 0xfffffffffffffff3}, 0x28) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f0000000240)={0x1ff, 0xc, 0x4, 0x0, 0x27e5, {}, {0x4, 0x8, 0x4, 0x8, 0x7, 0x6, "96669900"}, 0x7, 0x0, @fd=r0, 0x9, 0x0, r2}) r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="9feb0100180000000000000024000000240000000200000000000000000000040900000000000000000000031a000005000000010000003f000000000000"], &(0x7f0000000080)=""/236, 0x3e, 0xec, 0x8}, 0x20) ioctl$EVIOCGLED(r3, 0x80404519, &(0x7f0000000580)=""/250) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r5 = gettid() sched_setscheduler(r5, 0x6, &(0x7f00000002c0)=0x62b) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) dup(0xffffffffffffffff) r6 = dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_CONGESTION(r6, 0x6, 0xd, &(0x7f0000000180)='lp\x00', 0x3) ioctl$VIDIOC_TRY_FMT(r6, 0xc0d05640, &(0x7f0000000400)={0xa, @raw_data="d456e651514154be56c23a0150374fec800b3363d0f8209aea95ae10a4bfe2bc4a059b555ffe32ee49657c21fdaeec9ff08b45f3c5b652502dd578edc616a43da8fa7411c10cf0be3062500d3923e6f93300ce6e6ca32a13179605ca95c9250023e974040392fcffaac49faad6d6549cb1f2e1c7492ba9a8e2d26787e1872027fbe8577edbc559354f305d4e05c26a2f708bb008ca01368edece7ac1108379664aea7622db8fe0f786d6a4177494b3766d3f6f8e4c69729d1cdef558344c8bab4dfc9bfc6bc56bfa"}) ioctl$BLKTRACESTART(r6, 0x1274, 0x0) 08:18:04 executing program 5: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x305, &(0x7f0000000000)=ANY=[]}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x100000000000002b, 0x400000000100) 08:18:04 executing program 4: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="02000000010000000000000002000000", @ANYRES32=0x0, @ANYBLOB="04000000000000001001000000005bdf2b91901c9600002000000000000000f2cea502c7b17d4e43aef2aa49"], 0x2c, 0x0) r2 = socket(0x10, 0x2, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000200)={&(0x7f0000000080)='./file1\x00', r1}, 0x10) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r3, 0x0) chdir(&(0x7f0000000100)='./file0\x00') setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000180)='lp\x00', 0x3) ioctl$VIDIOC_TRY_FMT(0xffffffffffffffff, 0xc0d05640, &(0x7f0000000400)={0xa, @raw_data="d456e651514154be56c23a0150374fec800b3363d0f8209aea95ae10a4bfe2bc4a059b555ffe32ee49657c21fdaeec9ff08b45f3c5b652502dd578edc616a43da8fa7411c10cf0be3062500d3923e6f93300ce6e6ca32a13179605ca95c9250023e974040392fcffaac49faad6d6549cb1f2e1c7492ba9a8e2d26787e1872027fbe8577edbc559354f305d4e05c26a2f708bb008ca01368edece7ac1108379664aea7622db8fe0f786d6a4177494b3766d3f6f8e4c69729d1cdef558344c8bab4dfc9bfc6bc56bfa"}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f0000000000)={0x47, @time={0xfff, 0x7}, 0x80, {0xfb, 0x7f}, 0x1f, 0x0, 0x43}) 08:18:04 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x305, &(0x7f0000000000)=ANY=[]}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1000000000000018, 0x400000000100) 08:18:04 executing program 0: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket(0x10, 0x2, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r3, 0x0) chdir(&(0x7f0000000100)='./file0\x00') r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') 08:18:04 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) r0 = socket(0x1, 0x2, 0x0) getsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000140), &(0x7f0000000100)=0x1002e) fcntl$getownex(r0, 0x10, &(0x7f0000000240)) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f00000000c0)) ptrace(0x10, r1) ptrace$getregset(0x4204, r1, 0x201, &(0x7f00000001c0)={0x0}) r2 = syz_open_procfs(r1, &(0x7f0000000380)='net/mcfilter6\x00') fchdir(r2) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x9) unshare(0x28020400) socket$inet6_sctp(0xa, 0x5, 0x84) epoll_create1(0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) fanotify_init(0x10, 0x80000) epoll_create1(0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r3 = clone3(&(0x7f0000000280)={0x80040000, 0x0, &(0x7f00000000c0), 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) process_vm_writev(r3, &(0x7f0000000780)=[{&(0x7f00000004c0)=""/175, 0xaf}, {0x0}, {0x0}, {0x0}], 0x4, &(0x7f0000000580)=[{&(0x7f0000000ac0)=""/252, 0xfc}, {0x0}, {0x0}], 0x3, 0x0) 08:18:04 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x305, &(0x7f0000000000)=ANY=[]}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1000000000000019, 0x400000000100) [ 595.626197][T16629] BPF:[2] ARRAY (anon) [ 595.646143][T16629] BPF:type_id=16777216 index_type_id=1056964608 nr_elems=0 08:18:04 executing program 5: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x305, &(0x7f0000000000)=ANY=[]}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x100000000000002c, 0x400000000100) [ 595.695719][T16629] BPF: [ 595.698700][T16629] BPF:size != 0 [ 595.710419][T16629] BPF: [ 595.710419][T16629] 08:18:04 executing program 4: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [{}], {}, [], {0x10, 0x2}}, 0x2c, 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r4, 0x84, 0x73, &(0x7f0000000000)={0x0, 0x51, 0x10, 0x101}, &(0x7f0000000040)=0x18) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000080)={r5, 0x1, 0x20}, &(0x7f0000000180)=0xc) chdir(&(0x7f0000000100)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') 08:18:04 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) r0 = socket(0x1, 0x2, 0x0) getsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000140), &(0x7f0000000100)=0x1002e) fcntl$getownex(r0, 0x10, &(0x7f0000000240)) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f00000000c0)) ptrace(0x10, r1) ptrace$getregset(0x4204, r1, 0x201, &(0x7f00000001c0)={0x0}) r2 = syz_open_procfs(r1, &(0x7f0000000380)='net/mcfilter6\x00') fchdir(r2) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x9) unshare(0x28020400) socket$inet6_sctp(0xa, 0x5, 0x84) epoll_create1(0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) fanotify_init(0x10, 0x80000) epoll_create1(0x0) r3 = clone3(&(0x7f0000000280)={0x80040000, 0x0, &(0x7f00000000c0), 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) process_vm_writev(r3, &(0x7f0000000780)=[{&(0x7f00000004c0)=""/175, 0xaf}, {0x0}, {0x0}, {0x0}], 0x4, &(0x7f0000000580)=[{&(0x7f0000000ac0)=""/252, 0xfc}, {0x0}, {0x0}], 0x3, 0x0) 08:18:04 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x16, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000340)}, 0x42) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0xffffffffa0008000, 0xffffffffffffff3e, 0x0, &(0x7f0000000040)="a34747e865af5cf11e34bdff7a7a5ba0051aae5804d5a05d9b9ff68e12bb4d43a20375ea905795449b957e956aa6", 0x0, 0x401, 0x0, 0x0, 0xfffffffffffffff3}, 0x28) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f0000000240)={0x1ff, 0xc, 0x4, 0x0, 0x27e5, {}, {0x4, 0x8, 0x4, 0x8, 0x7, 0x6, "96669900"}, 0x7, 0x0, @fd=r0, 0x9, 0x0, r2}) r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@struct={0x0, 0x0, 0x0, 0x4, 0x0, 0x9}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x1, 0x3f}}]}}, &(0x7f0000000080)=""/236, 0x3e, 0xec, 0x8}, 0x20) ioctl$EVIOCGLED(r3, 0x80404519, &(0x7f0000000580)=""/250) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) dup(0xffffffffffffffff) r5 = dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_CONGESTION(r5, 0x6, 0xd, &(0x7f0000000180)='lp\x00', 0x3) ioctl$VIDIOC_TRY_FMT(r5, 0xc0d05640, &(0x7f0000000400)={0xa, @raw_data="d456e651514154be56c23a0150374fec800b3363d0f8209aea95ae10a4bfe2bc4a059b555ffe32ee49657c21fdaeec9ff08b45f3c5b652502dd578edc616a43da8fa7411c10cf0be3062500d3923e6f93300ce6e6ca32a13179605ca95c9250023e974040392fcffaac49faad6d6549cb1f2e1c7492ba9a8e2d26787e1872027fbe8577edbc559354f305d4e05c26a2f708bb008ca01368edece7ac1108379664aea7622db8fe0f786d6a4177494b3766d3f6f8e4c69729d1cdef558344c8bab4dfc9bfc6bc56bfa"}) 08:18:04 executing program 0: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [{}], {}, [], {0x10, 0x2}}, 0x2c, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000180)='lp\x00', 0x3) ioctl$VIDIOC_TRY_FMT(r1, 0xc0d05640, &(0x7f0000000400)={0xa, @raw_data="d456e651514154be56c23a0150374fec800b3363d0f8209aea95ae10a4bfe2bc4a059b555ffe32ee49657c21fdaeec9ff08b45f3c5b652502dd578edc616a43da8fa7411c10cf0be3062500d3923e6f93300ce6e6ca32a13179605ca95c9250023e974040392fcffaac49faad6d6549cb1f2e1c7492ba9a8e2d26787e1872027fbe8577edbc559354f305d4e05c26a2f708bb008ca01368edece7ac1108379664aea7622db8fe0f786d6a4177494b3766d3f6f8e4c69729d1cdef558344c8bab4dfc9bfc6bc56bfa"}) ioctl$KDGKBENT(r1, 0x4b46, &(0x7f0000000180)={0x1f, 0x7}) dup(r0) sched_setscheduler(0x0, 0x0, &(0x7f0000000380)) capget(&(0x7f0000000000), 0x0) syz_open_dev$sndseq(0x0, 0x0, 0xaad00) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x0, 0x300) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r3 = dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f0000000180)='lp\x00', 0x3) ioctl$VIDIOC_TRY_FMT(r3, 0xc0d05640, &(0x7f0000000400)={0xa, @raw_data="d456e651514154be56c23a0150374fec800b3363d0f8209aea95ae10a4bfe2bc4a059b555ffe32ee49657c21fdaeec9ff08b45f3c5b652502dd578edc616a43da8fa7411c10cf0be3062500d3923e6f93300ce6e6ca32a13179605ca95c9250023e974040392fcffaac49faad6d6549cb1f2e1c7492ba9a8e2d26787e1872027fbe8577edbc559354f305d4e05c26a2f708bb008ca01368edece7ac1108379664aea7622db8fe0f786d6a4177494b3766d3f6f8e4c69729d1cdef558344c8bab4dfc9bfc6bc56bfa"}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000001c0)={0x0, 0x80000, r3}) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) fcntl$getownex(r0, 0x10, &(0x7f0000000340)) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r5, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000100)=ANY=[@ANYRES64, @ANYRES32, @ANYRES32, @ANYRES32=0x0], 0x4, 0x0) r6 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r6, &(0x7f00000004c0)={0x18, 0x0, {0x100003, @local, 'ip6_vti0\x00'}}, 0x1e) r7 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r7, &(0x7f0000000000)={0x18, 0x0, {0x3, @empty, 'veth1_virt_wifi\x00'}}, 0x1e) ioctl$PPPOEIOCSFWD(r7, 0x4008b100, &(0x7f0000000040)={0x18, 0x0, {0x3, @local, 'ip6_vti0\x00'}}) gettid() sched_setscheduler(0x0, 0x5, &(0x7f0000000380)) move_pages(0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=[0x0], 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, 0xffffffffffffffff, 0x0) open(0x0, 0x141042, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x10, 0xffffffffffffffff, 0x0) open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) 08:18:04 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x305, &(0x7f0000000000)=ANY=[]}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x100000000000001a, 0x400000000100) 08:18:04 executing program 5: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x305, &(0x7f0000000000)=ANY=[]}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x100000000000002d, 0x400000000100) 08:18:04 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) r0 = socket(0x1, 0x2, 0x0) getsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000140), &(0x7f0000000100)=0x1002e) fcntl$getownex(r0, 0x10, &(0x7f0000000240)) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f00000000c0)) ptrace(0x10, r1) ptrace$getregset(0x4204, r1, 0x201, &(0x7f00000001c0)={0x0}) r2 = syz_open_procfs(r1, &(0x7f0000000380)='net/mcfilter6\x00') fchdir(r2) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x9) unshare(0x28020400) socket$inet6_sctp(0xa, 0x5, 0x84) epoll_create1(0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) fanotify_init(0x10, 0x80000) r3 = clone3(&(0x7f0000000280)={0x80040000, 0x0, &(0x7f00000000c0), 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) process_vm_writev(r3, &(0x7f0000000780)=[{&(0x7f00000004c0)=""/175, 0xaf}, {0x0}, {0x0}, {0x0}], 0x4, &(0x7f0000000580)=[{&(0x7f0000000ac0)=""/252, 0xfc}, {0x0}, {0x0}], 0x3, 0x0) 08:18:04 executing program 4: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [{}], {}, [], {0x10, 0x2}}, 0x2c, 0x0) r2 = socket(0x10, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) mlock2(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0) chown(&(0x7f00000001c0)='./file0\x00', r3, 0x0) chdir(&(0x7f0000000100)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') [ 596.187198][T16765] BPF:[2] ARRAY (anon) [ 596.203908][T16765] BPF:type_id=5 index_type_id=1 nr_elems=63 [ 596.236586][T16765] BPF: [ 596.257161][T16765] BPF:Invalid index [ 596.275034][T16765] BPF: [ 596.275034][T16765] 08:18:05 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x305, &(0x7f0000000000)=ANY=[]}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x100000000000001b, 0x400000000100) 08:18:05 executing program 5: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x305, &(0x7f0000000000)=ANY=[]}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x100000000000002e, 0x400000000100) 08:18:05 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) r0 = socket(0x1, 0x2, 0x0) getsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000140), &(0x7f0000000100)=0x1002e) fcntl$getownex(r0, 0x10, &(0x7f0000000240)) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f00000000c0)) ptrace(0x10, r1) ptrace$getregset(0x4204, r1, 0x201, &(0x7f00000001c0)={0x0}) r2 = syz_open_procfs(r1, &(0x7f0000000380)='net/mcfilter6\x00') fchdir(r2) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x9) unshare(0x28020400) socket$inet6_sctp(0xa, 0x5, 0x84) epoll_create1(0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r3 = clone3(&(0x7f0000000280)={0x80040000, 0x0, &(0x7f00000000c0), 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) process_vm_writev(r3, &(0x7f0000000780)=[{&(0x7f00000004c0)=""/175, 0xaf}, {0x0}, {0x0}, {0x0}], 0x4, &(0x7f0000000580)=[{&(0x7f0000000ac0)=""/252, 0xfc}, {0x0}, {0x0}], 0x3, 0x0) 08:18:05 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) pipe(&(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) r3 = dup(0xffffffffffffffff) setsockopt$packet_int(r3, 0x107, 0x10000000000f, 0x0, 0x0) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$kcm(0x11, 0xa, 0x300) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x5452, &(0x7f0000000040)) fcntl$getownex(r5, 0x10, &(0x7f0000000580)={0x0, 0x0}) r7 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r8, &(0x7f0000000140)=ANY=[], 0xfef0) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r9, r9) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000240)='system.posix_acl_access\x00', &(0x7f0000000a00)=ANY=[@ANYPTR64=&(0x7f0000000900)=ANY=[@ANYBLOB="93cf049886d0216d903e9da173b467d41f8846b08519c9e81446e2148a5eda0b95bdde1276597ecd3d787688b1359a9ec33a83a22e6077321efd1e4f8af6606e358464b9c0c88ceed9b1a6e056b18652efb9681f6d4a81d0024bc49ac5b97f8bbd3924a402f81e3ca9f2ab6febd56f12e7db520a3b4ffcafaeecae29e88124b11b61c3f91f1d608629376b578b6727f2aa773fe63456", @ANYRES16=r8, @ANYRESHEX, @ANYRES16=r9], @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYRESHEX=r2], 0x6, 0x1) r10 = gettid() waitid(0x83b895581628fca4, r10, &(0x7f0000000040), 0x2, &(0x7f0000000480)) r11 = memfd_create(0x0, 0x0) r12 = syz_open_dev$sndseq(0x0, 0x0, 0x9a0efa2b65aacb27) r13 = dup2(r12, r11) r14 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x4, 0x2, 0x0, 0xffff}, &(0x7f00000005c0), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, r14, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r10, r13, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002380)='\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000007c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x17, &(0x7f0000000780)='cgroup.subtree_control\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r6, r7, 0x0, 0x1, &(0x7f0000000080)='\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, r4, 0x0, 0x4, &(0x7f0000000180)='em1\x00', r15}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r15}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0xc, &(0x7f0000000080)='/dev/autofs\x00', r15}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000740)={r15}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r16, r3, 0x0, 0x5, &(0x7f0000000000)='ppp1\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r2, r1, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000100)='\x00', r15}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={r15}, 0xc) r17 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0)={r15}, 0xc) r18 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x16, 0x29, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0xfffffffc}, 0x8, 0x10, &(0x7f0000000340)={0x2, 0x0, 0xfffffffe}, 0x10, 0xffffffffffffffff, r17}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r18, 0xffffffffa0008000, 0xffffffffffffff3e, 0x0, &(0x7f0000000040)="a34747e865af5cf11e34bdff7a7a5ba0051aae5804d5a05d9b9ff68e12bb4d43a20375ea905795449b957e956aa6", 0x0, 0x401, 0x0, 0x0, 0xfffffffffffffff3}, 0x28) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f0000000240)={0x1ff, 0xc, 0x4, 0x0, 0x27e5, {}, {0x4, 0x8, 0x4, 0x8, 0x7, 0x6, "96669900"}, 0x7, 0x0, @fd=r0, 0x9, 0x0, r18}) r19 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r19, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) r20 = fcntl$dupfd(r19, 0x406, r0) ioctl$PERF_EVENT_IOC_ENABLE(r20, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@struct={0x0, 0x0, 0x0, 0x4, 0x0, 0x9}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x1, 0x3f}}]}}, &(0x7f0000000080)=""/236, 0x3e, 0xec, 0x8}, 0x20) ioctl$EVIOCGLED(r20, 0x80404519, &(0x7f0000000580)=""/250) r21 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r21, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r21, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) dup(0xffffffffffffffff) r22 = dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_CONGESTION(r22, 0x6, 0xd, &(0x7f0000000180)='lp\x00', 0x3) ioctl$VIDIOC_TRY_FMT(r22, 0xc0d05640, &(0x7f0000000400)={0xa, @raw_data="d456e651514154be56c23a0150374fec800b3363d0f8209aea95ae10a4bfe2bc4a059b555ffe32ee49657c21fdaeec9ff08b45f3c5b652502dd578edc616a43da8fa7411c10cf0be3062500d3923e6f93300ce6e6ca32a13179605ca95c9250023e974040392fcffaac49faad6d6549cb1f2e1c7492ba9a8e2d26787e1872027fbe8577edbc559354f305d4e05c26a2f708bb008ca01368edece7ac1108379664aea7622db8fe0f786d6a4177494b3766d3f6f8e4c69729d1cdef558344c8bab4dfc9bfc6bc56bfa"}) ioctl$BLKTRACESTART(r22, 0x1274, 0x0) 08:18:05 executing program 0: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000540)=ANY=[@ANYBLOB="02000000010000000000000002000000", @ANYRES32=0x0, @ANYBLOB="040000000000000010000200000000002000000000000000d8fb7b735f9888c78af9972f335520150aedcca89b31393b29f7a0facde8affb3128d813565e383f59d78a96ca99f3548aedb987c11402"], 0x2c, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x2, 0x0) ioctl$sock_netrom_SIOCADDRT(r2, 0x890b, &(0x7f0000000200)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={'rose', 0x0}, 0x0, 'syz1\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x7, 0x6df, [@null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @bcast, @default, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r3, 0x0) chdir(&(0x7f0000000100)='./file0\x00') statx(0xffffffffffffffff, &(0x7f0000000180)='./file0/file0\x00', 0x400, 0x4, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = getgid() setresgid(0x0, r6, 0x0) getgroups(0x3, &(0x7f0000000380)=[r6, 0x0, r4]) fsetxattr$system_posix_acl(r1, &(0x7f0000000000)='system.posix_acl_default\x00', &(0x7f00000003c0)={{}, {0x1, 0x6}, [{0x2, 0x2, 0xffffffffffffffff}, {0x2, 0x1, r5}], {0x4, 0x2}, [{0x8, 0x5, r7}], {0x10, 0x4}, {0x20, 0x3}}, 0x3c, 0x8af6c1c7c2896aa5) r8 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r8, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r8, &(0x7f00000002c0)={0x14, 0x88, 0xfa00, {r9, 0x30, 0x0, @ib={0x1b, 0x0, 0x0, {}, 0x1110002, 0xffffffffffffffff}}}, 0x90) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f0000000400)={0x6, 0x118, 0xfa00, {{0x2, 0x8000, "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", 0x0, 0x3, 0x25, 0x3, 0x2, 0x9, 0x5, 0x1}, r9}}, 0x120) symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') 08:18:05 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x305, &(0x7f0000000000)=ANY=[]}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x100000000000001c, 0x400000000100) 08:18:05 executing program 5: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x305, &(0x7f0000000000)=ANY=[]}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x100000000000002f, 0x400000000100) 08:18:05 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) r0 = socket(0x1, 0x2, 0x0) getsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000140), &(0x7f0000000100)=0x1002e) fcntl$getownex(r0, 0x10, &(0x7f0000000240)) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f00000000c0)) ptrace(0x10, r1) ptrace$getregset(0x4204, r1, 0x201, &(0x7f00000001c0)={0x0}) r2 = syz_open_procfs(r1, &(0x7f0000000380)='net/mcfilter6\x00') fchdir(r2) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x9) unshare(0x28020400) socket$inet6_sctp(0xa, 0x5, 0x84) epoll_create1(0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r3 = clone3(&(0x7f0000000280)={0x80040000, 0x0, &(0x7f00000000c0), 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) process_vm_writev(r3, &(0x7f0000000780)=[{&(0x7f00000004c0)=""/175, 0xaf}, {0x0}, {0x0}, {0x0}], 0x4, &(0x7f0000000580)=[{&(0x7f0000000ac0)=""/252, 0xfc}, {0x0}, {0x0}], 0x3, 0x0) [ 596.872561][T16893] BPF:[2] ARRAY (anon) 08:18:05 executing program 5: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x305, &(0x7f0000000000)=ANY=[]}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1000000000000030, 0x400000000100) [ 596.904750][T16893] BPF:type_id=5 index_type_id=1 nr_elems=63 [ 596.926191][T16893] BPF: [ 596.929378][T16893] BPF:Invalid index 08:18:05 executing program 4: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r3) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file2\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [{0x2, 0x0, r3}], {}, [], {0x10, 0x2}}, 0x2c, 0x0) r4 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) r6 = socket$tipc(0x1e, 0x5, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) ioctl$EXT4_IOC_MOVE_EXT(r6, 0xc028660f, &(0x7f0000000340)={0x0, r7, 0x7, 0x20, 0x3, 0x2d}) chown(&(0x7f00000001c0)='./file0\x00', r5, 0x0) r8 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r8, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r9 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000680)='/dev/vcsu\x00', 0x400, 0x0) getsockname$packet(r7, &(0x7f0000000740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000780)=0x14) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r8, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000002c0)={&(0x7f0000000840)=ANY=[@ANYBLOB="1c0f9191a70cf9e87dfc9e8639f2aac1b9526b4228a023cc7836285e97fd9ec0b7ea0e18", @ANYRES16=0x0, @ANYBLOB="08082abd7000fbdbbe326107f0264c6a9f108621ff01ef0d60f8625e964d6153e34c34d10755a91f2a52b521f7ad67773ea9f75181726cbea3be2c0bf305f5a8a510931524b738f45db0ae03a9928e90b43955c2272fafcce258711a84fcb24c004044e91efcd3787dcdf86d1c1aed94496b195cfdebf4b9688d92f0ecb22ee875ac7da1324fb17530e6e8967a88a733c21a17bbf431d4b7f922f88cea8e9c3a218c4d9f78b64b4626c1a3934483d25793eb4c8d28bf16ece4c115bca15702a0e6d7c62b55a07d3cc7e62b5a8539ebbf4a77a04752972d6eba6b657daaa0ce7f06ac91c7753ead2be680e6dfef4f77561273e3be26c546"], 0x1c}, 0x1, 0x0, 0x0, 0x20004090}, 0x8080) chdir(&(0x7f0000000100)='./file0\x00') symlink(&(0x7f0000000800)='./file1\x00', &(0x7f0000000000)='./file0/file0\x00') r10 = dup(0xffffffffffffffff) r11 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r11, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r11, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r12 = socket$nl_generic(0x10, 0x3, 0x10) r13 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r12, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000980)=ANY=[@ANYBLOB="4400b14b28a6000000002c7e65c00000", @ANYRES16=r13, @ANYBLOB="230900000000000000000100000005000700000000000800090000000000060002000000000008000a000000000008001700", @ANYRES32, @ANYBLOB="0800110000000000"], 0x44}}, 0x0) sendmsg$L2TP_CMD_SESSION_GET(r11, &(0x7f0000000700)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000006c0)={&(0x7f0000000640)={0x34, r13, 0x2, 0x70bd2b, 0x25dfdbfe, {}, [@L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x5}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x17c7}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x4}]}, 0x34}, 0x1, 0x0, 0x0, 0x904}, 0x2400c0d0) setsockopt$inet_tcp_TCP_CONGESTION(r10, 0x6, 0xd, &(0x7f0000000180)='lp\x00', 0x3) ioctl$VIDIOC_TRY_FMT(r10, 0xc0d05640, &(0x7f0000000400)={0xa, @raw_data="d456e651514154be56c23a0150374fec800b3363d0f8209aea95ae10a4bfe2bc4a059b555ffe32ee49657c21fdaeec9ff08b45f3c5b652502dd578edc616a43da8fa7411c10cf0be3062500d3923e6f93300ce6e6ca32a13179605ca95c9250023e974040392fcffaac49faad6d6549cb1f2e1c7492ba9a8e2d26787e1872027fbe8577edbc559354f305d4e05c26a2f708bb008ca01368edece7ac1108379664aea7622db8fe0f786d6a4177494b3766d3f6f8e4c69729d1cdef558344c8bab4dfc9bfc6bc56bfa"}) name_to_handle_at(r10, &(0x7f0000000040)='./file1\x00', &(0x7f0000000500)=ANY=[@ANYBLOB="cc000000030000005b30584b026b137c0698c5ceb879890f024a1e63e3b5d2cc010e39b72bf15b0140c44f1302969b282dd764527ec8d7fda37cc729739ef9407b6568bffb04e3694e7fc668ed9ac04e9b2786433577108fb57f5e200c6f52f781cf74ba8e09bd25438b5b58a3badfcca9fbc7da60de1bdadae6fc7474edd96cf2d635f71965a1bff158301435a95f0e8579365cd7a40ad8240ba5d56c19af4b166ded378a703767099633b4bfb0c9bd6148ad23c586631a722acabe00200a3dba383937f977880ace950ee0"], &(0x7f0000000080), 0x1000) [ 596.965114][T16893] BPF: [ 596.965114][T16893] 08:18:05 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x305, &(0x7f0000000000)=ANY=[]}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x100000000000001d, 0x400000000100) 08:18:05 executing program 5: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x305, &(0x7f0000000000)=ANY=[]}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1000000000000031, 0x400000000100) 08:18:05 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) r0 = socket(0x1, 0x2, 0x0) getsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000140), &(0x7f0000000100)=0x1002e) fcntl$getownex(r0, 0x10, &(0x7f0000000240)) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f00000000c0)) ptrace(0x10, r1) ptrace$getregset(0x4204, r1, 0x201, &(0x7f00000001c0)={0x0}) r2 = syz_open_procfs(r1, &(0x7f0000000380)='net/mcfilter6\x00') fchdir(r2) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x9) unshare(0x28020400) socket$inet6_sctp(0xa, 0x5, 0x84) epoll_create1(0x0) r3 = clone3(&(0x7f0000000280)={0x80040000, 0x0, &(0x7f00000000c0), 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) process_vm_writev(r3, &(0x7f0000000780)=[{&(0x7f00000004c0)=""/175, 0xaf}, {0x0}, {0x0}, {0x0}], 0x4, &(0x7f0000000580)=[{&(0x7f0000000ac0)=""/252, 0xfc}, {0x0}, {0x0}], 0x3, 0x0) 08:18:05 executing program 0: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000000)=ANY=[@ANYBLOB="021300000108000000006145552908790000020000000911d97f4a7a4561b8d44df1c178c348bd2a5657e6c51ca450c1be670e169c2fde1c24ef462ae433b3681a8a5011ca75", @ANYRES32=0x0, @ANYBLOB="040000000000000010000200000000002000000000000000"], 0x2c, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r3, 0x0) chdir(&(0x7f0000000100)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') 08:18:05 executing program 4: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [{}], {}, [], {0x10, 0x2}}, 0x2c, 0x0) ioctl$KVM_SET_SIGNAL_MASK(0xffffffffffffffff, 0x4004ae8b, &(0x7f0000000200)={0xe3, "e6565746663dcf6384a21961efae2c522f6bef88ade54e9d40f796aafb8f7adec11c6e8c728706067f6b426d62d9a410e9d882eb04a46dc991e1b51f9d41914aca3540d6b3b55660a7cf8b94e05cda6f72c1fb20695885e2300309240e82c6ba25b9686a9baf1a9bc349b5cd86425125aad2f09acb76c64a9b55ff1ac4848fb72f41d1821d170c48bdb65f4156716008f29ad7ac9de39c657699e0821656be5702c58c643a8a7860a4621e9cb9a4010812601442f6f71ec19e0b36e0c8f107f72d500f4a735e3325fb735f7a67d98d335c67dc95040a4b45eb818e83de21e8a9b9351d"}) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r3, 0x0) chdir(&(0x7f0000000100)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') 08:18:06 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000180)='lp\x00', 0x3) ioctl$VIDIOC_TRY_FMT(r2, 0xc0d05640, &(0x7f0000000400)={0xa, @raw_data="d456e651514154be56c23a0150374fec800b3363d0f8209aea95ae10a4bfe2bc4a059b555ffe32ee49657c21fdaeec9ff08b45f3c5b652502dd578edc616a43da8fa7411c10cf0be3062500d3923e6f93300ce6e6ca32a13179605ca95c9250023e974040392fcffaac49faad6d6549cb1f2e1c7492ba9a8e2d26787e1872027fbe8577edbc559354f305d4e05c26a2f708bb008ca01368edece7ac1108379664aea7622db8fe0f786d6a4177494b3766d3f6f8e4c69729d1cdef558344c8bab4dfc9bfc6bc56bfa"}) statx(0xffffffffffffffff, &(0x7f0000000900)='./file0\x00', 0x800, 0x0, &(0x7f0000000940)) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x16, 0x27, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffff1971a4f0ff00000000b7060000000000811e6403000000000045040400010000001704000001000a00b7040000000100006a0af2fe00000000850000001a000000b70000000000000095000000000000009e17890efaee5eab7ff8a8cdc21ce784909b849d5550ad855dab54d8877a6db61d69f2ffcaa10350e11cb97c8adf1bc9a0c4ee6d9674c77404ceb9971e43405d621ffbc9a4fd39b0b56bfe6508ebb3c44eb84049761451ce540c772e2d9f8004e26f7fcc059c062234d5595f6fba87b81d1106fb0289ce67a66afd9ac3d09e29a9d542ca9d85a5c9c88474895d679838def0a83a733dc6a39b63a5ed69d32394c53361d7480884bd8048a967d9b912ef9f1d6fee41f5b29d37acb91c61ccd1df673896450f859ce8122a79c3e4"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000340)={0x0, 0x1}, 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r3, 0xffffffffa0008000, 0xffffffffffffff3e, 0x0, &(0x7f0000000040)="a34747e865af5cf11e34bdff7a7a5ba0051aae5804d5a05d9b9ff68e12bb4d43a20375ea905795449b957e956aa6", 0x0, 0x401, 0x0, 0x0, 0xfffffffffffffff3}, 0x28) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f0000000240)={0x1ff, 0xc, 0x4, 0x0, 0x27e5, {}, {0x4, 0x8, 0x4, 0x8, 0x7, 0x6, "96669900"}, 0x7, 0x0, @fd=r0, 0x9, 0x0, r3}) r4 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f00000002c0)=ANY=[@ANYBLOB="9feb0100180000000000000024baddd16b0c3200000024000000020000000000f969ad0600040900000000000000000000030000000005000000010000003f0000000000e3d3ebca413124d26366141c40e8b0a753950a94b98379bcddf50800"], &(0x7f0000000080)=""/236, 0x3e, 0xec, 0x8}, 0x20) ioctl$EVIOCGLED(r4, 0x80404519, &(0x7f0000000580)=""/250) r5 = socket(0x4, 0xa, 0xfe) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) dup(0xffffffffffffffff) r6 = dup(0xffffffffffffffff) r7 = syz_open_dev$sg(&(0x7f0000000500)='/dev/sg#\x00', 0x2c1a, 0x204080) ioctl$FS_IOC_ENABLE_VERITY(r7, 0x40806685, &(0x7f0000000780)={0x1, 0x0, 0x1000, 0xcf, &(0x7f0000000680)="5cbea9143fe9442b2505672ee20c82dd22bdb063f524d3f8f1cbbbf564005282a7a72cd393162260fd151586fbc9176cab99689992d538c39bb38e76d7936e388ca6627f980033caf546f5b1e098b529e02cee7f41892db747b47ca99b29a8288581d505493875e6bbf59d72d9238579ae5173ab8a3569db69bdd1f21a1f3ca7a15b7b8464b088be60623e82adbb6b5cf3358508351c722afc42b29a2836d57dca3ef3aca4ad19aea3f3c5a7faba3afaf075f2c6f7c1504aaa307f24f2ad8f807f4d334d64fa2658f0e14b7009a256", 0x0, 0x0, &(0x7f0000000540)}) setsockopt$inet_tcp_TCP_CONGESTION(r6, 0x6, 0xd, &(0x7f0000000180)='lp\x00', 0x3) ioctl$VIDIOC_TRY_FMT(r6, 0xc0d05640, &(0x7f0000000400)={0xa, @raw_data="d456e651514154be56c23a0150374fec800b3363d0f8209aea95ae10a4bfe2bc4a059b555ffe32ee49657c21fdaeec9ff08b45f3c5b652502dd578edc616a43da8fa7411c10cf0be3062500d3923e6f93300ce6e6ca32a13179605ca95c9250023e974040392fcffaac49faad6d6549cb1f2e1c7492ba9a8e2d26787e1872027fbe8577edbc559354f305d4e05c26a2f708bb008ca01368edece7ac1108379664aea7622db8fe0f786d6a4177494b3766d3f6f8e4c69729d1cdef558344c8bab4dfc9bfc6bc56bfa"}) ioctl$BLKTRACESTART(r6, 0x1274, 0x0) 08:18:06 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x305, &(0x7f0000000000)=ANY=[]}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x100000000000001e, 0x400000000100) 08:18:06 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) r0 = socket(0x1, 0x2, 0x0) getsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000140), &(0x7f0000000100)=0x1002e) fcntl$getownex(r0, 0x10, &(0x7f0000000240)) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f00000000c0)) ptrace(0x10, r1) ptrace$getregset(0x4204, r1, 0x201, &(0x7f00000001c0)={0x0}) r2 = syz_open_procfs(r1, &(0x7f0000000380)='net/mcfilter6\x00') fchdir(r2) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x9) unshare(0x28020400) socket$inet6_sctp(0xa, 0x5, 0x84) r3 = clone3(&(0x7f0000000280)={0x80040000, 0x0, &(0x7f00000000c0), 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) process_vm_writev(r3, &(0x7f0000000780)=[{&(0x7f00000004c0)=""/175, 0xaf}, {0x0}, {0x0}, {0x0}], 0x4, &(0x7f0000000580)=[{&(0x7f0000000ac0)=""/252, 0xfc}, {0x0}, {0x0}], 0x3, 0x0) 08:18:06 executing program 5: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x305, &(0x7f0000000000)=ANY=[]}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1000000000000032, 0x400000000100) 08:18:06 executing program 0: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [{}], {}, [], {0x10, 0x2}}, 0x2c, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$SNDRV_PCM_IOCTL_HW_PARAMS(0xffffffffffffffff, 0xc2604111, &(0x7f0000000400)={0x3f, [[0x81, 0x101, 0x10001, 0x4, 0xffffa69b, 0xadb, 0x7, 0xfffffff8], [0xffff, 0xfffffffc, 0xfc0, 0x5, 0x80000001, 0x5, 0xf2, 0x1ff], [0x6, 0xef, 0x17c12390, 0xb4, 0x7, 0x3, 0x1, 0x6]], [], [{0xb2, 0x7, 0x0, 0x1}, {0x8000, 0xc3a, 0x1, 0x1, 0x1, 0x1}, {0x7ff, 0x5}, {0x6, 0x400, 0x0, 0x0, 0x0, 0x1}, {0x20000000, 0x2, 0x1, 0x0, 0x0, 0x1}, {0xff, 0xeef2, 0x1, 0x0, 0x0, 0x1}, {0x3c7f, 0x3, 0x0, 0x0, 0x1, 0x1}, {0x1, 0x8, 0x1, 0x0, 0x1}, {0x0, 0x800, 0x0, 0x0, 0x1}, {0xeb, 0x2, 0x0, 0x0, 0x0, 0x1}, {0xffff43b4, 0x3, 0x1, 0x0, 0x1}, {0x80000000, 0x1, 0x0, 0x1, 0x1, 0x1}], [], 0x6}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) ioctl$sock_bt_hci(r4, 0x800448d4, &(0x7f0000000000)="b94b8191ee1cee4747a38033fcfe5e7be95e46451992452e802a4196025689878782568023b5cc52a2e4fb514104d18b049d36bb98c019c86f640379ca06") chdir(&(0x7f0000000100)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') r5 = syz_init_net_socket$rose(0xb, 0x5, 0x0) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x100000d, 0x11, r5, 0xa4a06000) 08:18:06 executing program 4: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [{}], {}, [], {0x10, 0x2}}, 0x2c, 0x0) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r2, 0x0) chdir(&(0x7f0000000100)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') 08:18:06 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x305, &(0x7f0000000000)=ANY=[]}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1000000000000021, 0x400000000100) 08:18:06 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) r0 = socket(0x1, 0x2, 0x0) getsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000140), &(0x7f0000000100)=0x1002e) fcntl$getownex(r0, 0x10, &(0x7f0000000240)) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f00000000c0)) ptrace(0x10, r1) ptrace$getregset(0x4204, r1, 0x201, &(0x7f00000001c0)={0x0}) r2 = syz_open_procfs(r1, &(0x7f0000000380)='net/mcfilter6\x00') fchdir(r2) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x9) unshare(0x28020400) r3 = clone3(&(0x7f0000000280)={0x80040000, 0x0, &(0x7f00000000c0), 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) process_vm_writev(r3, &(0x7f0000000780)=[{&(0x7f00000004c0)=""/175, 0xaf}, {0x0}, {0x0}, {0x0}], 0x4, &(0x7f0000000580)=[{&(0x7f0000000ac0)=""/252, 0xfc}, {0x0}, {0x0}], 0x3, 0x0) 08:18:06 executing program 5: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x305, &(0x7f0000000000)=ANY=[]}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1000000000000033, 0x400000000100) 08:18:06 executing program 0: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [{}], {}, [], {0x10, 0x2}}, 0x2c, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r3, 0x0) chdir(&(0x7f0000000280)='./file0/file0\x00') ioctl$TIOCGPKT(0xffffffffffffffff, 0x80045438, &(0x7f0000000000)) symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') 08:18:06 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x16, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000340)}, 0x42) getsockname(r0, &(0x7f0000000500)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}}}, &(0x7f0000000300)=0x80) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f00000006c0)=@raw={'raw\x00', 0x9, 0x3, 0x2b0, 0x0, 0x0, 0xf0, 0x0, 0xf0, 0x1e0, 0x1e0, 0x1e0, 0x1e0, 0x1e0, 0x3, &(0x7f0000000680), {[{{@uncond, 0x0, 0xd0, 0xf0, 0x0, {}, [@common=@mh={{0x28, 'mh\x00'}, {"47e6", 0x1}}]}, @unspec=@TRACE={0x20, 'TRACE\x00'}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0xdcd7, 0xb665, 0x20, 'snmp_trap\x00', {0xffffffff}}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x310) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0xffffffffa0008000, 0xffffffffffffff3e, 0x0, &(0x7f0000000040)="a34747e865af5cf11e34bdff7a7a5ba0051aae5804d5a05d9b9ff68e12bb4d43a20375ea905795449b957e956aa6", 0x0, 0x401, 0x0, 0x0, 0xfffffffffffffff3}, 0x28) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f0000000240)={0x1ff, 0x1, 0x4, 0x0, 0x27e5, {}, {0x4, 0x8, 0x4, 0x8, 0x7, 0x6, "96669900"}, 0x7, 0x0, @offset=0xffffffff, 0x9, 0x0, r2}) r4 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@struct={0x0, 0x0, 0x0, 0x4, 0x0, 0x9}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x1, 0x3f}}]}}, &(0x7f0000000080)=""/236, 0x3e, 0xec, 0x8}, 0x20) syz_open_dev$vcsu(&(0x7f0000000a00)='/dev/vcsu#\x00', 0x20, 0x230641) ioctl$EVIOCGLED(r4, 0x80404519, &(0x7f0000000580)=""/250) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) dup(0xffffffffffffffff) r6 = dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_CONGESTION(r6, 0x6, 0xd, &(0x7f0000000180)='lp\x00', 0x3) ioctl$VIDIOC_TRY_FMT(r6, 0xc0d05640, &(0x7f0000000400)={0xa, @raw_data="d456e651514154be56c23a0150374fec800b3363d0f8209aea95ae10a4bfe2bc4a059b555ffe32ee49657c21fdaeec9ff08b45f3c5b652502dd578edc616a43da8fa7411c10cf0be3062500d3923e6f93300ce6e6ca32a13179605ca95c9250023e974040392fcffaac49faad6d6549cb1f2e1c7492ba9a8e2d26787e1872027fbe8577edbc559354f305d4e05c26a2f708bb008ca01368edece7ac1108379664aea7622db8fe0f786d6a4177494b3766d3f6f8e4c69729d1cdef558344c8bab4dfc9bfc6bc56bfa"}) ioctl$BLKTRACESTART(r6, 0x1274, 0x0) r7 = dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_CONGESTION(r7, 0x6, 0xd, &(0x7f0000000180)='lp\x00', 0x3) ioctl$VIDIOC_TRY_FMT(r7, 0xc0d05640, &(0x7f0000000400)={0xa, @raw_data="d456e651514154be56c23a0150374fec800b3363d0f8209aea95ae10a4bfe2bc4a059b555ffe32ee49657c21fdaeec9ff08b45f3c5b652502dd578edc616a43da8fa7411c10cf0be3062500d3923e6f93300ce6e6ca32a13179605ca95c9250023e974040392fcffaac49faad6d6549cb1f2e1c7492ba9a8e2d26787e1872027fbe8577edbc559354f305d4e05c26a2f708bb008ca01368edece7ac1108379664aea7622db8fe0f786d6a4177494b3766d3f6f8e4c69729d1cdef558344c8bab4dfc9bfc6bc56bfa"}) ioctl$USBDEVFS_DROP_PRIVILEGES(r7, 0x4004551e, &(0x7f00000002c0)=0x1000) 08:18:06 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x305, &(0x7f0000000000)=ANY=[]}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1000000000000022, 0x400000000100) 08:18:06 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) r0 = socket(0x1, 0x2, 0x0) getsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000140), &(0x7f0000000100)=0x1002e) fcntl$getownex(r0, 0x10, &(0x7f0000000240)) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f00000000c0)) ptrace(0x10, r1) ptrace$getregset(0x4204, r1, 0x201, &(0x7f00000001c0)={0x0}) r2 = syz_open_procfs(r1, &(0x7f0000000380)='net/mcfilter6\x00') fchdir(r2) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x9) unshare(0x28020400) r3 = clone3(&(0x7f0000000280)={0x80040000, 0x0, &(0x7f00000000c0), 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) process_vm_writev(r3, &(0x7f0000000780)=[{&(0x7f00000004c0)=""/175, 0xaf}, {0x0}, {0x0}, {0x0}], 0x4, &(0x7f0000000580)=[{&(0x7f0000000ac0)=""/252, 0xfc}, {0x0}, {0x0}], 0x3, 0x0) 08:18:06 executing program 5: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x305, &(0x7f0000000000)=ANY=[]}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1000000000000034, 0x400000000100) 08:18:06 executing program 0: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000000)=ANY=[@ANYBLOB="020000000100006f8f000000000002000000", @ANYRES32=0x0, @ANYBLOB="040000000000000010000200000000002000000000000000"], 0x2c, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r3, 0x0) chdir(&(0x7f0000000100)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') [ 598.246128][T17083] BPF:[2] ARRAY (anon) [ 598.250351][T17083] BPF:type_id=5 index_type_id=1 nr_elems=63 [ 598.274523][T17083] BPF: [ 598.277418][T17083] BPF:Invalid index [ 598.294946][T17083] BPF: [ 598.294946][T17083] 08:18:06 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) r0 = socket(0x1, 0x2, 0x0) getsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000140), &(0x7f0000000100)=0x1002e) fcntl$getownex(r0, 0x10, &(0x7f0000000240)) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f00000000c0)) ptrace(0x10, r1) ptrace$getregset(0x4204, r1, 0x201, &(0x7f00000001c0)={0x0}) r2 = syz_open_procfs(r1, &(0x7f0000000380)='net/mcfilter6\x00') fchdir(r2) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x9) r3 = clone3(&(0x7f0000000280)={0x80040000, 0x0, &(0x7f00000000c0), 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) process_vm_writev(r3, &(0x7f0000000780)=[{&(0x7f00000004c0)=""/175, 0xaf}, {0x0}, {0x0}, {0x0}], 0x4, &(0x7f0000000580)=[{&(0x7f0000000ac0)=""/252, 0xfc}, {0x0}, {0x0}], 0x3, 0x0) 08:18:06 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x16, 0xe, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000340)}, 0x42) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0xffffffffa0008000, 0xffffffffffffff3e, 0x0, &(0x7f0000000040)="a34747e865af5cf11e34bdff7a7a5ba0051aae5804d5a05d9b9ff68e12bb4d43a20375ea905795449b957e956aa6", 0x0, 0x401, 0x0, 0x0, 0xfffffffffffffff3}, 0x28) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f0000000240)={0x1ff, 0xc, 0x4, 0x2000, 0x27e5, {}, {0x4, 0x8, 0x4, 0x8, 0x7, 0x6, "96669900"}, 0x7, 0x3, @fd=r0, 0x9, 0x0, r2}) r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@struct={0x0, 0x0, 0x0, 0x4, 0x0, 0x9}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x1, 0x3f}}]}}, &(0x7f0000000080)=""/236, 0x3e, 0xec, 0x8}, 0x20) ioctl$EVIOCGLED(r3, 0x80404519, &(0x7f0000000580)=""/250) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) dup(0xffffffffffffffff) r5 = dup(0xffffffffffffffff) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) fcntl$getownex(r6, 0x10, &(0x7f00000002c0)={0x0, 0x0}) sched_getparam(r7, &(0x7f0000000300)) setsockopt$inet_tcp_TCP_CONGESTION(r5, 0x6, 0xd, &(0x7f0000000180)='lp\x00', 0x3) ioctl$VIDIOC_TRY_FMT(r5, 0xc0d05640, &(0x7f0000000400)={0xa, @raw_data="d456e651514154be56c23a0150374fec800b3363d0f8209aea95ae10a4bfe2bc4a059b555ffe32ee49657c21fdaeec9ff08b45f3c5b652502dd578edc616a43da8fa7411c10cf0be3062500d3923e6f93300ce6e6ca32a13179605ca95c9250023e974040392fcffaac49faad6d6549cb1f2e1c7492ba9a8e2d26787e1872027fbe8577edbc559354f305d4e05c26a2f708bb008ca01368edece7ac1108379664aea7622db8fe0f786d6a4177494b3766d3f6f8e4c69729d1cdef558344c8bab4dfc9bfc6bc56bfa"}) ioctl$BLKTRACESTART(r5, 0x1274, 0x0) 08:18:07 executing program 5: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x305, &(0x7f0000000000)=ANY=[]}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1000000000000035, 0x400000000100) 08:18:07 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x305, &(0x7f0000000000)=ANY=[]}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1000000000000023, 0x400000000100) [ 598.569782][T17104] BPF:[2] ARRAY (anon) [ 598.574004][T17104] BPF:type_id=5 index_type_id=1 nr_elems=63 [ 598.612121][T17104] BPF: 08:18:07 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x305, &(0x7f0000000000)=ANY=[]}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1000000000000024, 0x400000000100) 08:18:07 executing program 0: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [{}], {}, [], {0x10, 0x2}}, 0x2c, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r3, 0x0) chdir(&(0x7f0000000100)='./file0\x00') r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = openat$cgroup_ro(r5, &(0x7f00000003c0)='cpu.stat\x00', 0x0, 0x0) r7 = syz_genetlink_get_family_id$nl80211(&(0x7f00000005c0)='nl80211\x00') sendmsg$NL80211_CMD_SET_KEY(r6, &(0x7f00000006c0)={0xffffffffffffffff, 0x0, &(0x7f0000000680)={&(0x7f0000000600)={0x70, r7, 0x100, 0x70bd2c, 0x25dfdbff, {}, [@NL80211_ATTR_KEY_DEFAULT={0x4}, @NL80211_ATTR_KEY_DEFAULT={0x4}, @NL80211_ATTR_KEY_IDX={0x5, 0x8, 0x2}, @NL80211_ATTR_KEY_DATA_WEP104={0x11, 0x7, "65780a531c0ea2fc64ccf83c9f"}, @NL80211_ATTR_MAC={0xa, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}}, @NL80211_ATTR_KEY={0x2c, 0x50, [@NL80211_KEY_SEQ={0xd, 0x4, "89bf60ddcd7e8a869f"}, @NL80211_KEY_DEFAULT_TYPES={0x8, 0x8, [@NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}]}, @NL80211_KEY_SEQ={0x5, 0x4, '7'}, @NL80211_KEY_TYPE={0x8, 0x7, 0x38c566a4951efc28}]}]}, 0x70}, 0x1, 0x0, 0x0, 0x800}, 0x1) ioctl$FS_IOC_SETVERSION(r5, 0x40087602, &(0x7f0000000040)=0x6) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000b00)={'veth1_macvtap\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000b40)={'team0\x00', 0x0}) sendmsg$NL80211_CMD_DEL_MPATH(r1, &(0x7f0000000c40)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000c00)={&(0x7f0000000b80)={0x78, r7, 0x100, 0x70bd2c, 0x25dfdbfd, {}, [@NL80211_ATTR_MAC={0xa, 0x6, @random="8f8ce9cb12b3"}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x2, 0x4}}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa, 0x1a, @local}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r8}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r9}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa, 0x1a, @remote}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa, 0x1a, @broadcast}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa}]}, 0x78}, 0x1, 0x0, 0x0, 0x24004000}, 0x4044900) symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') [ 598.634966][T17104] BPF:Invalid index [ 598.646334][T17104] BPF: [ 598.646334][T17104] 08:18:07 executing program 5: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x305, &(0x7f0000000000)=ANY=[]}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1000000000000036, 0x400000000100) 08:18:07 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) r0 = socket(0x1, 0x2, 0x0) getsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000140), &(0x7f0000000100)=0x1002e) fcntl$getownex(r0, 0x10, &(0x7f0000000240)) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f00000000c0)) ptrace(0x10, r1) ptrace$getregset(0x4204, r1, 0x201, &(0x7f00000001c0)={0x0}) r2 = syz_open_procfs(r1, &(0x7f0000000380)='net/mcfilter6\x00') fchdir(r2) r3 = clone3(&(0x7f0000000280)={0x80040000, 0x0, &(0x7f00000000c0), 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) process_vm_writev(r3, &(0x7f0000000780)=[{&(0x7f00000004c0)=""/175, 0xaf}, {0x0}, {0x0}, {0x0}], 0x4, &(0x7f0000000580)=[{&(0x7f0000000ac0)=""/252, 0xfc}, {0x0}, {0x0}], 0x3, 0x0) 08:18:07 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = open(&(0x7f00000002c0)='./file0\x00', 0x18201, 0x140) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)={0x14, r3, 0x303ec4fb0f74139}, 0x14}}, 0x0) sendmsg$IPVS_CMD_NEW_SERVICE(r2, &(0x7f0000000540)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000500)={&(0x7f0000000680)={0xa8, r3, 0x20, 0x70bd26, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_DEST={0x2c, 0x2, [@IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x401}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x6, 0xb, 0xa}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x815}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x3ff}, @IPVS_DEST_ATTR_PORT={0x6, 0x2, 0x4e24}]}, @IPVS_CMD_ATTR_DEST={0x30, 0x2, [@IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@remote}, @IPVS_DEST_ATTR_PORT={0x6, 0x2, 0x4e22}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x6, 0xb, 0x2}, @IPVS_DEST_ATTR_PORT={0x6, 0x2, 0x4e22}]}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_PORT={0x6, 0x2, 0x4e20}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x7}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x1}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xffffffff}, @IPVS_CMD_ATTR_SERVICE={0x14, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x2}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x2}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x8004015}, 0x24006811) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x16, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000340)}, 0x42) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r4, 0xffffffffa0008000, 0xffffffffffffff3e, 0x0, &(0x7f0000000040)="a34747e865af5cf11e34bdff7a7a5ba0051aae5804d5a05d9b9ff68e12bb4d43a20375ea905795449b957e956aa6", 0x0, 0x401, 0x0, 0x0, 0xfffffffffffffff3}, 0x28) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f0000000240)={0x1ff, 0xc, 0x4, 0x0, 0x27e5, {}, {0x4, 0x8, 0x4, 0x8, 0x7, 0x6, "96669900"}, 0x7, 0x0, @fd=r0, 0x9, 0x0, r4}) r5 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@struct={0x0, 0x0, 0x0, 0x4, 0x0, 0x9}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x1, 0x3f}}]}}, &(0x7f0000000080)=""/236, 0x3e, 0xec, 0x8}, 0x20) ioctl$EVIOCGLED(r5, 0x80404519, &(0x7f0000000580)=""/250) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) dup(0xffffffffffffffff) r7 = dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_CONGESTION(r7, 0x6, 0xd, &(0x7f0000000180)='lp\x00', 0x3) ioctl$VIDIOC_TRY_FMT(r7, 0xc0d05640, &(0x7f0000000400)={0xa, @raw_data="d456e651514154be56c23a0150374fec800b3363d0f8209aea95ae10a4bfe2bc4a059b555ffe32ee49657c21fdaeec9ff08b45f3c5b652502dd578edc616a43da8fa7411c10cf0be3062500d3923e6f93300ce6e6ca32a13179605ca95c9250023e974040392fcffaac49faad6d6549cb1f2e1c7492ba9a8e2d26787e1872027fbe8577edbc559354f305d4e05c26a2f708bb008ca01368edece7ac1108379664aea7622db8fe0f786d6a4177494b3766d3f6f8e4c69729d1cdef558344c8bab4dfc9bfc6bc56bfa"}) ioctl$BLKTRACESTART(r7, 0x1274, 0x0) 08:18:07 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x305, &(0x7f0000000000)=ANY=[]}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1000000000000025, 0x400000000100) 08:18:07 executing program 0: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [{}], {}, [], {0x10, 0x2}}, 0x2c, 0x0) r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000000)=[@in6={0xa, 0x4e23, 0x3672253d, @ipv4={[], [], @empty}, 0x8}, @in6={0xa, 0x4e22, 0x6, @empty, 0x2}, @in={0x2, 0x4e21, @loopback}, @in={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}], 0x58) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) getsockopt$inet_mreq(r2, 0x0, 0x23, &(0x7f0000000240)={@multicast1, @remote}, &(0x7f0000000280)=0x8) r3 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r5, 0x0) chdir(&(0x7f0000000100)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') [ 599.018347][T17229] BPF:[2] ARRAY (anon) 08:18:07 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) r0 = socket(0x1, 0x2, 0x0) getsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000140), &(0x7f0000000100)=0x1002e) fcntl$getownex(r0, 0x10, &(0x7f0000000240)) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f00000000c0)) ptrace(0x10, r1) ptrace$getregset(0x4204, r1, 0x201, &(0x7f00000001c0)={0x0}) syz_open_procfs(r1, &(0x7f0000000380)='net/mcfilter6\x00') r2 = clone3(&(0x7f0000000280)={0x80040000, 0x0, &(0x7f00000000c0), 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) process_vm_writev(r2, &(0x7f0000000780)=[{&(0x7f00000004c0)=""/175, 0xaf}, {0x0}, {0x0}, {0x0}], 0x4, &(0x7f0000000580)=[{&(0x7f0000000ac0)=""/252, 0xfc}, {0x0}, {0x0}], 0x3, 0x0) 08:18:07 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x305, &(0x7f0000000000)=ANY=[]}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1000000000000026, 0x400000000100) [ 599.041456][T17229] BPF:type_id=5 index_type_id=1 nr_elems=63 [ 599.068735][T17229] BPF: [ 599.103599][T17229] BPF:Invalid index 08:18:07 executing program 5: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x305, &(0x7f0000000000)=ANY=[]}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1000000000000037, 0x400000000100) [ 599.124966][T17229] BPF: [ 599.124966][T17229] 08:18:07 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x305, &(0x7f0000000000)=ANY=[]}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1000000000000027, 0x400000000100) 08:18:07 executing program 0: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r0 = getgid() setresgid(0x0, r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0, 0x0}, &(0x7f0000000280)=0x5) fstat(r1, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r4 = getegid() lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000340)={{}, {}, [{}], {}, [{0x8, 0x3584627b68dbffeb, r0}, {0x8, 0x5, 0xffffffffffffffff}, {0x8, 0x2, r3}, {0x8, 0x0, r2}, {0x8, 0x5, r4}], {0x10, 0x2}}, 0x54, 0x3) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r8, 0x0) chdir(&(0x7f0000000100)='./file0\x00') r9 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$NL80211_CMD_JOIN_MESH(r9, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000200)={&(0x7f00000003c0)={0x84, 0x0, 0x400, 0x70bd2b, 0x25dfdbfd, {}, [@NL80211_ATTR_SOCKET_OWNER={0x4}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x2}, @NL80211_ATTR_SOCKET_OWNER={0x4}, @NL80211_ATTR_DTIM_PERIOD={0x8, 0xd, 0x2}, @NL80211_ATTR_MESH_CONFIG={0x54, 0x23, [@NL80211_MESHCONF_HWMP_ROOT_INTERVAL={0x6, 0x18, 0x4}, @NL80211_MESHCONF_HWMP_PREQ_MIN_INTERVAL={0x6, 0xc, 0xfff}, @NL80211_MESHCONF_SYNC_OFFSET_MAX_NEIGHBOR={0x8, 0x15, 0x48}, @NL80211_MESHCONF_TTL={0x5, 0x6, 0x44}, @NL80211_MESHCONF_HWMP_RANN_INTERVAL={0x6, 0x10, 0x7fff}, @NL80211_MESHCONF_RETRY_TIMEOUT={0x6, 0x1, 0x63}, @NL80211_MESHCONF_SYNC_OFFSET_MAX_NEIGHBOR={0x8, 0x15, 0x62}, @NL80211_MESHCONF_HT_OPMODE={0x6, 0x16, 0x14}, @NL80211_MESHCONF_PLINK_TIMEOUT={0x8, 0x1c, 0xffff7fff}, @NL80211_MESHCONF_HWMP_RANN_INTERVAL={0x6, 0x10, 0x101}]}, @NL80211_ATTR_CONTROL_PORT_OVER_NL80211={0x4}]}, 0x84}, 0x1, 0x0, 0x0, 0x10084}, 0x80) symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') 08:18:07 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x16, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000340)}, 0x42) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0xffffffffa0008000, 0xffffffffffffff3e, 0x0, &(0x7f0000000040)="a34747e865af5cf11e34bdff7a7a5ba0051aae5804d5a05d9b9ff68e12bb4d43a20375ea905795449b957e956aa6", 0x0, 0x401, 0x0, 0x0, 0xfffffffffffffff3}, 0x28) openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ocfs2_control\x00', 0x0, 0x0) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f0000000240)={0x1ff, 0xc, 0x4, 0x0, 0x27e5, {}, {0x4, 0x8, 0x4, 0x8, 0x7, 0x6, "96669900"}, 0x7, 0x0, @fd=r0, 0x9, 0x0, r2}) r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@struct={0x0, 0x0, 0x0, 0x4, 0x0, 0x9}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x1, 0x3f}}]}}, &(0x7f0000000080)=""/236, 0x3e, 0xec, 0x8}, 0x20) ioctl$EVIOCGLED(r3, 0x80404519, &(0x7f0000000580)=""/250) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)={0x0}}, 0x4040001) dup(0xffffffffffffffff) r5 = dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_CONGESTION(r5, 0x6, 0xd, &(0x7f0000000180)='lp\x00', 0x3) ioctl$VIDIOC_TRY_FMT(r5, 0xc0d05640, &(0x7f0000000400)={0xa, @sliced={0x2, [0x8, 0x2, 0x7, 0x1, 0xdc3d, 0x4, 0xbcaf, 0x0, 0x8, 0x7, 0x1ab2, 0x21, 0x2, 0x8e, 0x3a74, 0xf000, 0xfffe, 0x400, 0x3, 0x5, 0x5, 0x9, 0x7, 0x81, 0x6, 0x7, 0x34df, 0x9, 0x9, 0x78f, 0x4, 0x9, 0x6, 0x5, 0x5, 0xffff, 0x7, 0x7, 0x5, 0x0, 0x8001, 0x3, 0x8, 0x5, 0x6, 0x4, 0x8001, 0x4], 0x100}}) ioctl$BLKTRACESTART(r5, 0x1274, 0x0) write$eventfd(r5, &(0x7f00000002c0)=0x7, 0x8) syz_open_dev$usbmon(&(0x7f0000000540)='/dev/usbmon#\x00', 0xc6, 0x402) 08:18:07 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) r0 = socket(0x1, 0x2, 0x0) getsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000140), &(0x7f0000000100)=0x1002e) fcntl$getownex(r0, 0x10, &(0x7f0000000240)) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f00000000c0)) ptrace(0x10, r1) ptrace$getregset(0x4204, r1, 0x201, &(0x7f00000001c0)={0x0}) r2 = clone3(&(0x7f0000000280)={0x80040000, 0x0, &(0x7f00000000c0), 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) process_vm_writev(r2, &(0x7f0000000780)=[{&(0x7f00000004c0)=""/175, 0xaf}, {0x0}, {0x0}, {0x0}], 0x4, &(0x7f0000000580)=[{&(0x7f0000000ac0)=""/252, 0xfc}, {0x0}, {0x0}], 0x3, 0x0) 08:18:08 executing program 5: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x305, &(0x7f0000000000)=ANY=[]}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1000000000000038, 0x400000000100) [ 599.498336][T17356] BPF:[2] ARRAY (anon) [ 599.527966][T17356] BPF:type_id=5 index_type_id=1 nr_elems=63 [ 599.543424][T17356] BPF: [ 599.565201][T17356] BPF:Invalid index 08:18:08 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x305, &(0x7f0000000000)=ANY=[]}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1000000000000028, 0x400000000100) [ 599.594894][T17356] BPF: [ 599.594894][T17356] 08:18:08 executing program 5: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x305, &(0x7f0000000000)=ANY=[]}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1000000000000039, 0x400000000100) 08:18:08 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) r0 = socket(0x1, 0x2, 0x0) getsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000140), &(0x7f0000000100)=0x1002e) fcntl$getownex(r0, 0x10, &(0x7f0000000240)) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f00000000c0)) ptrace(0x10, r1) r2 = clone3(&(0x7f0000000280)={0x80040000, 0x0, &(0x7f00000000c0), 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) process_vm_writev(r2, &(0x7f0000000780)=[{&(0x7f00000004c0)=""/175, 0xaf}, {0x0}, {0x0}, {0x0}], 0x4, &(0x7f0000000580)=[{&(0x7f0000000ac0)=""/252, 0xfc}, {0x0}, {0x0}], 0x3, 0x0) 08:18:08 executing program 0: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) getresuid(&(0x7f0000000000), &(0x7f0000000040)=0x0, &(0x7f0000000180)) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)=ANY=[@ANYBLOB="02000000010900"/16, @ANYRES32=r0, @ANYBLOB="040000000000000010000200000000002000000000000000"], 0x2c, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$bfs(&(0x7f00000002c0)='bfs\x00', &(0x7f0000000340)='./file0/file0\x00', 0xfffffffffffffff8, 0x4, &(0x7f0000000580)=[{&(0x7f0000000400)="d6a6f5e54e49eacd0330b98d5aa8130a331c5a9eab4d4d96b9f00c75c6274c710050a00195bf53a9e6f0f1423a58156426c8d8c2e52d0ce1c22062f8ba2141a20cef5a3c5169", 0x46}, {&(0x7f0000000380)="850753c9c02709c8c0b4a230ea65e8fe6cdcf8ea9c02e108750cafb76a2f11b9017431a1d971c7b9a25c9002589a9eddc868401dda", 0x35, 0x4}, {&(0x7f0000000480)="721bb769f740ce1b3990623bde7e1990521c7bc702c08d981d28eeb39dfced33b8b8baeba135510bd875c48a2ad930db1adf41c95a3c92070747a759fee1f5ecd12cced6ab2060d27625229fe02ef65c08cb13042da9968805511b06541a03114d8eab62b81684bbf83bfd121070285ed9e645a9a4a193cb24dadb39b5cf9d9adf72e6aad89e0ac606bd8a30fce7f326efa57925849a4daba51c8facde445980ac4d2dc6f80226de484d9a045d6c948afc7a6f4f8920db6bfef6a9da", 0xbc, 0x9}, {&(0x7f0000000540)="583fd12db2d681bfadd9170e1008af8d872eb216be6d4011edd2aac109d1520b3e6a0a17a0a05339d158478ceb1cb1ebc925bb", 0x33, 0xce07}], 0x300400, 0x0) r3 = socket(0x10, 0x2, 0x0) getsockopt$PNPIPE_HANDLE(r3, 0x113, 0x3, &(0x7f0000000740), &(0x7f0000000780)=0x4) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) r6 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) r7 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) accept4$unix(0xffffffffffffffff, 0x0, &(0x7f0000000880), 0x80800) r8 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f00000008c0)={0x0, 0x0}, &(0x7f0000000840)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r9, 0x0) chdir(&(0x7f0000000100)='./file0\x00') r10 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r10, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r10, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000200)={r10}) r12 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r12, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) r13 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r13, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) setsockopt$inet_group_source_req(r13, 0x0, 0x2b, &(0x7f0000000600)={0x4, {{0x2, 0x4e22, @multicast2}}, {{0x2, 0x4e24, @loopback}}}, 0x108) ioctl$sock_bt_cmtp_CMTPCONNADD(r11, 0x400443c8, &(0x7f0000000240)={r12, 0xb7c0}) symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') 08:18:08 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x1d7) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r6, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002011400010000000000", @ANYRES32=0x0, @ANYBLOB="00008f2b137d10db8762c4a79270a73561582d26481439000000c76f4503775e3a3ca76b940ae108b24a5a073ab87e"], 0x48}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000240)=@newneigh={0x30, 0x1c, 0x205, 0x0, 0x0, {0xa, 0x0, 0x0, r6, 0x0, 0xa}, [@NDA_DST_IPV6={0x14, 0x1, @loopback}]}, 0x30}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000900)=ANY=[@ANYBLOB="20000000110001040000000000000000020000fd", @ANYRES32=r6, @ANYBLOB="ee023c8efaa10834eaabf1c60ad950ee2f2d47f7ce2a4322b0086dc768b2207574c9fc1d00b3bca86c9906f797f5640158f72e864bfd43274f13c4e4c99a23b3439ebbc59867c9d701745c4835f89571caf2f62b8925ede0a1324af1f15643a5ac4a276caf99f1b2e47596746b91973a459f15aa766d68d555df4c752876e712c9c73239c2bb60788f1901e05f5d324dcceee1e7f6c92e6f90f163b1f9"], 0x20}}, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x16, 0x2, &(0x7f00000002c0)=ANY=[@ANYRESHEX=r1], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r6, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x2}, 0x8, 0x10, &(0x7f0000000340), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r7, 0xffffffffa0008000, 0xffffffffffffff3e, 0x0, &(0x7f0000000040)="a34747e865af5cf11e34bdff7a7a5ba0051aae5804d5a05d9b9ff68e12bb4d43a20375ea905795449b957e956aa6", 0x0, 0x401, 0x0, 0x0, 0xfffffffffffffff3}, 0x28) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f0000000240)={0x1ff, 0xc, 0x4, 0x0, 0x27e5, {}, {0x4, 0x8, 0x4, 0x8, 0x7, 0x6, "96669900"}, 0x7, 0x0, @fd=r0, 0x9, 0x0, r7}) r8 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) recvmsg(r3, &(0x7f0000002b40)={&(0x7f0000000380)=@alg, 0x80, &(0x7f0000002a80)=[{&(0x7f0000000300)=""/46, 0x2e}, {&(0x7f0000000500)=""/16, 0x10}, {&(0x7f0000000540)=""/63, 0x3f}, {&(0x7f00000009c0)=""/4096, 0x1000}, {&(0x7f0000000680)=""/61, 0x3d}, {&(0x7f00000006c0)=""/62, 0x3e}, {&(0x7f0000000700)=""/100, 0x64}, {&(0x7f00000019c0)=""/4096, 0x1000}, {&(0x7f0000000780)=""/237, 0xed}, {&(0x7f00000029c0)=""/159, 0x9f}], 0xa, &(0x7f0000000880)=""/118, 0x76}, 0x40002001) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="9feb01001800000000000000240000002400000002000000000000000000000409000000000005000000010000003f00"/62], &(0x7f0000000080)=""/236, 0x3e, 0xec, 0x8}, 0x20) ioctl$EVIOCGLED(r8, 0x80404519, &(0x7f0000000580)=""/250) r9 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) dup(0xffffffffffffffff) r10 = dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_CONGESTION(r10, 0x6, 0xd, &(0x7f0000000180)='lp\x00', 0x3) ioctl$VIDIOC_TRY_FMT(r10, 0xc0d05640, &(0x7f0000000400)={0xa, @raw_data="d456e651514154be56c23a0150374fec800b3363d0f8209aea95ae10a4bfe2bc4a059b555ffe32ee49657c21fdaeec9ff08b45f3c5b652502dd578edc616a43da8fa7411c10cf0be3062500d3923e6f93300ce6e6ca32a13179605ca95c9250023e974040392fcffaac49faad6d6549cb1f2e1c7492ba9a8e2d26787e1872027fbe8577edbc559354f305d4e05c26a2f708bb008ca01368edece7ac1108379664aea7622db8fe0f786d6a4177494b3766d3f6f8e4c69729d1cdef558344c8bab4dfc9bfc6bc56bfa"}) ioctl$BLKTRACESTART(r10, 0x1274, 0x0) 08:18:08 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x305, &(0x7f0000000000)=ANY=[]}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1000000000000029, 0x400000000100) [ 599.858407][T17474] cgroup: fork rejected by pids controller in /syz1 08:18:08 executing program 5: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x305, &(0x7f0000000000)=ANY=[]}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x100000000000003a, 0x400000000100) 08:18:08 executing program 0: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [{}], {}, [], {0x10, 0x2}}, 0x2c, 0x0) ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000200)={0xffffff01, 0x2, 0x18, "19c9a8772bd6c2bc862638608c81e3f1a0460fe081c7cd22a5276ccfb1d8524a7e5a5609581bd86373cab03d0a2baa47e1d1bca0d7dd5107edd920c1", 0x3, "26eb84293e95fda9540843b8ccf815ef7988808e3849941ce623e19f7af41982aa2edb55fd3aac7bd28606f7624d1aa6cd32e4d6666486495afca11d", 0x28}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r3, 0x0) chdir(&(0x7f0000000100)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') 08:18:08 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) r0 = socket(0x1, 0x2, 0x0) getsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000140), &(0x7f0000000100)=0x1002e) fcntl$getownex(r0, 0x10, &(0x7f0000000240)) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f00000000c0)) ptrace(0x10, r1) r2 = clone3(&(0x7f0000000280)={0x80040000, 0x0, &(0x7f00000000c0), 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) process_vm_writev(r2, &(0x7f0000000780)=[{&(0x7f00000004c0)=""/175, 0xaf}, {0x0}, {0x0}, {0x0}], 0x4, &(0x7f0000000580)=[{&(0x7f0000000ac0)=""/252, 0xfc}, {0x0}, {0x0}], 0x3, 0x0) 08:18:08 executing program 5: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x305, &(0x7f0000000000)=ANY=[]}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x100000000000003b, 0x400000000100) 08:18:08 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x305, &(0x7f0000000000)=ANY=[]}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x100000000000002a, 0x400000000100) 08:18:09 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x305, &(0x7f0000000000)=ANY=[]}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x100000000000002b, 0x400000000100) 08:18:09 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) r0 = socket(0x1, 0x2, 0x0) getsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000140), &(0x7f0000000100)=0x1002e) fcntl$getownex(r0, 0x10, &(0x7f0000000240)) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f00000000c0)) ptrace(0x10, r1) r2 = clone3(&(0x7f0000000280)={0x80040000, 0x0, &(0x7f00000000c0), 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) process_vm_writev(r2, &(0x7f0000000780)=[{&(0x7f00000004c0)=""/175, 0xaf}, {0x0}, {0x0}, {0x0}], 0x4, &(0x7f0000000580)=[{&(0x7f0000000ac0)=""/252, 0xfc}, {0x0}, {0x0}], 0x3, 0x0) 08:18:09 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x16, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000340)}, 0x42) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0xffffffffa0008000, 0xffffffffffffff3e, 0x0, &(0x7f0000000040)="a34747e865af5cf11e34bdff7a7a5ba0051aae5804d5a05d9b9ff68e12bb4d43a20375ea905795449b957e956aa6", 0x0, 0x401, 0x0, 0x0, 0xfffffffffffffff3}, 0x28) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f0000000240)={0x1ff, 0xc, 0x4, 0x220400, 0x3, {0x0, 0x7530}, {0x4, 0x8, 0x4, 0x8, 0x7, 0x6, "96669900"}, 0x7, 0x0, @fd=r0, 0x9, 0x0, r2}) ioctl$KVM_GET_PIT(0xffffffffffffffff, 0xc048ae65, &(0x7f00000002c0)) r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="9feb010018000000000000002400000024000000020000000000000000000000000000000000030000000005000000010100003f00"/62], &(0x7f0000000080)=""/236, 0x3e, 0xec, 0x8}, 0x20) ioctl$EVIOCGLED(r3, 0x80404519, &(0x7f0000000580)=""/250) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r5 = dup(0xffffffffffffffff) r6 = dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_CONGESTION(r6, 0x6, 0xd, &(0x7f0000000180)='lp\x00', 0x3) ioctl$VIDIOC_TRY_FMT(r6, 0xc0d05640, &(0x7f0000000400)={0xa, @raw_data="d456e651514154be56c23a0150374fec800b3363d0f8209aea95ae10a4bfe2bc4a059b555ffe32ee49657c21fdaeec9ff08b45f3c5b652502dd578edc616a43da8fa7411c10cf0be3062500d3923e6f93300ce6e6ca32a13179605ca95c9250023e974040392fcffaac49faad6d6549cb1f2e1c7492ba9a8e2d26787e1872027fbe8577edbc559354f305d4e05c26a2f708bb008ca01368edece7ac1108379664aea7622db8fe0f786d6a4177494b3766d3f6f8e4c69729d1cdef558344c8bab4dfc9bfc6bc56bfa"}) ioctl$BLKTRACESTART(r6, 0x1274, 0x0) ioctl$KVM_SET_PIT2(r5, 0x4070aea0, &(0x7f0000000500)={[{0x7ff, 0x3, 0x9, 0x3f, 0x1, 0x6, 0x3, 0x80, 0xf7, 0x1, 0x3, 0x7, 0x9}, {0x8e, 0x7, 0x67, 0x6, 0x4, 0xe2, 0x2e, 0x40, 0xd4, 0x5, 0x3, 0x9, 0x1}, {0xb7, 0xb94, 0xe9, 0x83, 0x6, 0x3, 0x80, 0x9, 0x3, 0x3f, 0x67, 0x5, 0x100000001}], 0x6}) 08:18:09 executing program 0: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) accept4(r0, &(0x7f0000000000)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, &(0x7f0000000180)=0x80, 0x800) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f00000003c0)={0x3, 0x2, 0x4, 0x40, 0xfff, {0x77359400}, {0x1, 0x0, 0x1, 0x0, 0x3f, 0x4, "47ecfc76"}, 0x1, 0x1, @offset=0x7fffffff, 0x3e6c00, 0x0, r1}) connect(r2, &(0x7f0000000440)=@ethernet={0x306, @local}, 0x80) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r4) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="0200000001000000000000000200000053ad55fd174723349664fd7e17dcaa96c89de4cc887e9618d58b5433416b24f8be8e2877dc5d07f00dc045f95c3014bba56250be6777f7", @ANYRES32=r4, @ANYBLOB="040000000000000010000200000000002000000000000000"], 0x2c, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r8, 0x0) chdir(&(0x7f0000000100)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') 08:18:09 executing program 5: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x305, &(0x7f0000000000)=ANY=[]}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x100000000000003c, 0x400000000100) [ 600.718590][T17815] BPF:[1] Invalid kind:0 08:18:09 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x305, &(0x7f0000000000)=ANY=[]}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x100000000000002c, 0x400000000100) 08:18:09 executing program 5: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x305, &(0x7f0000000000)=ANY=[]}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x100000000000003d, 0x400000000100) 08:18:09 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x16, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000340)}, 0x42) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0xffffffffa0008000, 0xffffffffffffff3e, 0x0, &(0x7f0000000040)="a34747e865af5cf11e34bdff7a7a5ba0051aae5804d5a05d9b9ff68e12bb4d43a20375ea905795449b957e956aa6", 0x0, 0x401, 0x0, 0x0, 0xfffffffffffffff3}, 0x28) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f0000000240)={0x1ff, 0xc, 0x4, 0x0, 0x27e5, {}, {0x4, 0x8, 0x4, 0x8, 0x7, 0x6, "96669900"}, 0x7, 0x0, @fd=r0, 0x9, 0x0, r2}) r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@struct={0x0, 0x0, 0x0, 0x4, 0x0, 0x9}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x1, 0x3f}}]}}, &(0x7f0000000080)=""/236, 0x3e, 0xec, 0x8}, 0x20) ioctl$EVIOCGLED(r3, 0x80404519, &(0x7f0000000580)=""/250) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) dup(0xffffffffffffffff) r5 = dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_CONGESTION(r5, 0x6, 0xd, &(0x7f0000000180)='lp\x00', 0x3) ioctl$VIDIOC_TRY_FMT(r5, 0xc0d05640, &(0x7f0000000400)={0xa, @raw_data="d456e651514154be56c23a0150374fec800b3363d0f8209aea95ae10a4bfe2bc4a059b555ffe32ee49657c21fdaeec9ff08b45f3c5b652502dd578edc616a43da8fa7411c10cf0be3062500d3923e6f93300ce6e6ca32a13179605ca95c9250023e974040392fcffaac49faad6d6549cb1f2e1c7492ba9a8e2d26787e1872027fbe8577edbc559354f305d4e05c26a2f708bb008ca01368edece7ac1108379664aea7622db8fe0f786d6a4177494b3766d3f6f8e4c69729d1cdef558344c8bab4dfc9bfc6bc56bfa"}) ioctl$BLKTRACESTART(r5, 0x1274, 0x0) 08:18:09 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) r0 = socket(0x1, 0x2, 0x0) getsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000140), &(0x7f0000000100)=0x1002e) fcntl$getownex(r0, 0x10, &(0x7f0000000240)) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f00000000c0)) ptrace$getregset(0x4204, r1, 0x201, &(0x7f00000001c0)={0x0}) r2 = clone3(&(0x7f0000000280)={0x80040000, 0x0, &(0x7f00000000c0), 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) process_vm_writev(r2, &(0x7f0000000780)=[{&(0x7f00000004c0)=""/175, 0xaf}, {0x0}, {0x0}, {0x0}], 0x4, &(0x7f0000000580)=[{&(0x7f0000000ac0)=""/252, 0xfc}, {0x0}, {0x0}], 0x3, 0x0) 08:18:09 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x305, &(0x7f0000000000)=ANY=[]}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x100000000000002d, 0x400000000100) 08:18:09 executing program 0: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000000)=ANY=[@ANYBLOB="0200001c0000000000001c69a199135859344a6c27f4d1", @ANYRES32=0x0, @ANYBLOB="040000000000000010000200000000002000000000000000"], 0x2c, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x4080, 0x0) setsockopt$bt_BT_SNDMTU(r0, 0x112, 0xc, &(0x7f0000000200)=0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$sock_inet_SIOCSIFBRDADDR(r1, 0x891a, &(0x7f0000000040)={'macvtap0\x00', {0x2, 0x4e24, @loopback}}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r4, 0x0) chdir(&(0x7f0000000100)='./file0\x00') r5 = dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_CONGESTION(r5, 0x6, 0xd, &(0x7f0000000180)='lp\x00', 0x3) ioctl$VIDIOC_TRY_FMT(r5, 0xc0d05640, &(0x7f0000000400)={0xa, @raw_data="d456e651514154be56c23a0150374fec800b3363d0f8209aea95ae10a4bfe2bc4a059b555ffe32ee49657c21fdaeec9ff08b45f3c5b652502dd578edc616a43da8fa7411c10cf0be3062500d3923e6f93300ce6e6ca32a13179605ca95c9250023e974040392fcffaac49faad6d6549cb1f2e1c7492ba9a8e2d26787e1872027fbe8577edbc559354f305d4e05c26a2f708bb008ca01368edece7ac1108379664aea7622db8fe0f786d6a4177494b3766d3f6f8e4c69729d1cdef558344c8bab4dfc9bfc6bc56bfa"}) r6 = creat(&(0x7f0000000240)='./file0\x00', 0x4) ioctl$SNDRV_TIMER_IOCTL_STATUS32(r6, 0x80585414, &(0x7f0000000280)) ioctl$KVM_SET_TSC_KHZ(r5, 0xaea2, 0x8) symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') write$binfmt_aout(r3, &(0x7f0000000840)={{0x108, 0x99, 0xfb, 0x10a, 0x371, 0x1000, 0x303, 0x97e}, "024e61e8d589cd529e4cbfc1a7bdebfb9be647d402ac51e40694a49a26786fe707affc4c7123bbb30d1540ce1186d66f2d5594595721a16fd97e8ee33ef4b5c88a7e892bdfb5d7b4a6f856f2b9315d636a0a3133f867d8ad7eff7c9159d2020d29ecd03afe4aad8ba9c9d63db0483ec50065a32e14594a6e8980fb63018ce74f88818acf2b85f56126f7c5f236d3654ab706dc1e34d28e5311215231add6c07b609b6846ae600cdc91a7d9bbdf742fd6022bcb31e8b2ac7febbff7f32a8defb173791a9ff33963fe97abaf0511daea78e061533e7baa45f32a1acd71ffcf7e29c8f2e1bb71", [[], [], [], [], [], [], [], [], []]}, 0xa05) 08:18:09 executing program 5: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x305, &(0x7f0000000000)=ANY=[]}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x100000000000003e, 0x400000000100) [ 601.144198][T18038] BPF:[2] ARRAY (anon) [ 601.154540][T18038] BPF:type_id=5 index_type_id=1 nr_elems=63 [ 601.175677][T18038] BPF: [ 601.178501][T18038] BPF:Invalid index [ 601.246541][T18038] BPF: [ 601.246541][T18038] 08:18:09 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x305, &(0x7f0000000000)=ANY=[]}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x100000000000002e, 0x400000000100) 08:18:10 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) r0 = socket(0x1, 0x2, 0x0) getsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000140), &(0x7f0000000100)=0x1002e) fcntl$getownex(r0, 0x10, &(0x7f0000000240)) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f00000000c0)) ptrace$getregset(0x4204, r1, 0x201, &(0x7f00000001c0)={0x0}) r2 = clone3(&(0x7f0000000280)={0x80040000, 0x0, &(0x7f00000000c0), 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) process_vm_writev(r2, &(0x7f0000000780)=[{&(0x7f00000004c0)=""/175, 0xaf}, {0x0}, {0x0}, {0x0}], 0x4, &(0x7f0000000580)=[{&(0x7f0000000ac0)=""/252, 0xfc}, {0x0}, {0x0}], 0x3, 0x0) 08:18:10 executing program 0: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [{}], {}, [], {0x10, 0x2}}, 0x2c, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r3, 0x0) chdir(&(0x7f0000000100)='./file0\x00') r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) setsockopt$IP6T_SO_SET_REPLACE(r4, 0x29, 0x40, &(0x7f0000000840)=@nat={'nat\x00', 0x1b, 0x5, 0x6b8, 0x4b0, 0x388, 0x148, 0x4b0, 0x4b0, 0x5e8, 0x5e8, 0x5e8, 0x5e8, 0x5e8, 0x5, &(0x7f0000000000), {[{{@uncond, 0x0, 0x100, 0x148, 0x0, {}, [@common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x80}}, @common=@inet=@l2tp={{0x30, 'l2tp\x00'}, {0x0, 0x2, 0x2, 0x0, 0x6}}]}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x4, @ipv6=@mcast2, @ipv4=@multicast2, @icmp_id=0x66, @port=0x4e22}}}, {{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}, {[0x4d2, 0x4d4], 0x1}}, @common=@unspec=@comment={{0x120, 'comment\x00'}}]}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x1a, @ipv6=@mcast1, @ipv6=@rand_addr="addc9ce8af670de26b8fc947880f50fe", @icmp_id=0x67, @gre_key=0xfe00}}}, {{@ipv6={@remote, @local, [0xff, 0xffffffff, 0xffffffff, 0xffffff00], [0xff000000, 0xff000000, 0xffffffff, 0xff000101], 'gretap0\x00', 'ipvlan0\x00', {}, {}, 0x11, 0x40, 0x1, 0x18}, 0x0, 0x100, 0x128, 0x0, {}, [@common=@srh={{0x30, 'srh\x00'}, {0x3a, 0x1f, 0xc8, 0x4, 0x3, 0xcf, 0xc}}, @common=@hl={{0x28, 'hl\x00'}, {0x2, 0xff}}]}, @common=@inet=@SET1={0x28, 'SET\x00', 0x1, {{0xffffffffffffffff, 0x4, 0x3}, {0x3, 0x1, 0x1}}}}, {{@uncond, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@unspec=@ipvs={{0x48, 'ipvs\x00'}, {@ipv4=@dev={0xac, 0x14, 0x14, 0x13}, [0xffffff00, 0xff, 0xff000000, 0xffffff00], 0x4e24, 0x21, 0x7, 0x4e24, 0x4, 0x8}}]}, @unspec=@SNAT1={0x48, 'SNAT\x00', 0x1, {0x1, @ipv4=@dev={0xac, 0x14, 0x14, 0xe}, @ipv6=@mcast1, @icmp_id=0x68, @port=0x4e23}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x718) symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') 08:18:10 executing program 5: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x305, &(0x7f0000000000)=ANY=[]}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1000000000000041, 0x400000000100) 08:18:10 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x16, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffff1971a4f0ff00000000b7060000000000811e6403000000000045040400010000001704000001000a00b7040000000100006a0af2fe00000000850000001a000000b70000000000000095000000000000009e17890efaee5eab7ff8a8cdc21ce784909b849d5550ad855dab54d8877a6db61d69f2ffcaa10350e11cb97c8adf1bc9a0c4ee6d9674c77404ceb9971e43405d621ffbc9a4fd39b0b56bfe6508ebb3c44eb84049761451ce540c772e2d9f8004e26f7fcc059c062234d5595f6fba87b81d1106fb0289ce67a66afd9ac3d09e29a9d542ca9d85a5c9c88474895d679838def0a83a733dc6a39b63a5ed69d32394c53361d7480884bd8048a967d9b912ef9f1d6fee41f5b29d37acb91c61ccd1df673896450f859ce8122a79c3e4"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000340)}, 0x42) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0xffffffffa0008000, 0xffffffffffffff3e, 0x0, &(0x7f0000000040)="a34747e865af5cf11e34bdff7a7a5ba0051aae5804d5a05d9b9ff68e12bb4d43a20375ea905795449b957e956aa6", 0x0, 0x401, 0x0, 0x0, 0xfffffffffffffff3}, 0x28) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f0000000240)={0x1ff, 0xc, 0x4, 0x0, 0x27e5, {}, {0x4, 0x8, 0x4, 0x8, 0x7, 0x6, "96669900"}, 0x7, 0x0, @fd=r0, 0x9, 0x0, r2}) r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@struct={0x0, 0x0, 0x0, 0x4, 0x0, 0x9}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x1, 0x3f}}]}}, &(0x7f0000000080)=""/236, 0x3e, 0xec, 0x8}, 0x20) ioctl$EVIOCGLED(r3, 0x80404519, &(0x7f0000000580)=""/250) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) dup(0xffffffffffffffff) clock_gettime(0x6, &(0x7f00000002c0)) r5 = dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_CONGESTION(r5, 0x6, 0xd, &(0x7f0000000180)='lp\x00', 0x3) ioctl$VIDIOC_TRY_FMT(r5, 0xc0d05640, &(0x7f0000000400)={0xa, @raw_data="d456e651514154be56c23a0150374fec800b3363d0f8209aea95ae10a4bfe2bc4a059b555ffe32ee49657c21fdaeec9ff08b45f3c5b652502dd578edc616a43da8fa7411c10cf0be3062500d3923e6f93300ce6e6ca32a13179605ca95c9250023e974040392fcffaac49faad6d6549cb1f2e1c7492ba9a8e2d26787e1872027fbe8577edbc559354f305d4e05c26a2f708bb008ca01368edece7ac1108379664aea7622db8fe0f786d6a4177494b3766d3f6f8e4c69729d1cdef558344c8bab4dfc9bfc6bc56bfa"}) ioctl$BLKTRACESTART(r5, 0x1274, 0x0) 08:18:10 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x305, &(0x7f0000000000)=ANY=[]}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x100000000000002f, 0x400000000100) [ 601.668660][T18260] BPF:[2] ARRAY (anon) [ 601.698820][T18260] BPF:type_id=5 index_type_id=1 nr_elems=63 [ 601.728325][T18260] BPF: [ 601.742202][T18260] BPF:Invalid index 08:18:10 executing program 0: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [{}], {}, [], {0x10, 0x2}}, 0x2c, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000000)={0x7, 0xfffffffc}, 0xc) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r3, 0x0) chdir(&(0x7f0000000100)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') [ 601.767763][T18260] BPF: [ 601.767763][T18260] 08:18:10 executing program 5: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x305, &(0x7f0000000000)=ANY=[]}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1000000000000042, 0x400000000100) 08:18:10 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x305, &(0x7f0000000000)=ANY=[]}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1000000000000030, 0x400000000100) 08:18:10 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) r0 = socket(0x1, 0x2, 0x0) getsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000140), &(0x7f0000000100)=0x1002e) fcntl$getownex(r0, 0x10, &(0x7f0000000240)) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f00000000c0)) ptrace$getregset(0x4204, r1, 0x201, &(0x7f00000001c0)={0x0}) r2 = clone3(&(0x7f0000000280)={0x80040000, 0x0, &(0x7f00000000c0), 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) process_vm_writev(r2, &(0x7f0000000780)=[{&(0x7f00000004c0)=""/175, 0xaf}, {0x0}, {0x0}, {0x0}], 0x4, &(0x7f0000000580)=[{&(0x7f0000000ac0)=""/252, 0xfc}, {0x0}, {0x0}], 0x3, 0x0) 08:18:10 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x16, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000340)}, 0x42) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0xffffffffa0008000, 0xffffffffffffff3e, 0x0, &(0x7f0000000040)="a34747e865af5cf11e34bdff7a7a5ba0051aae5804d5a05d9b9ff68e12bb4d43a20375ea905795449b957e956aa6", 0x0, 0x401, 0x0, 0x0, 0xfffffffffffffff3}, 0x28) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f0000000240)={0x1ff, 0xc, 0x4, 0x0, 0x27e5, {}, {0x4, 0x8, 0x4, 0x8, 0x7, 0x6, "96669900"}, 0x7, 0x0, @fd=r0, 0x9, 0x0, r2}) r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@struct={0x0, 0x0, 0x0, 0x4, 0x0, 0x9}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x1, 0x3f}}]}}, &(0x7f0000000080)=""/236, 0x3e, 0xec, 0x8}, 0x20) ioctl$EVIOCGLED(r3, 0x80404519, &(0x7f0000000580)=""/250) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) dup(0xffffffffffffffff) r5 = dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_CONGESTION(r5, 0x6, 0xd, &(0x7f00000002c0)='cubic\x00', 0x6) ioctl$VIDIOC_TRY_FMT(r5, 0xc0d05640, &(0x7f0000000400)={0xa, @raw_data="d456e651514154be56c23a0150374fec800b3363d0f8209aea95ae10a4bfe2bc4a059b555ffe32ee49657c21fdaeec9ff08b45f3c5b652502dd578edc616a43da8fa7411c10cf0be3062500d3923e6f93300ce6e6ca32a13179605ca95c9250023e974040392fcffaac49faad6d6549cb1f2e1c7492ba9a8e2d26787e1872027fbe8577edbc559354f305d4e05c26a2f708bb008ca01368edece7ac1108379664aea7622db8fe0f786d6a4177494b3766d3f6f8e4c69729d1cdef558344c8bab4dfc9bfc6bc56bfa"}) ioctl$BLKTRACESTART(r5, 0x1274, 0x0) 08:18:10 executing program 5: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x305, &(0x7f0000000000)=ANY=[]}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1000000000000043, 0x400000000100) 08:18:10 executing program 0: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000000)=ANY=[@ANYBLOB="020000000100000000000000420000001c548dd542263e0042d18ce4636e04ae20425e453042acb47a3af3f99f9d76b7de5b70559c2dc7d29e9b891894c7dce712b1771bb23539e5df606d0ede794c6ed85e55da9373f9242614098a492f2abdd73eee", @ANYRES32=0x0, @ANYBLOB="040000000000000010000200000000002000000000000000"], 0x2c, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r3, 0x0) chdir(&(0x7f0000000100)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') 08:18:10 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x305, &(0x7f0000000000)=ANY=[]}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1000000000000031, 0x400000000100) [ 602.185258][T18485] BPF:[2] ARRAY (anon) [ 602.189817][T18485] BPF:type_id=5 index_type_id=1 nr_elems=63 [ 602.227393][T18485] BPF: [ 602.259436][T18485] BPF:Invalid index [ 602.302936][T18485] BPF: [ 602.302936][T18485] 08:18:10 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) r0 = socket(0x1, 0x2, 0x0) getsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000140), &(0x7f0000000100)=0x1002e) fcntl$getownex(r0, 0x10, &(0x7f0000000240)) r1 = getpid() ptrace(0x10, r1) ptrace$getregset(0x4204, r1, 0x201, &(0x7f00000001c0)={0x0}) r2 = clone3(&(0x7f0000000280)={0x80040000, 0x0, &(0x7f00000000c0), 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) process_vm_writev(r2, &(0x7f0000000780)=[{&(0x7f00000004c0)=""/175, 0xaf}, {0x0}, {0x0}, {0x0}], 0x4, &(0x7f0000000580)=[{&(0x7f0000000ac0)=""/252, 0xfc}, {0x0}, {0x0}], 0x3, 0x0) 08:18:11 executing program 5: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x305, &(0x7f0000000000)=ANY=[]}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1000000000000044, 0x400000000100) 08:18:11 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x305, &(0x7f0000000000)=ANY=[]}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1000000000000032, 0x400000000100) 08:18:11 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x16, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000340)}, 0x42) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0xffffffffa0008000, 0x2e, 0x0, &(0x7f0000000040)="a34747e865af5cf11e34bdff7a7a5ba0051aae5804d5a05d9b9ff68e12bb4d43a20375ea909475449b957e956aa6", 0x0, 0x401, 0x0, 0xd4, 0x0, &(0x7f0000000840)="34897b8b821d4ed68e1493d51edafd39e3c9984c55fb0c7d2e7c61cc8e6699649e48ce3eac6fef533b2e34b5d4944c6889cebf6bb3d9fa3fa91cdc5702b2741d4c2d98e197bb51c38b2d533d1c77f3a6f68152ad4682b5586fada8502a09cbbfe5e5ede7721adcc9140f7b01fe40f4d114a82fd8b53df8da6081a3a1fd26e67ead9559932f85b4741ae7e67d09731866ac96b8e7425bc80b79a5405eb101f70207dd028e255badb1dbbd4aaeaed811fd436a5db165768b7b584eee3e48587dff04b3927e9f97b2dc9c4e43b8be000918fde080ed"}, 0x40) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f0000000240)={0x1ff, 0xc, 0x4, 0x0, 0x27e5, {}, {0x4, 0x8, 0x4, 0x8, 0x7, 0x6, "96669900"}, 0x7, 0x0, @fd=r0, 0x9, 0x0, r2}) r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)=""/236, 0x45, 0xec, 0x8}, 0x20) ioctl$EVIOCGLED(r3, 0x80404519, &(0x7f0000000580)=""/250) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) getsockname$packet(r5, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) dup(0xffffffffffffffff) r6 = dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_CONGESTION(r6, 0x6, 0xd, &(0x7f0000000180)='lp\x00', 0x3) ioctl$VIDIOC_TRY_FMT(r6, 0xc0d05640, &(0x7f0000000400)={0xa, @raw_data="d456e651514154be56c23a0150374fec800b3363d0f8209aea95ae10a4bfe2bc4a059b555ffe32ee49657c21fdaeec9ff08b45f3c5b652502dd578edc616a43da8fa7411c10cf0be3062500d3923e6f93300ce6e6ca32a13179605ca95c9250023e974040392fcffaac49faad6d6549cb1f2e1c7492ba9a8e2d26787e1872027fbe8577edbc559354f305d4e05c26a2f708bb008ca01368edece7ac1108379664aea7622db8fe0f786d6a4177494b3766d3f6f8e4c69729d1cdef558344c8bab4dfc9bfc6bc56bfa"}) ioctl$BLKTRACESTART(r6, 0x1274, 0x0) 08:18:11 executing program 0: mkdir(&(0x7f0000000240)='./file0/file0\x00', 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='security.evm\x00', &(0x7f0000000200)=@sha1={0x1, "fc350dac5ef00e6ab07d86be8a85a49d4b41df68"}, 0x15, 0x3) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [{}], {}, [], {0x10, 0x2}}, 0x2c, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r3, 0x0) chdir(&(0x7f0000000100)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') [ 602.692124][T18710] BPF:Invalid section offset 08:18:11 executing program 5: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x305, &(0x7f0000000000)=ANY=[]}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1000000000000045, 0x400000000100) 08:18:11 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x305, &(0x7f0000000000)=ANY=[]}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1000000000000033, 0x400000000100) 08:18:11 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x16, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffff1971a4f0ff00000000b7060000000000811e6403000000000045040400010000001704000001000a00b7040000000100006a0af2fe00000000850000001a000000b70000000000000095000000000000009e17890efaee5eab7ff8a8cdc21ce784909b849d5550ad855dab54d8877a6db61d69f2ffcaa10350e11cb97c8adf1bc9a0c4ee6d9674c77404ceb9971e43405d621ffbc9a4fd39b0b56bfe6508ebb3c44eb84049761451ce540c772e2d9f8004e26f7fcc059c062234d5595f6fba87b81d1106fb0289ce67a66afd9ac3d09e29a9d542ca9d85a5c9c88474895d679838def0a83a733dc6a39b63a5ed69d32394c53361d7480884bd8048a967d9b912ef9f1d6fee41f5b29d37acb91c61ccd1df673896450f859ce8122a79c3e4"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000340)}, 0x42) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0xffffffffa0008000, 0x2e, 0x0, &(0x7f0000000040)="a34747e865af5cf11e34bdff7a7a5ba0051aae5804d5a05d9b9ff68e12bb4d43a20375ea905795449b957e956aa6", 0x0, 0xfffff000, 0x0, 0x48, 0xb, &(0x7f0000000c80)="35e7fcfc774f6224a7d823dda1e531f2d769c7e7a2310334cb1f061348f957ef7c52dc721b5d5dfd02000000000000008b787e94a24f4e46a4b860028df4e88e2ff438840e205e88"}, 0x40) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f0000000240)={0x1ff, 0xc, 0x4, 0x0, 0x27e5, {}, {0x4, 0x8, 0x4, 0x8, 0x7, 0x6, "96669900"}, 0x7, 0x0, @fd=r0, 0x9, 0x0, r2}) r4 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$caif_seqpacket(0x25, 0x5, 0x3) setsockopt$sock_linger(r5, 0x1, 0xd, &(0x7f00000002c0)={0x0, 0x7fff}, 0x8) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@struct={0x0, 0x0, 0x0, 0x4, 0x0, 0x9}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x1, 0x3f}}]}}, &(0x7f0000000080)=""/236, 0x3e, 0xec, 0x8}, 0x20) ioctl$EVIOCGLED(r4, 0x80404519, &(0x7f0000000580)=""/250) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) dup(0xffffffffffffffff) r7 = dup(0xffffffffffffffff) clone(0x1000000, &(0x7f0000000b80)="effd3281fdb6581c56cbef4b6d6c9dc693059740edb8fd126ccfcee416f26c3f1e6854dc3b2717955f1af1baf373ae09fcda2cbb1624025ca542c5eb34138d25057d6df84cda67827f06391015cd5c7b1d4d13fef297b9c5633bf8077aab46310999b002b2ec6862bfb7cfa0a49d3f93afe26f34e023d64a927b8f3f2741e8a8eeb951e4ac80a26cb59c5a7d74f963990704a4ba53c9f89c69bad4bd69a8558d2c5a7fd98cc26f0e13fb695401c2aa66a1036f974d93361eef89fedda84984588a6783098ca327c40cbd2ed581db340f0f455b8bf845698fe5bfdabfd0c6b4333a9d68d12f9706cca0118709deed3ec6a57f7f0bb9", &(0x7f0000000300), &(0x7f0000000500), &(0x7f0000000540)="c2dfd1000776b44050d9c8d867d15141babaa774ce200d2f57473ab82d7ba218c4bf84b41c95f1d205407f2abf837e9b3bf66b") setsockopt$inet_tcp_TCP_CONGESTION(r7, 0x6, 0xd, &(0x7f0000000180)='lp\x00', 0x3) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(r3, 0xc4c85513, &(0x7f0000000680)={{0x1, 0x1, 0xf07, 0x6, 'syz0\x00', 0x7f}, 0x0, [0xffffffff, 0x7fff, 0x9, 0x29d, 0x7, 0x5c31a058, 0x5, 0x7fff, 0x0, 0x9, 0x1, 0x3f, 0x24, 0x6, 0x6, 0xdc1, 0x400, 0x10001, 0x0, 0x8, 0x6, 0x2, 0xfff, 0x2, 0x4, 0x7b9, 0x7, 0x200, 0xa4, 0x400, 0x80, 0x7, 0x5, 0x5, 0xffffffffffffdae7, 0x1f, 0x7f, 0xbb, 0x0, 0x2, 0x7d65, 0xd3c3, 0x2, 0x0, 0x8, 0xffffffffffffffe1, 0x81, 0x7ff, 0x8001, 0x10, 0x6, 0x5, 0x0, 0x7, 0x1, 0x8ad5, 0x9a1, 0xebe, 0x6, 0x0, 0x7, 0x5, 0x5f, 0x4f7, 0x5, 0x5, 0x4, 0x100, 0x1, 0x100, 0x3f, 0x8, 0x3, 0x9, 0xf1, 0x100000000, 0x6000, 0x80, 0x3, 0x0, 0x20, 0x1, 0x400, 0x2, 0x10000, 0x7fff, 0x800, 0x2, 0x3ff, 0x1, 0x2, 0x9, 0x6, 0x81, 0x0, 0x2, 0xec9a, 0x7, 0x1, 0x40, 0x8000, 0x6, 0x3, 0xffffffffffffc1af, 0xbb2, 0xd7, 0x401, 0x0, 0x7, 0x1, 0x7, 0x1, 0x0, 0x0, 0x6, 0x8, 0x10000, 0x5, 0x101, 0x1a99, 0x0, 0x5616, 0x6, 0x3, 0x3, 0x1000, 0x9, 0x71b4]}) ioctl$VIDIOC_TRY_FMT(r7, 0xc0d05640, &(0x7f0000000400)={0xa, @raw_data="d456e651514154be56c23a0150374fec800b3363d0f8209aea95ae10a4bfe2bc4a059b555ffe32ee49657c21fdaeec9ff08b45f3c5b652502dd578edc616a43da8fa7411c10cf0be3062500d3923e6f93300ce6e6ca32a13179605ca95c9250023e974040392fcffaac49faad6d6549cb1f2e1c7492ba9a8e2d26787e1872027fbe8577edbc559354f305d4e05c26a2f708bb008ca01368edece7ac1108379664aea7622db8fe0f786d6a4177494b3766d3f6f8e4c69729d1cdef558344c8bab4dfc9bfc6bc56bfa"}) ioctl$BLKTRACESTART(r7, 0x1274, 0x0) 08:18:11 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) r0 = socket(0x1, 0x2, 0x0) getsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000140), &(0x7f0000000100)=0x1002e) fcntl$getownex(r0, 0x10, &(0x7f0000000240)) r1 = getpid() ptrace(0x10, r1) ptrace$getregset(0x4204, r1, 0x201, &(0x7f00000001c0)={0x0}) r2 = clone3(&(0x7f0000000280)={0x80040000, 0x0, &(0x7f00000000c0), 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) process_vm_writev(r2, &(0x7f0000000780)=[{&(0x7f00000004c0)=""/175, 0xaf}, {0x0}, {0x0}, {0x0}], 0x4, &(0x7f0000000580)=[{&(0x7f0000000ac0)=""/252, 0xfc}, {0x0}, {0x0}], 0x3, 0x0) 08:18:11 executing program 0: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="0200000001000000000000215e5e243e22e10002000000", @ANYRES32=0x0, @ANYBLOB="040000000000000010000200000000002000000000000000"], 0x2c, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r4 = dup2(0xffffffffffffffff, r3) ioctl$KVM_INTERRUPT(r4, 0x4004ae86, &(0x7f0000000180)=0x8000) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) connect(r2, &(0x7f0000000040)=@l2={0x1f, 0x9}, 0x80) connect$tipc(r1, &(0x7f0000000340)=@id={0x1e, 0x3, 0x1, {0x4e23, 0x4}}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r5 = socket(0x10, 0x5, 0x6) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r6, 0x0) chdir(&(0x7f0000000100)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') 08:18:11 executing program 5: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x305, &(0x7f0000000000)=ANY=[]}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1000000000000046, 0x400000000100) 08:18:11 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x305, &(0x7f0000000000)=ANY=[]}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1000000000000034, 0x400000000100) [ 603.194861][T18937] BPF:[2] ARRAY (anon) [ 603.199435][T18937] BPF:type_id=5 index_type_id=1 nr_elems=63 [ 603.250225][T18937] BPF: 08:18:11 executing program 5: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x305, &(0x7f0000000000)=ANY=[]}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1000000000000047, 0x400000000100) [ 603.270789][T18937] BPF:Invalid index 08:18:11 executing program 0: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000000)=ANY=[@ANYBLOB="02001000"/16, @ANYRES16, @ANYBLOB="040000001800000010000202000000002000000000000000e600b90266106c198571d96d5cb3d12970399a00ab2bda29"], 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) faccessat(r1, &(0x7f0000000240)='./file0\x00', 0x131, 0xc00) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) prctl$PR_GET_TSC(0x19, &(0x7f0000000180)) chown(&(0x7f00000001c0)='./file0\x00', r3, 0x0) chdir(&(0x7f0000000100)='./file0\x00') sendmsg$NLBL_CIPSOV4_C_ADD(r2, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="78000001dd6db8f50c3896f1582af70919e1ee65b3f54241fa98f2e93c4c7410ed3e444820dc822c7bdea5e11dbdcaa878ddfbf2ac900dd38c8b528e4be6d8e78a09d200", @ANYRES16=0x0, @ANYBLOB="00042dbd7000fbdbdf25010000004c000400050003000600000005000300070000000500030002000000050003000100000005000300020000000500030007000000050003000600000005000300050000000500030005000000080002000300000008000100ffffffff0800020001000000"], 0x78}, 0x1, 0x0, 0x0, 0x4048081}, 0x600000d0) [ 603.304983][T18937] BPF: [ 603.304983][T18937] 08:18:11 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) r0 = socket(0x1, 0x2, 0x0) getsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000140), &(0x7f0000000100)=0x1002e) fcntl$getownex(r0, 0x10, &(0x7f0000000240)) r1 = getpid() ptrace(0x10, r1) ptrace$getregset(0x4204, r1, 0x201, &(0x7f00000001c0)={0x0}) r2 = clone3(&(0x7f0000000280)={0x80040000, 0x0, &(0x7f00000000c0), 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) process_vm_writev(r2, &(0x7f0000000780)=[{&(0x7f00000004c0)=""/175, 0xaf}, {0x0}, {0x0}, {0x0}], 0x4, &(0x7f0000000580)=[{&(0x7f0000000ac0)=""/252, 0xfc}, {0x0}, {0x0}], 0x3, 0x0) 08:18:11 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x305, &(0x7f0000000000)=ANY=[]}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1000000000000035, 0x400000000100) 08:18:12 executing program 5: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x305, &(0x7f0000000000)=ANY=[]}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1000000000000048, 0x400000000100) 08:18:12 executing program 2: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000300)='/dev/vcsa\x00', 0x8000, 0x0) r1 = socket(0xa, 0x1, 0x0) r2 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x11, &(0x7f0000000100)={r3}, 0x8) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000680)={r3, @in={{0x2, 0x4e22, @broadcast}}, [0xc854, 0xfffffffffffffffe, 0xc11a, 0x6, 0x8, 0x7fff, 0x1, 0x1, 0x9, 0x6, 0x3, 0x6, 0x10001, 0x9, 0x7f]}, &(0x7f0000000500)=0x100) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f0000000540)={r4, 0x2, 0x30, 0x7487d811, 0x5}, &(0x7f0000000780)=0x18) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x16, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000340)}, 0x42) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r7, 0xffffffffa0008000, 0xffffffffffffff3e, 0x0, &(0x7f0000000040)="a34747e865af5cf11e34bdff7a7a5ba0051aae5804d5a05d9b9ff68e12bb4d43a20375ea905795449b957e956aa6", 0x0, 0x401, 0x0, 0x0, 0xfffffffffffffff3}, 0x28) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f0000000240)={0x1ff, 0xc, 0x4, 0x0, 0x27e5, {}, {0x4, 0x8, 0x4, 0x8, 0x7, 0x6, "96669900"}, 0x7, 0x0, @fd=r5, 0x9, 0x0, r7}) r8 = fcntl$dupfd(r6, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@struct={0x0, 0x0, 0x0, 0x4, 0x0, 0x9}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x1, 0x3f}}]}}, &(0x7f0000000080)=""/236, 0x3e, 0xec, 0x8}, 0x20) ioctl$EVIOCGLED(r8, 0x80404519, &(0x7f0000000580)=""/250) r9 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) dup(0xffffffffffffffff) r10 = dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_CONGESTION(r10, 0x6, 0xd, &(0x7f0000000180)='lp\x00', 0x3) r11 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) ioctl$sock_inet_SIOCGIFDSTADDR(r11, 0x8917, &(0x7f00000002c0)={'bridge_slave_0\x00', {0x2, 0x4e22, @local}}) ioctl$VIDIOC_TRY_FMT(r10, 0xc0d05640, &(0x7f0000000400)={0xa, @raw_data="d456e651514154be56c23a0150374fec800b3363d0f8209aea95ae10a4bfe2bc4a059b555ffe32ee49657c21fdaeec9ff08b45f3c5b652502dd578edc616a43da8fa7411c10cf0be3062500d3923e6f93300ce6e6ca32a13179605ca95c9250023e974040392fcffaac49faad6d6549cb1f2e1c7492ba9a8e2d26787e1872027fbe8577edbc559354f305d4e05c26a2f708bb008ca01368edece7ac1108379664aea7622db8fe0f786d6a4177494b3766d3f6f8e4c69729d1cdef558344c8bab4dfc9bfc6bc56bfa"}) ioctl$BLKTRACESTART(r10, 0x1274, 0x0) 08:18:12 executing program 0: exit_group(0xab3) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) statx(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x200, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [{0x2, 0x0, r0}], {}, [], {0x10, 0x2}}, 0x2c, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r4, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$IPSET_CMD_DEL(r5, &(0x7f0000000340)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x601a1240}, 0xc, &(0x7f0000000180)={&(0x7f0000000400)={0xcc, 0xa, 0x6, 0x301, 0x0, 0x0, {0x2, 0x0, 0x2}, [@IPSET_ATTR_ADT={0x10, 0x8, 0x0, 0x1, [{0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_CIDR={0x5, 0x3, 0x8}}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_ADT={0x5c, 0x8, 0x0, 0x1, [{0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_ETHER={0xa, 0x11, @dev={[], 0x2d}}}, {0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_ETHER={0xa, 0x11, @local}}, {0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_PORT_TO={0x6, 0x5, 0x1, 0x0, 0x4e20}}, {0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_IP2={0xc, 0x14, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @broadcast}}}, {0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_BYTES={0xc, 0x18, 0x1, 0x0, 0x8}}, {0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_MARKMASK={0x8, 0xb, 0x1, 0x0, 0x8}}]}, @IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x9}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_DATA={0x10, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP2={0xc, 0x14, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @multicast2}}]}, @IPSET_ATTR_DATA={0x18, 0x7, 0x0, 0x1, [@IPSET_ATTR_CIDR2={0x5, 0x15, 0x6d}, @IPSET_ATTR_PACKETS={0xc, 0x19, 0x1, 0x0, 0x7}]}]}, 0xcc}, 0x1, 0x0, 0x0, 0x240488c5}, 0x444) chdir(&(0x7f0000000100)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') 08:18:12 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x305, &(0x7f0000000000)=ANY=[]}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1000000000000036, 0x400000000100) [ 603.721220][T19168] BPF:[2] ARRAY (anon) [ 603.740335][T19168] BPF:type_id=5 index_type_id=1 nr_elems=63 08:18:12 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) r0 = socket(0x1, 0x2, 0x0) getsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000140), &(0x7f0000000100)=0x1002e) fcntl$getownex(r0, 0x10, &(0x7f0000000240)) rt_tgsigqueueinfo(0x0, 0x0, 0x16, &(0x7f00000000c0)) ptrace(0x10, 0x0) ptrace$getregset(0x4204, 0x0, 0x201, &(0x7f00000001c0)={0x0}) r1 = clone3(&(0x7f0000000280)={0x80040000, 0x0, &(0x7f00000000c0), 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) process_vm_writev(r1, &(0x7f0000000780)=[{&(0x7f00000004c0)=""/175, 0xaf}, {0x0}, {0x0}, {0x0}], 0x4, &(0x7f0000000580)=[{&(0x7f0000000ac0)=""/252, 0xfc}, {0x0}, {0x0}], 0x3, 0x0) 08:18:12 executing program 5: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x305, &(0x7f0000000000)=ANY=[]}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1000000000000049, 0x400000000100) [ 603.764759][T19168] BPF: [ 603.780878][T19168] BPF:Invalid index [ 603.797991][T19168] BPF: [ 603.797991][T19168] 08:18:12 executing program 0: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)=ANY=[@ANYBLOB="02000000010000000000000002000000", @ANYRES32=0x0, @ANYBLOB="04000000000054c983b20a00000000002000000040000000"], 0x2c, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setxattr$trusted_overlay_origin(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x2) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) r4 = socket(0xa, 0x1, 0x0) r5 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r4, 0x84, 0x11, &(0x7f0000000100)={r6}, 0x8) setsockopt$inet_sctp_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000200)=@assoc_value={r6, 0x9}, 0x8) chown(&(0x7f00000001c0)='./file0\x00', r3, 0x0) chdir(&(0x7f0000000100)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') 08:18:12 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x305, &(0x7f0000000000)=ANY=[]}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1000000000000037, 0x400000000100) 08:18:12 executing program 5: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x305, &(0x7f0000000000)=ANY=[]}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x100000000000004a, 0x400000000100) 08:18:12 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000180)='lp\x00', 0x3) ioctl$VIDIOC_TRY_FMT(r2, 0xc0d05640, &(0x7f0000000400)={0xa, @raw_data="d456e651514154be56c23a0150374fec800b3363d0f8209aea95ae10a4bfe2bc4a059b555ffe32ee49657c21fdaeec9ff08b45f3c5b652502dd578edc616a43da8fa7411c10cf0be3062500d3923e6f93300ce6e6ca32a13179605ca95c9250023e974040392fcffaac49faad6d6549cb1f2e1c7492ba9a8e2d26787e1872027fbe8577edbc559354f305d4e05c26a2f708bb008ca01368edece7ac1108379664aea7622db8fe0f786d6a4177494b3766d3f6f8e4c69729d1cdef558344c8bab4dfc9bfc6bc56bfa"}) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000880)={r2, 0x10, &(0x7f0000000840)={&(0x7f00000007c0)=""/127, 0x7f, 0xffffffffffffffff}}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0xbaff8faeb0248285, 0x27, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000340), 0x10, r3}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r4, 0xffffffffa0008000, 0xffffffffffffff3e, 0x0, &(0x7f0000000040)="a34747e865af5cf11e34bdff7a7a5ba0051aae5804d5a05d9b9ff68e12bb4d43a20375ea905795449b957e956aa6", 0x0, 0x401, 0x0, 0x0, 0xfffffffffffffff3}, 0x28) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f0000000240)={0x1ff, 0xc, 0x4, 0x0, 0x27e5, {}, {0x4, 0x8, 0x4, 0x8, 0x7, 0x6, "96669900"}, 0x7, 0x0, @fd=r0, 0x9, 0x0, r4}) r6 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@struct={0x0, 0x0, 0x0, 0x4, 0x0, 0x9}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x1, 0x3f}}]}}, &(0x7f0000000080)=""/236, 0x3e, 0xec, 0x8}, 0x20) clock_gettime(0x0, &(0x7f00000002c0)={0x0, 0x0}) r9 = epoll_create(0xff) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f0000000500)={0x0, 0x4, 0x4, 0x10000, 0x82d, {r7, r8/1000+10000}, {0x3, 0x2, 0xb7, 0x9, 0xff, 0x6, "c9b5cbb5"}, 0x3, 0x3, @planes=&(0x7f0000000300)={0x3f, 0x7fff, @fd=r5, 0x3}, 0x4, 0x0, r9}) ioctl$EVIOCGLED(r6, 0x80404519, &(0x7f0000000580)=""/250) r10 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r10, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r11 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) getsockopt$inet_IP_IPSEC_POLICY(r11, 0x0, 0x10, &(0x7f0000004180)={{{@in=@local, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f0000004280)=0xe8) r13 = socket$nl_route(0x10, 0x3, 0x0) r14 = socket$nl_route(0x10, 0x3, 0x0) r15 = socket$netlink(0x10, 0x3, 0x0) r16 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r16, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r16, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x1d7) sendmsg$nl_route(r15, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r17, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002011400010000000000", @ANYRES32=0x0, @ANYBLOB="00008f2b137d10db8762c4a79270a73561582d26481439000000c76f4503775e3a3ca76b940ae108b24a5a073ab87e"], 0x48}}, 0x0) sendmsg$nl_route(r14, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000240)=@newneigh={0x30, 0x1c, 0x205, 0x0, 0x0, {0xa, 0x0, 0x0, r17, 0x0, 0xa}, [@NDA_DST_IPV6={0x14, 0x1, @loopback}]}, 0x30}}, 0x0) sendmsg$nl_route(r13, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000900)=ANY=[@ANYBLOB="20000000110001040000000000000000020000fd", @ANYRES32=r17, @ANYBLOB="ee023c8efaa10834eaabf1c60ad950ee2f2d47f7ce2a4322b0086dc768b2207574c9fc1d00b3bca86c9906f797f5640158f72e864bfd43274f13c4e4c99a23b3439ebbc59867c9d701745c4835f89571caf2f62b8925ede0a1324af1f15643a5ac4a276caf99f1b2e47596746b91973a459f15aa766d68d555df4c752876e712c9c73239c2bb60788f1901e05f5d324dcceee1e7f6c92e6f90f163b1f9"], 0x20}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000004d80)={0x11, 0x0, 0x0}, &(0x7f0000004dc0)=0x14) clock_gettime(0x0, &(0x7f0000006a80)={0x0, 0x0}) recvmmsg(0xffffffffffffffff, &(0x7f0000006900)=[{{&(0x7f0000005340)=@x25={0x9, @remote}, 0x80, &(0x7f0000005600)=[{&(0x7f00000053c0)=""/195, 0xc3}, {&(0x7f00000054c0)=""/168, 0xa8}, {&(0x7f0000005580)=""/128, 0x80}], 0x3, &(0x7f0000005640)=""/243, 0xf3}, 0x8000}, {{&(0x7f0000005740)=@l2, 0x80, &(0x7f0000005940)=[{&(0x7f00000057c0)=""/253, 0xfd}, {&(0x7f00000058c0)=""/127, 0x7f}], 0x2, &(0x7f0000005980)=""/150, 0x96}, 0x8}, {{&(0x7f0000005a40)=@in={0x2, 0x0, @initdev}, 0x80, &(0x7f0000005d00)=[{&(0x7f0000005ac0)=""/141, 0x8d}, {&(0x7f0000005b80)=""/112, 0x70}, {&(0x7f0000005c00)=""/71, 0x47}, {&(0x7f0000005c80)=""/92, 0x5c}], 0x4, &(0x7f0000005d40)}, 0x34}, {{&(0x7f0000005d80)=@can={0x1d, 0x0}, 0x80, &(0x7f0000006480)=[{&(0x7f0000005e00)=""/181, 0xb5}, {&(0x7f0000005ec0)=""/90, 0x5a}, {&(0x7f0000005f40)=""/189, 0xbd}, {&(0x7f0000006000)=""/176, 0xb0}, {&(0x7f00000060c0)=""/214, 0xd6}, {&(0x7f00000061c0)=""/197, 0xc5}, {&(0x7f00000062c0)=""/154, 0x9a}, {&(0x7f0000006380)=""/250, 0xfa}], 0x8, &(0x7f0000006500)=""/44, 0x2c}, 0x6}, {{&(0x7f0000006540)=@l2={0x1f, 0x0, @fixed}, 0x80, &(0x7f00000066c0)=[{&(0x7f00000065c0)=""/97, 0x61}, {&(0x7f0000006640)=""/126, 0x7e}], 0x2, &(0x7f0000006700)=""/72, 0x48}, 0x646}, {{&(0x7f0000006780)=@ipx, 0x80, &(0x7f0000006880)=[{&(0x7f0000006800)=""/121, 0x79}], 0x1, &(0x7f00000068c0)=""/9, 0x9}, 0x8}], 0x6, 0x2, &(0x7f0000006ac0)={r19, r20+30000000}) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000006c80)=[{{&(0x7f00000008c0)={0x2, 0x4e22, @multicast1}, 0x10, &(0x7f0000000d00)=[{&(0x7f0000000900)="321130953dba7bfaaa9a1bc410097939775970cc425ed1d0a2e9a04c9cb72e0e6687e408a0e8a1991c27680de0dadf1c211651f73b43c64b884c", 0x3a}, {&(0x7f0000000940)="dea5a769b6ae1e798fc363df4d86e96ec1", 0x11}, {&(0x7f0000000980)="46f091c1c19e754c9d637bc89033cef6d8a1a9039d85f41da8c2ce27", 0x1c}, {&(0x7f00000009c0)="02a0d1ba18e49e9200eec5853d183be9ed91c37edb5764070741aa1ba238cb473fcebe7c6499494293aa6f0d35a122e81dad4142fe7016a59dfc209962368509015c2ddcc152dce5729eb76ba261a734756b117640f2bfcbe7747c177034ded2f7c29bbf6aa12169f8133f243aceab99b13657cc9bf5365f71ef7e7f147bb3901978b8225fd0074f12e302266a82dfa48eb4c56a758b858693a319bdd4217c903a891d60999ae8eb15bf8e8083c3fe1747dc102e8fe21a8a04341c7bc89bae184a77dd460c97353a0749", 0xca}, {&(0x7f0000000ac0)="d80f227b9615b2391d587ca8bcee5e70a5314261b030049fc5bb38f376ce2a5a6ef2a9684b20b721ae82", 0x2a}, {&(0x7f0000000b00)="b2c1300edfc8bb4b1ab3c5b8a13cd14b96e8ad9fb6394362d3002ec7541cc73bef1a6a4978b81135950d4679d206f6801ec6277a3c0cd54f63aac2dacf987ff34570eb414968b4817ae8fbb4dba16b", 0x4f}, {&(0x7f0000000b80)="a5cf78ced2df159525879cf363ca8aa37aa1a6f8e7170d45e7116e4f6e62d99227cd6b055c2cf1f8a04e83e399c2cd39f865ebdc4972c123d488ac0dbe87e2908227aa60c0a367c06f264e8e581024284598616c88688ee9a504cca7b740942b5b61414755b8639d3e0ad9f1fe2923147dee0c9c15c227681e688df605a783091b8b8872b9c33cc621965171b7348fbea7b3036e9ac484538b8a2fd3bfa3d2a5ccb9e0635492466ebf1abf66d20f3adf33d4a76a03d91762", 0xb8}, {&(0x7f0000000c40)="259e849c4e785e1c4550a053bb9c6651bd643a5877c28dbcd75095590f43f513dc69acd401f80ff1e16ec0530f9d09ddb1537c6a8c87ec5d5952c5e0256c614f1c36e26f0d001e0f4040562b7d8581a8f8492d2a3a9712997a6ea49a2e7ac4199ce12850c7bbb58b938aab95e99d4c197590197e7ccaf314aad41aa85592", 0x7e}, {&(0x7f0000000cc0)="8d08cf02da1b4e088a8bb4bf93ea2d4a0adf2145c608", 0x16}], 0x9}}, {{&(0x7f0000000dc0)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x41}}, 0x10, &(0x7f0000000f00)=[{&(0x7f0000000e00)="b31c335804603a343809f078cd3f6074d1053e4d5de22887bed36d8ec35d55c7ffe683279885cf1ca2eb71e59b9729e56454b95bfa40875891225f2ff9de1010c377d961a7c6494a1aed72f2df08a706d526618fbda232ebef471308a645317d835abaff64ea277767bc2de75f52d1a159074052834fd2af376e6547922c9b71bb99570b45a72a5253919fc4f2d45942d02822a6c5fb7a96c5a4737d02d3ef16336ce9a49f1cdfe7cb8c5b0af03626bd7a44e015d8d94d4cdcdc42a4c8f6cee0e1d7d143ba11346d9dc81fb8dc626f52", 0xd0}], 0x1}}, {{&(0x7f0000000f40)={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0xb}}, 0x10, &(0x7f0000001fc0)=[{&(0x7f0000000f80)="8a0573", 0x3}, {&(0x7f0000000fc0)="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", 0x1000}], 0x2}}, {{&(0x7f0000002000)={0x2, 0x4e23, @broadcast}, 0x10, &(0x7f0000004140)=[{&(0x7f0000002040)="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", 0x1000}, {&(0x7f0000003040)="0cb07a875c81f46da78a9723029a06b1d3fe76ade1cf5d9cfb061c5f9abdb8515ec81514b2d8261e56627b8b1578d81ac1cbaf16fa82b0dc9b2dd23ad6cb16aa57df3860088ff7829bfb5f58080136300e1ddb0cd760ff5c4ec84fa40ab1463a093df87a75583a972d88ce99f86293ff42984efe118eee5fe2eb8a6859dc0628e83fc62e08a72175865946f11f0696d589a4e4ab2c95b34bf93e0edead0c5092978cce8b725acfc1360da895d4cd9011831dca6f1046b6b12d321fb36be6fcddb542704d3ab15ee4d03c8c710e09a275ce0922aed2ce2184a07f19832b057c3eab9497d8d7404fcdc837574d17cd846da103bc6abd756060807c287a8cec2ef251fbc16e9c90bc4abe4c5aed6e1c72378c2585ad0b6bb8a986789e6fe5b2f7be442ffb82a37b49fa6ae5c62b053a2c5d7eed4ffc2aeb725a42f8a47b6fbb40d825cb2e513629097124b8edb5d2a83f9ff0c61ce04a927592a2e2cada5d4b253294c9cf7aef6837e5b505318ced74f31cd33f7a8a1ee41ba2387b8b2d6a0b9e1c5deed8135eacc2d22ab1f71037a8d1c4788a8dfa48ba881a2f87d7818cfa3e8de964c156f8efc6b707e2bae9765a67658aa83cf701b2861c4130c805e5868298b267713d3c454f14b17f41ca1a198d6ad7ffbc92a26d40a3917e6d2638ff216e14366a793de96bd84ba80be9b01dfc66dabb3df437b132e38db92288b0f6b65d5262bfdce028585630d138aa3882a4ec5626e71d8bc5121d28b869c7bf31b3d6c877b529013172f06803afe7ef366dd849159a89b27d8c9efd4e686bf74553fc7bf788e29c9f51e518c09ca2a9241fc43e9797eacfa286e4a2712b2d0861ef4b506b4e78613f001d1c3a06cd7463fdf8310b77b1494d0433ecd165cb49a6c652e4e9542d6245027204b407a1a542265fe70c05d2950e895efffdeccedb4d5229a4b1ea9589403c24158fdfdf83c22a4dabc57099b7f84c147f5786c59bbd9470a38323b24f3b49b4a50fc9c0687885c531006682cb2aa432ff3ce89aa6214175aa9e2ec539c3e2c6fcd86f8c2dcfd4ab13f9e1970ef03564165987b9f500af93f3a946b04e077269f0354ef75641073a7a1cd2d02396d985894f85a390345f592ec67421cfe9a9e259b52977d062a781e0ea2687f722b5136f8286dbec6c75186ce0ed72c9024b54d5559c7f387bb3f5ff38624658fc00d262403a288fd81670c00006347a8ced4531fc5f9a4a7a997b70d51859e31ae98696baaaeb7f6c2142282c8e1b2d93486e19b3fd6a057604454034e57e19d59f446aa92f775ce51b4b2a155e3bfc9f7fae16edb2be761bec43efc0913528ffd2df07e0693c2ba8f5bf177a406001eede011ab0e3743a8eda67af1e0d42966bdd812f303c34cb0694e2b30914c42e8efccfe3f74c1f4278e6baff37997680c1dd124dd45afb876c5dbe10d550da86d4a73d46d143fd135c653a3b30a04762d523b49ab83b347dd9d9b9a1ec5a0e1573ab8b04ca1aa0bd1d9f3759eb58168f0f8d3b61c6db6176f2d0bbb74b63637062fb01bb7b6b36f8e9d34fd3aad52523fce5d80df7dd4d76efd90557bf15426eb05330a39bea72aa33c46d96a71d91f98ca915fd9ac31ecbfd5161f326fe1a8b560b518a46a29a21ec446a57c2b64099b93146bd811ef4b059727f3cc817811e6abab705074cd99b7baa5ae2c2ff2ede8284211f421bba2066673dae3d39f374291def1a0daddd9f28a026ca8e2c8aae0621cad3807c2d1a00e0bf50044b708798dde23537d2e276f2657cefb8dbaad2b8ecfcccd0c5286d95a18a6beacd23b7bde6f2a22cb4ddbeb1b90883806e07d2d2e92794cd96debba8cc09be5fe2f083ab8ac9c46479a3ac039e0bba076e2538baa5aac7ec64c0c1ff9349d587b191d972d58a13d05308314a9ee4b599e27153a6c6115b43356037a87cc7f81a5a242c9666d60e5cee348e7d2954222a8f38d94736dc7f283f7ba70a8df3330bc8ec7aa36f02ca26119481727f314c19adf63c41697bd310218f069605b04b45347f43e40d069b5a005670634e72b89e0e6f7d1e3d1df83f2fdbb1b2ec6a5ae8f679bacbc7b51e7fdc6535bae2d712c6971d0e5db0b3a9c4f82d4ac16bc85258a9591df7753a7dd0ea82a41e4520f33582644526dd488c65ae2ec8923d90914df4d74a526603e97e8f3b4359d8914bfc1ff622899dedd20c68df85b470d083c3e170f6b0d404d87841d06d950f7c27cba1785b602dbafa019844aa41e55114cfcb9db3358989a1140ca739a7b993816efe3153b684235e6eccda748e09aeb905736946fbe30de39f4149bd9de3b8f79961bcf9504b008e4a916c0d6837ca407c38a5ac84d33aa79ac9fc984641e6de8c2157fb07ded0c9a6888887522e367cb07c1e59384225f73e471978dae6d95b206a587c28bc1bfe79a876454969a631cde17c1fd14fe0b8e2b2da0e761f8311777af00663e1c550e19da763861bd5fe11e0227319af3af94c5e1a1a8e2bc28b099842134f3d32bc9cc49adb169e82e90ab7a1cfffdee24fd83e49aa72ec2053917bd25ace7485450539afa2aa9787cf84ef931f4078b7fa80ea080826da3a5faf4d9076177ba78454a55cd14e546080723b2811394363f1cce40f3710bdd50aef799e559f31555a663c793ddb32247d4f91b5ef39a9274f124b8b8b2e968c2f270c453c302278db797dfcf189a6a117da89e46883190f6407ee3d6fac73f1d2aea2705f522e9b270b5a8afb2c8f176d8f1dfac9d192f2a01dafbad32536e3d05f22d0c520499d682c9f7ec2f5a1dff3b64496eee2fecb78edad36f46f9d8cd0c106bac455adce09f75e59e49c69528eda64f4937566aceb62761f19e2b868eeac081d64dd95824a1adb65b1203e7608c088dc272156d88dbcf234fe2a895621f77a35c00c1dd6227fb4f0fb97dc46084a0b369e21849204216a6e698482a94e67a2fef1cff3227cf2ae34c973ef2d9309096b87eb52f8776fd7497b176f489603d7814fef82d0c99ffbada174a04e22ffc7c3f0bba21bd4e9a280d3166c7d219c45b43e8c267c33b8f2d140fcfe1950109802f61035fbf01c4aeb920006cd6db853e545953d1311fc4c987e55fe88c09e4b56a5e9dcd0af33b39432b4bf10856bc171b14ef4f0606df72448dcd3efe843c869cca82d2d3daa765c1ba6ae997855723ee73ae38d15095abb9f2b3ade080866b33e98905469d2f3f69f268248deb03160fc7145305274eafd71481935186bca6155a6038cc19134533f97f99a9772180505e33c55513533387e67d0ba2402749a060fedd5b9d559c3661b1beebe833a119a7fe6d474a2c9cef4855980bb2f8a1617a009ed6fda0dc8c2f4367a362c4c1cbbc41e0e953c0ab360199a58534da4a7812dd2d2a907e9a51f8e94f4df9ed221926541e8200d98442b6a9d3c02113065f4b74321fc1dc0faf71a375dc99ea00f1a71b7b95095791c3ae761863fa9e1641f89f82fdff50b83a83c2a08773a3ca1f5d73f3637ecacf16f65d93c5f1721b0ab5a754403acf98352df690317f489059aef2008a7bba667e6c147c573023adbc1004a47950447ca68121d0c8dab79c6056d33b860c45def222f3ef0d7fcaafb318e64e64d022ebd23a82bea943b3c90819f446cb96010f749e176ed50db0907e704afb543ff6c27a81cf3a07b2bbc39f0b3def7cd172e3e5fcf6da9c82277cd87002bd236ebc1e3b1acee482cc34ceef3ac2254084a40bee8016b3e3bbf08733e119daccb877008dde970bb50cd8264b49e04f4515df7e53dfcd59d3eead5704316f7450a8a7b02c9ae14eba3a50f2135e8dabf14aa51896ee748ca67d30a28fb6d6a2f2927dff433a92ff789172a3053a15ac1cfdba2adf7498b4d083ffe2d5c98f2131fda6d8007dbe2fad9a5cb603cd2d7a8fcf57d398051f9ba14b0f78015cfea1025f1a63868ec8eb57ec7e78070ff145b44e29cc61f669adeabd9011fafe13ee2eb145890a3e240c35c996e5b49267fc45445267799f798132e5da40838afcd81162fbd2b9df77bef42c319f041ca91c4be9dbb0b53e2fafca9e2defbd1800847cac10ece65e1174c59fa83743fcc317d4720e9332bcbe106b4f724a294f739e4e63d9e8056e29b03b153c40d567a66efe1ffc0ef70ada395bec4678973a274bdc9aa205e0058eb932078fc6fef2aeb6ce8d3597088232fcf1a2dbb26c13fd5499a2173137ea4627ef7b3f0c5ec197cff6b33da3f0dce0282452ebeab5e257303c9b981c23b8c3d6becda6190929d801221b81f99eaa517e50b090bc01780f3d3c6bcf07554b7afc358b5bf11f1cd893aa69f0ee11fc973ce5f602b070a692ff45150654502496f1218e87af7f6ef1776cf9805c7f57c1ea0db7d4919b6bf6a83704dc8785603faaf08b7633ef759b8743cbc96a3ede5bdeff17d9edbf18c1227c80567231e70ef87a822a9e3690439690b28b031fea3d1ef4904f5b503a3b37f8076de0cdb56b57642f087a642d963f244f634e761cdcfecdeba5bab11052fa9ee4d26680b634e1fc07bfe583c519a41d5f8e9802e6e02b3b6984583701afc2157aab70a1d766b5c93671bafd3e493dd93dbe05b14eae39d3eff262ed78ac64787dc3cb7287e895250c7937349621ac560c19ebebf11297b56c14aa4a78ae38a9d9dbae847fe91bb8a1a2a40a8f140077e17465e5c9c82169663ddba7f5cfcb2618593428a4fc1fde689907fa9642bfecff4fd5d8e8d9777521615d68fe80337503c180da3d877f745a7dd86ec8d686778ee8749c94fbd0f60ff37780de16add66e3f5ff907c9b3cb6d9fe0fdb05e7560965cb878ab94f9a60a94258c4a7e7247d63b854133e672e89b7603fdb836807c4a6ed7804736ae3d4e6f9c0550f5a79210222d2dfdcbc12aff8ab9d76a3caee47aa597a4b0660f7029e76cfd845986502e4c74e6246bb5cad3a0c8450a198444240dee2d5fe7d2054b80ab0a60dc87a1a325b363eb0ed95f1020c7da93e79a74748cbac65cc134817b8500715be20e47081209f16aaa549f3523039ce93f6cc5ef60d420b77ceace84641ec7f7e3bdb29f22bc403bf1b79c98728cad4fb5b68e63cc4a1108dd2062ba535eea51d67f5b750b739e9ccf88351b3a7a87410fb24ef70d603b3bbbd82015067f507df612e236963db00781216c41f112946961c107d74c415c8034bfa9ce2e008790af939a66eabced0f9cb6882dba03848dc1db7bd832badd132de42abd3d116ff4606d9558d1e447bfe23729b3724f0190e849736b8a510b89cccae8f4ed49c2988ca93f4aece77eb3a8e081aab82dfd412aea48db315c5f234360460a2ef0f28032018ba214db9398b75bf10db5e4d8a0aff0d704f1abc040d9ccc504cae1e83d9e768f56eb0d710b3ecd3c315108d59b0fff5dc59014e0e195d5be139d6a054cbb54e7715012bb977d3611404f514d1135bcfb6094e3fafe75c5978efb600549a43e34422f3ed1f9adf22cebf187f51bfe2c8b6560e764a13484e449b584f33589b98c2aa581d014476489c2c9110e748e7e04669c7c078838ea979a1da908543497d9610b74e65890031832c61896ca409c82da4cc395b67711e7f98b130214b136ef4d690ce85482a24ea8859bea467ad7fc8dcd6e893380d8371d3b032d284ecea7a2cb7358c53d882878d5db0a211dfd3f9c03559303ad4eeb25c044786bb362c07460829045962bfbcc0e2ca92910be5bea899512da36f49a5099cb45de483210f9322f999c01f4cc4fbea25c14dc72f124ee8fcdd70abee", 0x1000}, {&(0x7f0000004040)="e9d3f21502d9a4a86394c9750b96eebe2642ec0ff88e55f8d72a369727191eb59c219a8d760111408cf09c7c4d5b856c5f3ecd428a2b0fce59b932e2f7da1fc62e3d71a45249d7f62521ef5d3ba075d526e22a24f98fd0ed6494cff05f8edd19118e222311d2712eca7f93fc5830a26bae8be1ab2fb95ab2c7dc37902cd6b91b07a7d499c119e5ddb60654ebc2d2264026401c6f02decada438a43ca2b75517d619e0696d1e82bb8d761a64fd2a382fcf6c9ee94695e3e428039d74d75646896d6ba9c4a8642a48e0652fca257c952954c23a472f4b032f3d95ce29c0d928ed7e110996b60", 0xe5}], 0x3, &(0x7f00000042c0)=[@ip_ttl={{0x14, 0x0, 0x2, 0x2}}, @ip_ttl={{0x14, 0x0, 0x2, 0x9e}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x3}}, @ip_retopts={{0x38, 0x0, 0x7, {[@noop, @timestamp={0x44, 0x24, 0xd0, 0x0, 0x5, [0x7ff, 0x6, 0x5, 0x1f, 0xfffffffc, 0xa74, 0x4f, 0x10001]}, @noop]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x3}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x1}}, @ip_retopts={{0x14, 0x0, 0x7, {[@noop]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r12, @multicast2, @multicast1}}}, @ip_retopts={{0x120, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x44, 0x27, 0x3, 0x8, [{@broadcast, 0x88be}, {@broadcast, 0x1}, {@empty}, {@local, 0x2}, {@multicast1, 0x6}, {@multicast1, 0x400}, {@rand_addr=0x80000000, 0x88aa}, {@multicast2, 0x1}]}, @timestamp={0x44, 0x10, 0xd8, 0x0, 0x8, [0x400, 0x6, 0x9]}, @timestamp={0x44, 0x1c, 0xac, 0x0, 0x8, [0x4bb0, 0x8, 0x8, 0xa670, 0x1, 0x401]}, @cipso={0x86, 0x6b, 0x3, [{0x0, 0xe, "5cc89d5f9a34228834193d18"}, {0x0, 0xf, "699e95fba59a09800f89afc0ca"}, {0x6, 0xd, "3d77f51c4b6bb119f630ba"}, {0x5, 0x3, "de"}, {0x2, 0x11, "f86d16cdadaa88c69a99e9e8140252"}, {0x7, 0x5, "04380c"}, {0x5, 0x6, "862d5855"}, {0x7, 0xd, "f57f0511390d682ddc2fb8"}, {0x7, 0x7, "69939dd677"}, {0x1, 0x8, "81686fd330cd"}]}, @ssrr={0x89, 0xb, 0x55, [@remote, @multicast2]}, @rr={0x7, 0x27, 0xcd, [@loopback, @multicast1, @dev={0xac, 0x14, 0x14, 0x36}, @empty, @local, @multicast1, @rand_addr=0x4, @remote, @local]}]}}}], 0x208}}, {{&(0x7f0000004500)={0x2, 0x4e23, @broadcast}, 0x10, &(0x7f00000046c0)=[{&(0x7f0000004540)="e3b3859de65fb960ae7a1b163bf90a4c5c707c24543733b53374cb0ae8a6f6d28f1d142444dc64a00f017e68a665effdfb4c705515c57c38fede14dcf4bde5a28cf55a8083cd153c4f1190dcf8e4d4c925a1509a814189549837ec6037589f66617f1861b1a7bce36d0308baa27e7ca5d09a9d07bfabe198910e5bb2ace8a52acccbd378b751ec3c70b22b019a29144d73ccb6983add18ab26ac35cf8cccbe1b88ca7130831a986ad8195f363c842a6c522cf4d40ce3022e25f2b78b4b7de601a760a060577da7", 0xc7}, {&(0x7f0000004640)="e5884baa21dbb60b3773cee3deb74bce4c688bf2ee321b10fb4cca2e4c830a2c0181e2e49d0df728ce9724204f3e05ff4de79eb28bfeb6c0f6648108ca5c20b1f45b14a3", 0x44}], 0x2, &(0x7f0000004700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r17, @multicast2, @broadcast}}}, @ip_retopts={{0x3c, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x2c, 0x95, 0x3, 0xa, [{@empty, 0x4}, {@local, 0x6}, {@broadcast}, {@empty, 0x7fff}, {@loopback, 0x1000}]}]}}}, @ip_ttl={{0x14, 0x0, 0x2, 0x80}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x81}}], 0x90}}, {{&(0x7f00000047c0)={0x2, 0x4e23, @broadcast}, 0x10, &(0x7f0000004880)=[{&(0x7f0000004800)="c52b6962c909da18bfed9a86f53fd1f9718631d8697919d7eb04fc9d52f8450bdb5f0cbce019fd5108967338f319ff120e2c87d809d714524d24477bb0ebb03bccaec313aec9c84b018541c3f21b66a378d7bab2124596", 0x57}], 0x1, &(0x7f00000048c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @initdev={0xac, 0x1e, 0x1, 0x0}, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, @ip_retopts={{0x58, 0x0, 0x7, {[@lsrr={0x83, 0x23, 0xc0, [@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1, @loopback, @rand_addr=0xfffff800, @empty, @empty, @empty]}, @lsrr={0x83, 0x23, 0x79, [@multicast1, @broadcast, @broadcast, @empty, @multicast1, @broadcast, @empty, @broadcast]}]}}}], 0x78}}, {{&(0x7f0000004940)={0x2, 0x4e20, @remote}, 0x10, &(0x7f0000004b80)=[{&(0x7f0000004980)="6c1bd8b1f25743ecc12cb22e5dd2ac4cd72d9925dfaefeafd6b2bba198f302041ac96cdf10a31839feb5ca9b16aede4a395d45176a889d8c4284d52581c57892b671806f3189191ff7f97fb7f2fc2519310f5875be9be2dd9ac99d94874269c24a632caa9d8920e7fb1db9de8d12993100c1e94e5ffe88f36226d81401726083a94928bbc5ede55ea753f6cc8f50e067424fa3df17fb0a8ef8f669414ae2bebfb2cf3cada3e5a7bbb0df74c44f0212fe49d8d8294ef240dc7123db4c891e412912024e3d0c19260b054ccfc8", 0xcc}, {&(0x7f0000004a80)="1e9954f06e5748e01735d69a58dfa9eafe836dd32b806c5e2c001d1b178266a02da08f667e85bd0052530e71bcc49f5fd58a610f20f0f3f7db4e9c639beba506699e28b7a622acb8bf961566b73f8d2b260902380a0b3fec6be5685a12ddbb1d91b3b9fafcbe6fa26a32cfbf1df807ce6626748d33cd14793de88d708f6a0405ac1ebb8accc48d6389e0b8b472f256a93b175958dff4fab6cf4701f2e488ce8c71e3d7df7e74658e8bc897c0499cbd31e2d757af243a2a83ac4e4c3d1c542b9b724764fffceab00d5f3cedb0961ce45e61c1d97d56919463ca80edc46d925848", 0xe0}], 0x2, &(0x7f0000004bc0)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0x7c}}], 0x18}}, {{&(0x7f0000004c00)={0x2, 0x4e20, @multicast1}, 0x10, &(0x7f0000004d40)=[{&(0x7f0000004c40)="18c87620789f82634c0472", 0xb}, {&(0x7f0000004c80)="251677149cbf08bbf8a1f22dc5dcc8772f5c3365591e1509ca5926cb3130", 0x1e}, {&(0x7f0000004cc0)="35a92d855fde099ecc44a578491991ca5387410a441e53e7ecb2a58b75b3eda0b5a650433eca109c64200454152fd8fb050a400487f24c22ffc22d859d229125c1f75b0e4637690cbd", 0x49}], 0x3, &(0x7f0000004e00)=[@ip_retopts={{0x20, 0x0, 0x7, {[@ssrr={0x89, 0xf, 0x79, [@remote, @multicast2, @multicast1]}]}}}, @ip_retopts={{0x58, 0x0, 0x7, {[@cipso={0x86, 0x38, 0x1, [{0x5, 0x4, "d071"}, {0x7, 0x10, "25b693e712459ea38068b17e388d"}, {0x7, 0xc, "d88ad3a73a4fb6f0228c"}, {0x0, 0x12, "d6f77b086a401c6f1aadd8b7c5302472"}]}, @noop, @ra={0x94, 0x4}, @noop, @rr={0x7, 0x7, 0xa0, [@multicast1]}]}}}, @ip_retopts={{0x3c, 0x0, 0x7, {[@ra={0x94, 0x4, 0x1}, @timestamp_addr={0x44, 0xc, 0xed, 0x1, 0x0, [{@initdev={0xac, 0x1e, 0x1, 0x0}}]}, @ssrr={0x89, 0xb, 0xf0, [@multicast1, @multicast2]}, @cipso={0x86, 0x10, 0x3, [{0x7, 0xa, "4e589c5fe342d0a5"}]}]}}}, @ip_ttl={{0x14, 0x0, 0x2, 0x7}}, @ip_ttl={{0x14, 0x0, 0x2, 0x7fffffff}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r18, @remote, @empty}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x8}}, @ip_ttl={{0x14, 0x0, 0x2, 0x3}}, @ip_retopts={{0x14, 0x0, 0x7, {[@ra={0x94, 0x4}]}}}], 0x150}}, {{&(0x7f0000004f80)={0x2, 0x4e24, @empty}, 0x10, &(0x7f00000052c0)=[{&(0x7f0000004fc0)="c36d77b9123ae1db5c669b3721832f01b01e8ff051c2157725c89d09395e5c2d3f904cca11950982dc8e7e7e93217ab04950fdcd0f5f3097a9a5cadb5c6f9a809d902adcc7103b1c4a279f70c4ad82a1bc89777a5e8ff5dc158046f51b8760344c755fc4f7d15c00b02bdec6e22edecd503d2e26169f53a1b3dcc2e779dc0d6f9498bde98db0be0d2f97f93c7d15e9c9f94337a843baff86020a1a3c6dfe6a5830fc3cb6235d539d7e19c53f36982c7d7d599432c70aba7cbddf4d86734c71952917840662c1ab7ba18533b6fd21bdbf273689274c3e42ed3b2ec140dd0fe82fa756828d428183049d043eb5280ce5272f356117", 0xf4}, {&(0x7f00000050c0)="cb95f74fa0e11670c4fee7a7e48cc057b328c7150fe3e7c251bc3b9cd4ec789400f06630f45decb460e88b68c49a7f4874562f666a4edfd6a647d05b", 0x3c}, {&(0x7f0000005100)="a04da02f766a3138adf06337f0b27460a26e62b9412ffb60c3b0af768c2fe70814c20f96499e32f23220c34daf3872ba9e3b137e8c03c2e2476cc31634a1bf07f125dfd0e976df82573dd7267040ba4aad0d", 0x52}, {&(0x7f0000005180)="935941d37bedb8a0370f4343a51f74369dbce5c768018736e134c5bca111db95eee3a74e21495289db4365f085747595cda976b59c972a324bf8f82f2c3a9fab0bd8581545c5af1a540bbb7d501e34c731476f3b0bfb19aafc25e15cc539ea2adcd357c07106cfed17491fb6ff0dab58008af6650490de501c852910c7ec80f754ad77439d98f7eb2ba258cbbf02806375f326b8674580bc5a2915462f6ae82eba0053f49435b60d6ea924219223374b03806b5d783f52a20266fc6ff71bdcc58768e62c7771314b9d6d6880ae8ccf", 0xcf}, {&(0x7f0000005280)="7055861e262f9f69c9e37129aace6a2262f4e33f523e01fb8731c304b188c5611f1087fc10e04536c989cdb3", 0x2c}], 0x5, &(0x7f0000006b00)=[@ip_ttl={{0x14, 0x0, 0x2, 0x2}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x5}}, @ip_retopts={{0xa0, 0x0, 0x7, {[@ra={0x94, 0x4, 0x1}, @timestamp={0x44, 0x28, 0x4c, 0x0, 0x8, [0x7, 0x0, 0x4, 0x1f, 0x5, 0x3ff, 0x5, 0x3, 0xf6d2]}, @timestamp={0x44, 0xc, 0xb1, 0x0, 0x0, [0x200, 0x3]}, @ra={0x94, 0x4, 0x1}, @ra={0x94, 0x4, 0x1}, @ssrr={0x89, 0x27, 0x8e, [@initdev={0xac, 0x1e, 0x0, 0x0}, @remote, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast, @dev={0xac, 0x14, 0x14, 0x33}, @multicast2, @loopback, @loopback, @initdev={0xac, 0x1e, 0x1, 0x0}]}, @lsrr={0x83, 0x1b, 0x3d, [@local, @multicast2, @dev={0xac, 0x14, 0x14, 0x11}, @multicast1, @loopback, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @noop, @ssrr={0x89, 0xb, 0xc1, [@loopback, @rand_addr=0x1]}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r21, @multicast2, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, @ip_retopts={{0x68, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x3c, 0xb5, 0x3, 0xa, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x828}, {@broadcast, 0xffffffff}, {@multicast1, 0x6}, {@broadcast, 0x1}, {@empty, 0x9}, {@local, 0x8001}, {@empty, 0x1000}]}, @lsrr={0x83, 0x1b, 0xae, [@empty, @empty, @local, @dev={0xac, 0x14, 0x14, 0x11}, @dev={0xac, 0x14, 0x14, 0x3b}, @initdev={0xac, 0x1e, 0x0, 0x0}]}]}}}], 0x158}}], 0x9, 0x80) getsockname$packet(r10, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) dup(0xffffffffffffffff) r22 = dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_CONGESTION(r22, 0x6, 0xd, &(0x7f0000000180)='lp\x00', 0x3) ioctl$VIDIOC_TRY_FMT(r22, 0xc0d05640, &(0x7f0000000400)={0xa, @raw_data="d456e651514154be56c23a0150374fec800b3363d0f8209aea95ae10a4bfe2bc4a059b555ffe32ee49657c21fdaeec9ff08b45f3c5b652502dd578edc616a43da8fa7411c10cf0be3062500d3923e6f93300ce6e6ca32a13179605ca95c9250023e974040392fcffaac49faad6d6549cb1f2e1c7492ba9a8e2d26787e1872027fbe8577edbc559354f305d4e05c26a2f708bb008ca01368edece7ac1108379664aea7622db8fe0f786d6a4177494b3766d3f6f8e4c69729d1cdef558344c8bab4dfc9bfc6bc56bfa"}) ioctl$BLKTRACESTART(r22, 0x1274, 0x0) r23 = socket(0xa, 0x1, 0x0) r24 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r24, 0x84, 0x1d, &(0x7f000095dff8)=ANY=[@ANYBLOB="fd9aad94", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r23, 0x84, 0x11, &(0x7f0000000100)={r25}, 0x8) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r10, 0x84, 0x6, &(0x7f0000000680)={r25, @in6={{0xa, 0x4e23, 0x800, @loopback, 0x2}}}, 0x84) [ 604.187574][T19402] BPF:[2] ARRAY (anon) [ 604.203452][T19402] BPF:type_id=5 index_type_id=1 nr_elems=63 [ 604.223303][T19402] BPF: 08:18:12 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x305, &(0x7f0000000000)=ANY=[]}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1000000000000038, 0x400000000100) 08:18:12 executing program 5: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x305, &(0x7f0000000000)=ANY=[]}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x100000000000004b, 0x400000000100) [ 604.235347][T19402] BPF:Invalid index [ 604.248638][T19402] BPF: [ 604.248638][T19402] 08:18:12 executing program 0: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [{}], {}, [], {0x10, 0x2}}, 0x2c, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x14404, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r2, 0x0, 0x2000421, 0x1) write(r2, &(0x7f0000000340)='/', 0x1) r3 = dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f0000000180)='lp\x00', 0x3) ioctl$VIDIOC_TRY_FMT(r3, 0xc0d05640, &(0x7f0000000400)={0xa, @raw_data="d456e651514154be56c23a0150374fec800b3363d0f8209aea95ae10a4bfe2bc4a059b555ffe32ee49657c21fdaeec9ff08b45f3c5b652502dd578edc616a43da8fa7411c10cf0be3062500d3923e6f93300ce6e6ca32a13179605ca95c9250023e974040392fcffaac49faad6d6549cb1f2e1c7492ba9a8e2d26787e1872027fbe8577edbc559354f305d4e05c26a2f708bb008ca01368edece7ac1108379664aea7622db8fe0f786d6a4177494b3766d3f6f8e4c69729d1cdef558344c8bab4dfc9bfc6bc56bfa"}) ioctl$TIOCSPTLCK(r3, 0x40045431, &(0x7f0000000040)=0x1) sendfile(r2, r2, &(0x7f0000001000), 0xfec) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r4 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r5, 0x0) chdir(&(0x7f0000000100)='./file0\x00') symlink(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000180)='./file0\x00') 08:18:12 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) r0 = socket(0x1, 0x2, 0x0) getsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000140), &(0x7f0000000100)=0x1002e) fcntl$getownex(r0, 0x10, &(0x7f0000000240)) rt_tgsigqueueinfo(0x0, 0x0, 0x16, &(0x7f00000000c0)) ptrace(0x10, 0x0) ptrace$getregset(0x4204, 0x0, 0x201, &(0x7f00000001c0)={0x0}) r1 = clone3(&(0x7f0000000280)={0x80040000, 0x0, &(0x7f00000000c0), 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) process_vm_writev(r1, &(0x7f0000000780)=[{&(0x7f00000004c0)=""/175, 0xaf}, {0x0}, {0x0}, {0x0}], 0x4, &(0x7f0000000580)=[{&(0x7f0000000ac0)=""/252, 0xfc}, {0x0}, {0x0}], 0x3, 0x0) 08:18:13 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x16, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"/317], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000340)}, 0x42) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0xffffffffa0008000, 0xffffffffffffff3e, 0x0, &(0x7f0000000040)="a34747e865af5cf11e34bdff7a7a5ba0051aae5804d5a05d9b9ff68e12bb4d43a20375ea905795449b957e956aa6", 0x0, 0x401, 0x0, 0x0, 0xfffffffffffffff3}, 0x28) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f0000000240)={0x1ff, 0xc, 0x4, 0x0, 0x27e5, {}, {0x4, 0x8, 0x4, 0x8, 0x7, 0x6, "96669900"}, 0x200007, 0x0, @offset=0x4, 0x9, 0x0, r2}) r4 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000840)=ANY=[@ANYBLOB="9feb010018000000000000007800000078000000020000000f00000007000005080000002a5a00002b960000000800000400000001000000bc0900000800000000000000030000000800000000000000800000000c00000004000000f00c00000e00000002000000000001000a000000040000b80900000000000000000000030000000005000000050000003f000f0000ab"], &(0x7f0000000080)=""/227, 0x92, 0xe3, 0x8}, 0x20) ioctl$EVIOCGLED(r4, 0x80404519, &(0x7f0000000580)=""/250) r5 = socket(0x10, 0x803, 0x0) openat$userio(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/userio\x00', 0x80001, 0x0) r6 = dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_CONGESTION(r6, 0x6, 0xd, &(0x7f0000000180)='lp\x00', 0x3) ioctl$VIDIOC_TRY_FMT(r6, 0xc0d05640, &(0x7f0000000400)={0xa, @raw_data="d456e651514154be56c23a0150374fec800b3363d0f8209aea95ae10a4bfe2bc4a059b555ffe32ee49657c21fdaeec9ff08b45f3c5b652502dd578edc616a43da8fa7411c10cf0be3062500d3923e6f93300ce6e6ca32a13179605ca95c9250023e974040392fcffaac49faad6d6549cb1f2e1c7492ba9a8e2d26787e1872027fbe8577edbc559354f305d4e05c26a2f708bb008ca01368edece7ac1108379664aea7622db8fe0f786d6a4177494b3766d3f6f8e4c69729d1cdef558344c8bab4dfc9bfc6bc56bfa"}) r7 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) epoll_ctl$EPOLL_CTL_ADD(r6, 0x1, r7, &(0x7f0000000800)) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r8 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r8, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x8000}, 0x0) getsockname$packet(r8, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) getsockname$packet(r4, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) ioctl$SNDRV_PCM_IOCTL_HW_PARAMS_OLD(r4, 0xc1004111, &(0x7f0000000700)={0x9, [0x8, 0x7fffffff, 0x8], [{0xaf1, 0x1, 0x1, 0x1}, {0xffffe39e, 0x1ff, 0x1, 0x0, 0x0, 0x1}, {0x400, 0xf0b, 0x1, 0x0, 0x0, 0x1}, {0xb7, 0x7, 0x0, 0x0, 0x1, 0x1}, {0x6, 0x9b, 0x0, 0x1}, {0xf6, 0x1000, 0x0, 0x1, 0x1, 0x1}, {0x2, 0x400, 0x1, 0x1, 0x1}, {0x2, 0x7, 0x1, 0x0, 0x0, 0x1}, {0x0, 0x1, 0x0, 0x0, 0x0, 0x1}, {0xffff8895, 0x8, 0x0, 0x1}, {0x7, 0x8, 0x1, 0x1, 0x0, 0x1}, {0x7fff, 0x7f, 0x1, 0x0, 0x0, 0x1}], 0x80}) r9 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000540)='/dev/cachefiles\x00', 0x408000, 0x0) ioctl$VIDIOC_G_EDID(r9, 0xc0285628, &(0x7f00000006c0)={0x0, 0x1, 0x10000, [], &(0x7f0000000680)=0x9}) dup(0xffffffffffffffff) syz_open_dev$video4linux(&(0x7f0000000300)='/dev/v4l-subdev#\x00', 0x1, 0x301000) r10 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r10, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r10, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r11 = dup(r10) setsockopt$inet_tcp_TCP_CONGESTION(r11, 0x6, 0xd, &(0x7f0000000180)='lp\x00', 0x3) connect$bt_sco(r3, &(0x7f0000000500), 0x8) ioctl$BLKTRACESTART(r11, 0x1274, 0x0) 08:18:13 executing program 5: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x305, &(0x7f0000000000)=ANY=[]}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x100000000000004c, 0x400000000100) 08:18:13 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x305, &(0x7f0000000000)=ANY=[]}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1000000000000039, 0x400000000100) 08:18:13 executing program 0: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [{}], {}, [], {0x10, 0x2}}, 0x2c, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) getsockopt$bt_sco_SCO_OPTIONS(r1, 0x11, 0x1, &(0x7f0000000000)=""/99, &(0x7f0000000180)=0x63) chown(&(0x7f00000001c0)='./file0\x00', r3, 0x0) chdir(&(0x7f0000000100)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') [ 604.715823][T19666] BPF:Invalid string section 08:18:13 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) r0 = socket(0x1, 0x2, 0x0) getsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000140), &(0x7f0000000100)=0x1002e) fcntl$getownex(r0, 0x10, &(0x7f0000000240)) rt_tgsigqueueinfo(0x0, 0x0, 0x16, &(0x7f00000000c0)) ptrace(0x10, 0x0) ptrace$getregset(0x4204, 0x0, 0x201, &(0x7f00000001c0)={0x0}) r1 = clone3(&(0x7f0000000280)={0x80040000, 0x0, &(0x7f00000000c0), 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) process_vm_writev(r1, &(0x7f0000000780)=[{&(0x7f00000004c0)=""/175, 0xaf}, {0x0}, {0x0}, {0x0}], 0x4, &(0x7f0000000580)=[{&(0x7f0000000ac0)=""/252, 0xfc}, {0x0}, {0x0}], 0x3, 0x0) 08:18:13 executing program 5: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x305, &(0x7f0000000000)=ANY=[]}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x100000000000004d, 0x400000000100) 08:18:13 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x305, &(0x7f0000000000)=ANY=[]}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x100000000000003a, 0x400000000100) 08:18:13 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x16, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000340)}, 0x42) r3 = dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f0000000180)='lp\x00', 0x3) ioctl$VIDIOC_TRY_FMT(r3, 0xc0d05640, &(0x7f0000000400)={0xa, @raw_data="d456e651514154be56c23a0150374fec800b3363d0f8209aea95ae10a4bfe2bc4a059b555ffe32ee49657c21fdaeec9ff08b45f3c5b652502dd578edc616a43da8fa7411c10cf0be3062500d3923e6f93300ce6e6ca32a13179605ca95c9250023e974040392fcffaac49faad6d6549cb1f2e1c7492ba9a8e2d26787e1872027fbe8577edbc559354f305d4e05c26a2f708bb008ca01368edece7ac1108379664aea7622db8fe0f786d6a4177494b3766d3f6f8e4c69729d1cdef558344c8bab4dfc9bfc6bc56bfa"}) ioctl$NBD_DISCONNECT(r3, 0xab08) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0xffffffffa0008000, 0xffffffffffffff3e, 0x0, &(0x7f0000000040)="a34747e865af5cf11e34bdff7a7a5ba0051aae5804d5a05d9b9ff68e12bb4d43a20375ea905795449b957e956aa6", 0x0, 0x401, 0x0, 0x0, 0xfffffffffffffff3}, 0x28) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f0000000240)={0x1ff, 0xc, 0x4, 0x0, 0x27e5, {}, {0x4, 0x8, 0x4, 0x8, 0x7, 0x6, "96669900"}, 0x7, 0x0, @fd=r0, 0x9, 0x0, r2}) r4 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) clone(0xa0c0100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="9feb0100180000000000000024000000240000000200000000000000000000040900004000000000000000030000000005000000010000003f0000000000"], &(0x7f0000000080)=""/236, 0x3e, 0xec, 0x8}, 0x20) ioctl$EVIOCGLED(r4, 0x80404519, &(0x7f0000000580)=""/250) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) dup(0xffffffffffffffff) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r7 = accept4$nfc_llcp(r6, &(0x7f0000000500), &(0x7f0000000300)=0x60, 0x0) ioctl$FIBMAP(r7, 0x1, &(0x7f0000000680)=0x5) openat$md(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/md0\x00', 0x4000, 0x0) r8 = dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_CONGESTION(r8, 0x6, 0xd, &(0x7f0000000180)='lp\x00', 0x3) ioctl$VIDIOC_TRY_FMT(r8, 0xc0d05640, &(0x7f0000000400)={0xa, @raw_data="d456e651514154be56c23a0150374fec800b3363d0f8209aea95ae10a4bfe2bc4a059b555ffe32ee49657c21fdaeec9ff08b45f3c5b652502dd578edc616a43da8fa7411c10cf0be3062500d3923e6f93300ce6e6ca32a13179605ca95c9250023e974040392fcffaac49faad6d6549cb1f2e1c7492ba9a8e2d26787e1872027fbe8577edbc559354f305d4e05c26a2f708bb008ca01368edece7ac1108379664aea7622db8fe0f786d6a4177494b3766d3f6f8e4c69729d1cdef558344c8bab4dfc9bfc6bc56bfa"}) ioctl$BLKTRACESTART(r8, 0x1274, 0x0) 08:18:13 executing program 5: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x305, &(0x7f0000000000)=ANY=[]}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x100000000000004e, 0x400000000100) [ 605.007098][T19726] BPF:[2] ARRAY (anon) [ 605.021870][T19726] BPF:type_id=5 index_type_id=1 nr_elems=63 08:18:13 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x305, &(0x7f0000000000)=ANY=[]}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x100000000000003b, 0x400000000100) 08:18:13 executing program 0: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000000)={{}, {}, [{}], {}, [], {0x10, 0x3}}, 0x2c, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r3, 0x0) chdir(&(0x7f0000000100)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') [ 605.049877][T19726] BPF: [ 605.063148][T19726] BPF:Invalid index [ 605.079067][T19726] BPF: [ 605.079067][T19726] 08:18:13 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) r0 = socket(0x1, 0x2, 0x0) getsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000140), &(0x7f0000000100)=0x1002e) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f00000000c0)) ptrace(0x10, r1) ptrace$getregset(0x4204, r1, 0x201, &(0x7f00000001c0)={0x0}) r2 = clone3(&(0x7f0000000280)={0x80040000, 0x0, &(0x7f00000000c0), 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) process_vm_writev(r2, &(0x7f0000000780)=[{&(0x7f00000004c0)=""/175, 0xaf}, {0x0}, {0x0}, {0x0}], 0x4, &(0x7f0000000580)=[{&(0x7f0000000ac0)=""/252, 0xfc}, {0x0}, {0x0}], 0x3, 0x0) 08:18:13 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x16, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000340)}, 0x42) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0xffffffffa0008000, 0x2e, 0x0, &(0x7f0000000040)="a34747e865af5cf11e34bdff7a7a5ba0051aae5804d5a05d9b9ff68e12bb4d43a20375ea905795449b957e956aa6", 0x0, 0x401, 0x0, 0x0, 0xf1, &(0x7f0000000000), &(0x7f0000000680)="9563eb3b054b06ae04deef72b672b1138a19f924002c8d1098eefd66723323710e5b87d78f865dd4626c3e441e3a94de91d1afafd0a14cac2a48c851c0d4e2df8d1601fd6599733bc57d244b847ecec6cbabe49c160d3f45c7aeec2977a2d7d6df9ef9147ee81f220bd9b50432383cca09d674d615f6f2c658c2dc4b65a4c7eae02cca4107476cc1ef1e41a9dcc6e2c6ff814bd11022bd816734ea4b6f9b77c4585aa185b3b0798c2c4779b6574b55a2a00d9fe813c468e72bf7a23b15f0025c494f649de5a01ad6b354ffe8ad9412d2949c19f14a5d2f60a7297118aef52d6f1cfb348961f9d6b8f866e9e8e8ea6bc069"}, 0x40) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f0000000240)={0x1ff, 0xc, 0x4, 0x0, 0x27e5, {}, {0x4, 0x8, 0x4, 0x8, 0x7, 0x6, "96669900"}, 0x7, 0x0, @fd=r0, 0x9, 0x0, r2}) r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@struct={0x0, 0x0, 0x0, 0x4, 0x0, 0x9}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x1, 0x3f}}]}}, &(0x7f0000000080)=""/236, 0x3e, 0xec, 0x8}, 0x20) ioctl$EVIOCGLED(r3, 0x80404519, &(0x7f0000000580)=""/250) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) open(&(0x7f00000002c0)='./file0\x00', 0x10000, 0x0) ioctl$sock_SIOCDELDLCI(0xffffffffffffffff, 0x8981, &(0x7f0000000300)={'lo\x00', 0x5}) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) dup(0xffffffffffffffff) r5 = dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_CONGESTION(r5, 0x6, 0xd, &(0x7f0000000180)='lp\x00', 0x3) ioctl$VIDIOC_TRY_FMT(r5, 0xc0d05640, &(0x7f0000000400)={0xa, @raw_data="d456e651514154be56c23a0150374fec800b3363d0f8209aea95ae10a4bfe2bc4a059b555ffe32ee49657c21fdaeec9ff08b45f3c5b652502dd578edc616a43da8fa7411c10cf0be3062500d3923e6f93300ce6e6ca32a13179605ca95c9250023e974040392fcffaac49faad6d6549cb1f2e1c7492ba9a8e2d26787e1872027fbe8577edbc559354f305d4e05c26a2f708bb008ca01368edece7ac1108379664aea7622db8fe0f786d6a4177494b3766d3f6f8e4c69729d1cdef558344c8bab4dfc9bfc6bc56bfa"}) ioctl$BLKTRACESTART(r5, 0x1274, 0x0) 08:18:13 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x305, &(0x7f0000000000)=ANY=[]}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x100000000000003c, 0x400000000100) 08:18:13 executing program 5: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x305, &(0x7f0000000000)=ANY=[]}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x100000000000004f, 0x400000000100) 08:18:14 executing program 0: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [{}], {}, [], {0x10, 0x2}}, 0x2c, 0x0) r0 = timerfd_create(0x7, 0x80800) r1 = accept4$bt_l2cap(0xffffffffffffffff, &(0x7f0000000340)={0x1f, 0x0, @none}, &(0x7f0000000380)=0xe, 0x800) r2 = openat$random(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/urandom\x00', 0x800, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) poll(&(0x7f0000000000)=[{r0, 0x404}, {r1, 0x4}, {r2, 0x452}, {r3, 0x8000}], 0x4, 0x8001) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r7, 0x0) chdir(&(0x7f0000000100)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') [ 605.516050][T19951] BPF:[2] ARRAY (anon) [ 605.539533][T19951] BPF:type_id=5 index_type_id=1 nr_elems=63 [ 605.561293][T19951] BPF: [ 605.564226][T19951] BPF:Invalid index 08:18:14 executing program 5: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x305, &(0x7f0000000000)=ANY=[]}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1000000000000050, 0x400000000100) 08:18:14 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x305, &(0x7f0000000000)=ANY=[]}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x100000000000003d, 0x400000000100) [ 605.601812][T19951] BPF: [ 605.601812][T19951] 08:18:14 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) r0 = socket(0x1, 0x2, 0x0) getsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000140), &(0x7f0000000100)=0x1002e) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f00000000c0)) ptrace(0x10, r1) ptrace$getregset(0x4204, r1, 0x201, &(0x7f00000001c0)={0x0}) r2 = clone3(&(0x7f0000000280)={0x80040000, 0x0, &(0x7f00000000c0), 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) process_vm_writev(r2, &(0x7f0000000780)=[{&(0x7f00000004c0)=""/175, 0xaf}, {0x0}, {0x0}, {0x0}], 0x4, &(0x7f0000000580)=[{&(0x7f0000000ac0)=""/252, 0xfc}, {0x0}, {0x0}], 0x3, 0x0) 08:18:14 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x16, 0xe, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000340)}, 0x42) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0xffffffffa0008000, 0xffffffffffffff3e, 0x0, &(0x7f0000000040)="a34747e865af5cf11e34bdff7a7a5ba0051aae5804d5a05d9b9ff68e12bb4d43a20375ea905795449b957e956aa6", 0x0, 0x401, 0x0, 0x0, 0xfffffffffffffff3}, 0x28) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f0000000240)={0x1ff, 0xc, 0x4, 0x0, 0x27e5, {}, {0x4, 0x8, 0x4, 0x8, 0x7, 0x6, "96669900"}, 0x7, 0x0, @fd=r0, 0x9, 0x0, r2}) r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="9feb010018000000000000002400000024000000020000000000000000000004090000000000000000003f0000000000"], &(0x7f0000000080)=""/236, 0x3e, 0xec, 0x8}, 0x20) ioctl$EVIOCGLED(r3, 0x80404519, &(0x7f0000000580)=""/250) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) ioctl$VIDIOC_G_MODULATOR(0xffffffffffffffff, 0xc0445636, &(0x7f00000002c0)={0x88, "a0344b2232911329d983f4437ccb7a36970e2f3a43ffb545e1335005a548bab4", 0x8, 0x1, 0x5, 0x4, 0x3}) dup(0xffffffffffffffff) r5 = dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_CONGESTION(r5, 0x6, 0xd, &(0x7f0000000180)='lp\x00', 0x3) ioctl$VIDIOC_TRY_FMT(r5, 0xc0d05640, &(0x7f0000000400)={0xa, @raw_data="d456e651514154be56c23a0150374fec800b3363d0f8209aea95ae10a4bfe2bc4a059b555ffe32ee49657c21fdaeec9ff08b45f3c5b652502dd578edc616a43da8fa7411c10cf0be3062500d3923e6f93300ce6e6ca32a13179605ca95c9250023e974040392fcffaac49faad6d6549cb1f2e1c7492ba9a8e2d26787e1872027fbe8577edbc559354f305d4e05c26a2f708bb008ca01368edece7ac1108379664aea7622db8fe0f786d6a4177494b3766d3f6f8e4c69729d1cdef558344c8bab4dfc9bfc6bc56bfa"}) ioctl$BLKTRACESTART(r5, 0x1274, 0x0) 08:18:14 executing program 0: perf_event_open(&(0x7f0000000100)={0x2000000005, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000000)={0x2}, 0x8, 0x0) 08:18:14 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x305, &(0x7f0000000000)=ANY=[]}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x100000000000003e, 0x400000000100) 08:18:14 executing program 5: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x305, &(0x7f0000000000)=ANY=[]}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1000000000000051, 0x400000000100) [ 605.999609][T20198] BPF:[2] Invalid btf_info:3f0000 08:18:14 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="7000000002060100000000800000000000000000120003006269746d61703a69702c6d61630000000900020073797a3000000000240007800c00018008000140000000000c00028008000140000000000800064000000000050001000700000005000400000000000500050002000000"], 0x70}}, 0x0) 08:18:14 executing program 5: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x305, &(0x7f0000000000)=ANY=[]}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1000000000000052, 0x400000000100) 08:18:14 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) r0 = socket(0x1, 0x2, 0x0) getsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000140), &(0x7f0000000100)=0x1002e) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f00000000c0)) ptrace(0x10, r1) ptrace$getregset(0x4204, r1, 0x201, &(0x7f00000001c0)={0x0}) r2 = clone3(&(0x7f0000000280)={0x80040000, 0x0, &(0x7f00000000c0), 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) process_vm_writev(r2, &(0x7f0000000780)=[{&(0x7f00000004c0)=""/175, 0xaf}, {0x0}, {0x0}, {0x0}], 0x4, &(0x7f0000000580)=[{&(0x7f0000000ac0)=""/252, 0xfc}, {0x0}, {0x0}], 0x3, 0x0) 08:18:14 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x305, &(0x7f0000000000)=ANY=[]}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1000000000000041, 0x400000000100) 08:18:14 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x16, 0x0, &(0x7f0000000380)=ANY=[@ANYRES16=0x0], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000340)={0x0, 0x5}, 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0xffffffffa0008000, 0xffffffffffffff3e, 0x0, &(0x7f0000000040)="a34747e865af5cf11e34bdff7a7a5ba0051aae5804d5a05d9b9ff68e12bb4d43a20375ea905795449b957e956aa6", 0x0, 0x401, 0x0, 0x0, 0xfffffffffffffff3}, 0x28) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f0000000240)={0x1ff, 0xc, 0x4, 0x0, 0x27e5, {}, {0x4, 0x8, 0x4, 0x8, 0x7, 0x6, "96669900"}, 0x7, 0x0, @fd=r0, 0x9, 0x0, r2}) r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@struct={0x0, 0x0, 0x0, 0x4, 0x0, 0x9}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x1, 0x3f}}]}}, &(0x7f0000000080)=""/236, 0x3e, 0xec, 0x8}, 0x20) ioctl$EVIOCGLED(r3, 0x80404519, &(0x7f0000000580)=""/250) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) dup(0xffffffffffffffff) r5 = dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_CONGESTION(r5, 0x6, 0xd, &(0x7f0000000180)='lp\x00', 0x3) ioctl$VIDIOC_TRY_FMT(r5, 0xc0d05640, &(0x7f0000000400)={0xa, @raw_data="d456e651514154be56c23a0150374fec800b3363d0f8209aea95ae10a4bfe2bc4a059b555ffe32ee49657c21fdaeec9ff08b45f3c5b652502dd578edc616a43da8fa7411c10cf0be3062500d3923e6f93300ce6e6ca32a13179605ca95c9250023e974040392fcffaac49faad6d6549cb1f2e1c7492ba9a8e2d26787e1872027fbe8577edbc559354f305d4e05c26a2f708bb008ca01368edece7ac1108379664aea7622db8fe0f786d6a4177494b3766d3f6f8e4c69729d1cdef558344c8bab4dfc9bfc6bc56bfa"}) ioctl$BLKTRACESTART(r5, 0x1274, 0x0) 08:18:14 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="7000000002060100000000800000000000000000120003006269746d61703a69702c6d61630000000900020073797a3000000000240007800c00018008000140000000000c00028008000140000000000800064000000000050001000700000005000400000000000500050002000000"], 0x70}}, 0x0) 08:18:14 executing program 5: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x305, &(0x7f0000000000)=ANY=[]}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1000000000000053, 0x400000000100) [ 606.377752][T20396] BPF:[2] ARRAY (anon) [ 606.417311][T20396] BPF:type_id=5 index_type_id=1 nr_elems=63 [ 606.423262][T20396] BPF: 08:18:15 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x305, &(0x7f0000000000)=ANY=[]}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1000000000000042, 0x400000000100) [ 606.482352][T20396] BPF:Invalid index [ 606.528186][T20396] BPF: [ 606.528186][T20396] 08:18:15 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) r0 = socket(0x1, 0x2, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000240)) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f00000000c0)) ptrace(0x10, r1) ptrace$getregset(0x4204, r1, 0x201, &(0x7f00000001c0)={0x0}) r2 = clone3(&(0x7f0000000280)={0x80040000, 0x0, &(0x7f00000000c0), 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) process_vm_writev(r2, &(0x7f0000000780)=[{&(0x7f00000004c0)=""/175, 0xaf}, {0x0}, {0x0}, {0x0}], 0x4, &(0x7f0000000580)=[{&(0x7f0000000ac0)=""/252, 0xfc}, {0x0}, {0x0}], 0x3, 0x0) 08:18:15 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="7000000002060100000000800000000000000000120003006269746d61703a69702c6d61630000000900020073797a3000000000240007800c00018008000140000000000c00028008000140000000000800064000000000050001000700000005000400000000000500050002000000"], 0x70}}, 0x0) 08:18:15 executing program 5: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x305, &(0x7f0000000000)=ANY=[]}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1000000000000054, 0x400000000100) 08:18:15 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x305, &(0x7f0000000000)=ANY=[]}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1000000000000043, 0x400000000100) 08:18:15 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x16, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000340)}, 0x42) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0xffffffffa0008000, 0xffffffffffffff3e, 0x0, &(0x7f0000000040)="a34747e865af5cf11e34bdff7a7a5ba0051aae5804d5a05d9b9ff68e12bb4d43a20375ea905795449b957e956aa6", 0x0, 0x401, 0x0, 0x0, 0xfffffffffffffff3}, 0x28) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f0000000240)={0x1ff, 0xc, 0x4, 0x0, 0x27e5, {}, {0x4, 0x8, 0x4, 0x8, 0x7, 0x6, "96669900"}, 0x7, 0x0, @fd=r0, 0x9, 0x0, r2}) r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) clone(0x178c1300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="9feb010018000000303a00002400000024000000020000000000000000000004090000090000e300000000030000000005000000010000003f0000000000"], &(0x7f0000000080)=""/236, 0x3e, 0xec, 0x8}, 0x20) ioctl$EVIOCGLED(r3, 0x80404519, &(0x7f0000000580)=""/250) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) dup(0xffffffffffffffff) r5 = dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_CONGESTION(r5, 0x6, 0xd, &(0x7f0000000180)='lp\x00', 0x3) ioctl$VIDIOC_TRY_FMT(r5, 0xc0d05640, &(0x7f0000000400)={0xa, @raw_data="d456e651514154be56c23a0150374fec800b3363d0f8209aea95ae10a4bfe2bc4a059b555ffe32ee49657c21fdaeec9ff08b45f3c5b652502dd578edc616a43da8fa7411c10cf0be3062500d3923e6f93300ce6e6ca32a13179605ca95c9250023e974040392fcffaac49faad6d6549cb1f2e1c7492ba9a8e2d26787e1872027fbe8577edbc559354f305d4e05c26a2f708bb008ca01368edece7ac1108379664aea7622db8fe0f786d6a4177494b3766d3f6f8e4c69729d1cdef558344c8bab4dfc9bfc6bc56bfa"}) ioctl$BLKTRACESTART(r5, 0x1274, 0x0) 08:18:15 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="7000000002060100000000800000000000000000120003006269746d61703a69702c6d61630000000900020073797a3000000000240007800c00018008000140000000000c00028008000140000000000800064000000000050001000700000005000400000000000500050002000000"], 0x70}}, 0x0) 08:18:15 executing program 5: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x305, &(0x7f0000000000)=ANY=[]}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1000000000000055, 0x400000000100) 08:18:15 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x305, &(0x7f0000000000)=ANY=[]}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1000000000000044, 0x400000000100) [ 607.019225][T20657] BPF:Unsupported section found 08:18:15 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) r0 = socket(0x1, 0x2, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000240)) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f00000000c0)) ptrace(0x10, r1) ptrace$getregset(0x4204, r1, 0x201, &(0x7f00000001c0)={0x0}) r2 = clone3(&(0x7f0000000280)={0x80040000, 0x0, &(0x7f00000000c0), 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) process_vm_writev(r2, &(0x7f0000000780)=[{&(0x7f00000004c0)=""/175, 0xaf}, {0x0}, {0x0}, {0x0}], 0x4, &(0x7f0000000580)=[{&(0x7f0000000ac0)=""/252, 0xfc}, {0x0}, {0x0}], 0x3, 0x0) 08:18:15 executing program 0: sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="7000000002060100000000800000000000000000120003006269746d61703a69702c6d61630000000900020073797a3000000000240007800c00018008000140000000000c00028008000140000000000800064000000000050001000700000005000400000000000500050002000000"], 0x70}}, 0x0) [ 607.214985][ C1] ================================================================== [ 607.223530][ C1] BUG: KASAN: slab-out-of-bounds in bitmap_ipmac_gc+0x119/0x590 [ 607.231277][ C1] Read of size 8 at addr ffff888098492b00 by task syz-executor.1/9677 [ 607.239443][ C1] [ 607.241788][ C1] CPU: 1 PID: 9677 Comm: syz-executor.1 Not tainted 5.5.0-rc7-syzkaller #0 [ 607.250527][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 607.260587][ C1] Call Trace: [ 607.263876][ C1] [ 607.266740][ C1] dump_stack+0x197/0x210 [ 607.271196][ C1] ? bitmap_ipmac_gc+0x119/0x590 [ 607.276165][ C1] print_address_description.constprop.0.cold+0xd4/0x30b [ 607.283203][ C1] ? bitmap_ipmac_gc+0x119/0x590 [ 607.288154][ C1] ? bitmap_ipmac_gc+0x119/0x590 [ 607.293108][ C1] __kasan_report.cold+0x1b/0x41 [ 607.298092][ C1] ? bitmap_ipmac_gc+0x119/0x590 [ 607.303052][ C1] kasan_report+0x12/0x20 [ 607.307397][ C1] check_memory_region+0x134/0x1a0 [ 607.312521][ C1] __kasan_check_read+0x11/0x20 [ 607.317493][ C1] bitmap_ipmac_gc+0x119/0x590 [ 607.322409][ C1] call_timer_fn+0x1ac/0x780 [ 607.327016][ C1] ? bitmap_ipmac_list+0x1080/0x1080 [ 607.332319][ C1] ? msleep_interruptible+0x150/0x150 [ 607.337701][ C1] ? run_timer_softirq+0x6b1/0x1790 [ 607.343095][ C1] ? trace_hardirqs_on+0x67/0x240 [ 607.348742][ C1] ? bitmap_ipmac_list+0x1080/0x1080 [ 607.354179][ C1] ? bitmap_ipmac_list+0x1080/0x1080 [ 607.360711][ C1] run_timer_softirq+0x6c3/0x1790 [ 607.365867][ C1] ? add_timer+0x930/0x930 [ 607.370318][ C1] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 607.376490][ C1] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 607.382054][ C1] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 607.388056][ C1] ? trace_hardirqs_on+0x67/0x240 [ 607.393099][ C1] __do_softirq+0x262/0x98c [ 607.397832][ C1] ? sched_clock_cpu+0x1b/0x1b0 [ 607.402847][ C1] irq_exit+0x19b/0x1e0 [ 607.407024][ C1] smp_apic_timer_interrupt+0x1a3/0x610 [ 607.412595][ C1] apic_timer_interrupt+0xf/0x20 [ 607.417538][ C1] [ 607.420501][ C1] RIP: 0010:_raw_spin_unlock_irqrestore+0x90/0xe0 [ 607.426927][ C1] Code: 48 c7 c0 98 33 93 89 48 ba 00 00 00 00 00 fc ff df 48 c1 e8 03 80 3c 10 00 75 39 48 83 3d 6f e7 be 01 00 74 24 48 89 df 57 9d <0f> 1f 44 00 00 bf 01 00 00 00 e8 51 3e 7c f9 65 8b 05 42 d2 2d 78 [ 607.446671][ C1] RSP: 0018:ffffc90002507c80 EFLAGS: 00000282 ORIG_RAX: ffffffffffffff13 [ 607.455103][ C1] RAX: 1ffffffff1326673 RBX: 0000000000000282 RCX: 0000000000000000 [ 607.463088][ C1] RDX: dffffc0000000000 RSI: 0000000000000006 RDI: 0000000000000282 [ 607.471072][ C1] RBP: ffffc90002507c90 R08: ffff88805e12e000 R09: 0000000000000000 [ 607.479060][ C1] R10: 0000000000000000 R11: 0000000000000000 R12: ffffffff8b893688 [ 607.487047][ C1] R13: 1ffff920004a0f98 R14: ffffffff899a3ca0 R15: ffff8880a2e43300 [ 607.495290][ C1] debug_object_active_state+0x28a/0x350 [ 607.501096][ C1] ? debug_object_deactivate+0x320/0x320 [ 607.506763][ C1] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 607.513057][ C1] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 607.518637][ C1] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 607.524741][ C1] ? trace_hardirqs_on+0x67/0x240 [ 607.529790][ C1] ? get_max_files+0x20/0x20 [ 607.534427][ C1] __call_rcu+0x4b/0x740 [ 607.538692][ C1] ? percpu_counter_add_batch+0x13c/0x190 [ 607.544444][ C1] call_rcu+0xb/0x10 [ 607.548578][ C1] __fput+0x4a6/0x890 [ 607.552584][ C1] ____fput+0x16/0x20 [ 607.556612][ C1] task_work_run+0x145/0x1c0 [ 607.561226][ C1] exit_to_usermode_loop+0x316/0x380 [ 607.566537][ C1] do_syscall_64+0x676/0x790 [ 607.571156][ C1] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 607.577058][ C1] RIP: 0033:0x414ec0 [ 607.581086][ C1] Code: 01 f0 ff ff 0f 83 30 1b 00 00 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 83 3d ad 35 66 00 00 75 14 b8 03 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 04 1b 00 00 c3 48 83 ec 08 e8 0a fc ff ff [ 607.601165][ C1] RSP: 002b:00007ffc16055838 EFLAGS: 00000246 ORIG_RAX: 0000000000000003 [ 607.609599][ C1] RAX: 0000000000000000 RBX: 00007ffc16055860 RCX: 0000000000414ec0 [ 607.617777][ C1] RDX: 0000000000000010 RSI: 00007ffc16055ce0 RDI: 0000000000000003 [ 607.625766][ C1] RBP: 000000000071acc0 R08: 0000000000006000 R09: 0000000000004000 [ 607.634355][ C1] R10: 00007ffc16055960 R11: 0000000000000246 R12: 0000000000000003 [ 607.642337][ C1] R13: 0000000000000000 R14: 0000000000000029 R15: 000000000071acc0 [ 607.650682][ C1] [ 607.653013][ C1] Allocated by task 20384: [ 607.657467][ C1] save_stack+0x23/0x90 [ 607.662150][ C1] __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 607.668826][ C1] kasan_kmalloc+0x9/0x10 [ 607.673164][ C1] __kmalloc+0x163/0x770 [ 607.677411][ C1] ip_set_alloc+0x38/0x5e [ 607.681743][ C1] bitmap_ipmac_create+0x4e8/0xa00 [ 607.686857][ C1] ip_set_create+0x6f1/0x1500 [ 607.691560][ C1] nfnetlink_rcv_msg+0xcf2/0xfb0 [ 607.696502][ C1] netlink_rcv_skb+0x177/0x450 [ 607.701552][ C1] nfnetlink_rcv+0x1ba/0x460 [ 607.706146][ C1] netlink_unicast+0x58c/0x7d0 [ 607.711033][ C1] netlink_sendmsg+0x91c/0xea0 [ 607.715852][ C1] sock_sendmsg+0xd7/0x130 [ 607.720570][ C1] ____sys_sendmsg+0x753/0x880 [ 607.725443][ C1] ___sys_sendmsg+0x100/0x170 [ 607.730129][ C1] __sys_sendmsg+0x105/0x1d0 [ 607.734722][ C1] __x64_sys_sendmsg+0x78/0xb0 [ 607.739492][ C1] do_syscall_64+0xfa/0x790 [ 607.744128][ C1] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 607.750132][ C1] [ 607.752466][ C1] Freed by task 9677: [ 607.756457][ C1] save_stack+0x23/0x90 [ 607.760615][ C1] __kasan_slab_free+0x102/0x150 [ 607.765557][ C1] kasan_slab_free+0xe/0x10 [ 607.770061][ C1] kfree+0x10a/0x2c0 [ 607.773961][ C1] kvfree+0x61/0x70 [ 607.777775][ C1] __vunmap+0x6ba/0x950 [ 607.781995][ C1] __vfree+0x41/0xd0 [ 607.785903][ C1] vfree+0x5f/0x90 [ 607.790780][ C1] do_ip6t_get_ctl+0x750/0x960 [ 607.795558][ C1] nf_getsockopt+0x7a/0xd0 [ 607.800080][ C1] ipv6_getsockopt+0x205/0x280 [ 607.805033][ C1] tcp_getsockopt+0x8f/0xe0 [ 607.809551][ C1] sock_common_getsockopt+0x94/0xd0 [ 607.814832][ C1] __sys_getsockopt+0x16d/0x310 [ 607.819688][ C1] __x64_sys_getsockopt+0xbe/0x150 [ 607.824802][ C1] do_syscall_64+0xfa/0x790 [ 607.829451][ C1] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 607.835473][ C1] [ 607.837809][ C1] The buggy address belongs to the object at ffff888098492b00 [ 607.837809][ C1] which belongs to the cache kmalloc-32 of size 32 [ 607.851909][ C1] The buggy address is located 0 bytes inside of [ 607.851909][ C1] 32-byte region [ffff888098492b00, ffff888098492b20) [ 607.864923][ C1] The buggy address belongs to the page: [ 607.870565][ C1] page:ffffea0002612480 refcount:1 mapcount:0 mapping:ffff8880aa4001c0 index:0xffff888098492fc1 [ 607.880984][ C1] raw: 00fffe0000000200 ffffea0002768508 ffffea00025e46c8 ffff8880aa4001c0 [ 607.889586][ C1] raw: ffff888098492fc1 ffff888098492000 000000010000003e 0000000000000000 [ 607.898173][ C1] page dumped because: kasan: bad access detected [ 607.904670][ C1] [ 607.907095][ C1] Memory state around the buggy address: [ 607.913093][ C1] ffff888098492a00: 00 01 fc fc fc fc fc fc fb fb fb fb fc fc fc fc [ 607.921347][ C1] ffff888098492a80: 00 00 00 fc fc fc fc fc fb fb fb fb fc fc fc fc [ 607.929420][ C1] >ffff888098492b00: 04 fc fc fc fc fc fc fc 06 fc fc fc fc fc fc fc [ 607.937948][ C1] ^ [ 607.942460][ C1] ffff888098492b80: fb fb fb fb fc fc fc fc fb fb fb fb fc fc fc fc [ 607.950537][ C1] ffff888098492c00: 00 00 fc fc fc fc fc fc fb fb fb fb fc fc fc fc [ 607.958704][ C1] ================================================================== [ 607.966774][ C1] Disabling lock debugging due to kernel taint [ 607.973045][ C1] Kernel panic - not syncing: panic_on_warn set ... [ 607.979658][ C1] CPU: 1 PID: 9677 Comm: syz-executor.1 Tainted: G B 5.5.0-rc7-syzkaller #0 [ 607.990067][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 608.000125][ C1] Call Trace: [ 608.003415][ C1] [ 608.006283][ C1] dump_stack+0x197/0x210 [ 608.010631][ C1] panic+0x2e3/0x75c [ 608.014537][ C1] ? add_taint.cold+0x16/0x16 [ 608.019221][ C1] ? retint_kernel+0x2b/0x2b [ 608.023885][ C1] ? trace_hardirqs_on+0x5e/0x240 [ 608.028926][ C1] ? bitmap_ipmac_gc+0x119/0x590 [ 608.033869][ C1] end_report+0x47/0x4f [ 608.038047][ C1] ? bitmap_ipmac_gc+0x119/0x590 [ 608.042990][ C1] __kasan_report.cold+0xe/0x41 [ 608.047882][ C1] ? bitmap_ipmac_gc+0x119/0x590 [ 608.052825][ C1] kasan_report+0x12/0x20 [ 608.057167][ C1] check_memory_region+0x134/0x1a0 [ 608.062281][ C1] __kasan_check_read+0x11/0x20 [ 608.067136][ C1] bitmap_ipmac_gc+0x119/0x590 [ 608.071915][ C1] call_timer_fn+0x1ac/0x780 [ 608.076515][ C1] ? bitmap_ipmac_list+0x1080/0x1080 [ 608.081816][ C1] ? msleep_interruptible+0x150/0x150 [ 608.087196][ C1] ? run_timer_softirq+0x6b1/0x1790 [ 608.092495][ C1] ? trace_hardirqs_on+0x67/0x240 [ 608.097527][ C1] ? bitmap_ipmac_list+0x1080/0x1080 [ 608.102991][ C1] ? bitmap_ipmac_list+0x1080/0x1080 [ 608.108464][ C1] run_timer_softirq+0x6c3/0x1790 [ 608.113507][ C1] ? add_timer+0x930/0x930 [ 608.118044][ C1] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 608.124315][ C1] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 608.129984][ C1] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 608.135975][ C1] ? trace_hardirqs_on+0x67/0x240 [ 608.141011][ C1] __do_softirq+0x262/0x98c [ 608.145522][ C1] ? sched_clock_cpu+0x1b/0x1b0 [ 608.150558][ C1] irq_exit+0x19b/0x1e0 [ 608.154874][ C1] smp_apic_timer_interrupt+0x1a3/0x610 [ 608.160435][ C1] apic_timer_interrupt+0xf/0x20 [ 608.165367][ C1] [ 608.168318][ C1] RIP: 0010:_raw_spin_unlock_irqrestore+0x90/0xe0 [ 608.174738][ C1] Code: 48 c7 c0 98 33 93 89 48 ba 00 00 00 00 00 fc ff df 48 c1 e8 03 80 3c 10 00 75 39 48 83 3d 6f e7 be 01 00 74 24 48 89 df 57 9d <0f> 1f 44 00 00 bf 01 00 00 00 e8 51 3e 7c f9 65 8b 05 42 d2 2d 78 [ 608.194433][ C1] RSP: 0018:ffffc90002507c80 EFLAGS: 00000282 ORIG_RAX: ffffffffffffff13 [ 608.203029][ C1] RAX: 1ffffffff1326673 RBX: 0000000000000282 RCX: 0000000000000000 [ 608.211019][ C1] RDX: dffffc0000000000 RSI: 0000000000000006 RDI: 0000000000000282 [ 608.218997][ C1] RBP: ffffc90002507c90 R08: ffff88805e12e000 R09: 0000000000000000 [ 608.227088][ C1] R10: 0000000000000000 R11: 0000000000000000 R12: ffffffff8b893688 [ 608.235416][ C1] R13: 1ffff920004a0f98 R14: ffffffff899a3ca0 R15: ffff8880a2e43300 [ 608.243520][ C1] debug_object_active_state+0x28a/0x350 [ 608.249173][ C1] ? debug_object_deactivate+0x320/0x320 [ 608.254996][ C1] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 608.261323][ C1] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 608.266881][ C1] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 608.272947][ C1] ? trace_hardirqs_on+0x67/0x240 [ 608.278008][ C1] ? get_max_files+0x20/0x20 [ 608.282607][ C1] __call_rcu+0x4b/0x740 [ 608.286856][ C1] ? percpu_counter_add_batch+0x13c/0x190 [ 608.292582][ C1] call_rcu+0xb/0x10 [ 608.296479][ C1] __fput+0x4a6/0x890 [ 608.300481][ C1] ____fput+0x16/0x20 [ 608.304559][ C1] task_work_run+0x145/0x1c0 [ 608.309169][ C1] exit_to_usermode_loop+0x316/0x380 [ 608.314463][ C1] do_syscall_64+0x676/0x790 [ 608.319175][ C1] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 608.325163][ C1] RIP: 0033:0x414ec0 [ 608.329063][ C1] Code: 01 f0 ff ff 0f 83 30 1b 00 00 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 83 3d ad 35 66 00 00 75 14 b8 03 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 04 1b 00 00 c3 48 83 ec 08 e8 0a fc ff ff [ 608.348872][ C1] RSP: 002b:00007ffc16055838 EFLAGS: 00000246 ORIG_RAX: 0000000000000003 [ 608.357503][ C1] RAX: 0000000000000000 RBX: 00007ffc16055860 RCX: 0000000000414ec0 [ 608.365605][ C1] RDX: 0000000000000010 RSI: 00007ffc16055ce0 RDI: 0000000000000003 [ 608.373581][ C1] RBP: 000000000071acc0 R08: 0000000000006000 R09: 0000000000004000 [ 608.381562][ C1] R10: 00007ffc16055960 R11: 0000000000000246 R12: 0000000000000003 [ 608.389537][ C1] R13: 0000000000000000 R14: 0000000000000029 R15: 000000000071acc0 [ 608.399215][ C1] Kernel Offset: disabled [ 608.403561][ C1] Rebooting in 86400 seconds..