ogram 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0, 0x0, 0x0, 0xffff0000}}], 0x2, 0x0) 17:51:39 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x4}, 0x2) 17:51:39 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f00000000007e000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:51:39 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0, 0x0, 0x0, 0xffff80fe}}], 0x2, 0x0) 17:51:39 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x4}, 0x18) 17:51:39 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000184000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:51:39 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffff801, 0x0, @perf_bp={&(0x7f0000000000), 0xdc09}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = fork() perf_event_open(&(0x7f0000000200)={0x0, 0x80, 0x20, 0x5, 0x8, 0x0, 0x0, 0xffff, 0x1010, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1ff, 0x2, @perf_bp={&(0x7f0000000080), 0x1}, 0x401a8, 0x3, 0x9, 0x8, 0x7fffffff, 0x2, 0x2, 0x0, 0x7, 0x0, 0x3}, r1, 0x10, 0xffffffffffffffff, 0x1) r2 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r2, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r3 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r3, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) ioctl$EVIOCGSW(r3, 0x8040451b, &(0x7f0000001540)) r4 = syz_open_dev$tty20(0xc, 0x4, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) ppoll(&(0x7f0000001480)=[{r4, 0x200}, {0xffffffffffffffff, 0xc255}, {r5, 0x208}, {0xffffffffffffffff, 0xa280}, {r2, 0x20, 0x8304}, {0xffffffffffffffff, 0x142}, {r0, 0x40}], 0x7, &(0x7f00000014c0)={0x0, 0x3938700}, &(0x7f0000001500)={[0x583]}, 0x8) 17:51:39 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x4}, 0x1b) 17:51:39 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000186000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:51:39 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0, 0x0, 0x0, 0xffffc0fe}}], 0x2, 0x0) 17:51:39 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0x4000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:51:39 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x300}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:51:39 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0, 0x0, 0x0, 0xfffffdef}}], 0x2, 0x0) 17:51:39 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000189000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:51:39 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x4}, 0x2000009c) 17:51:40 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) ppoll(&(0x7f00000001c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) dup2(r1, r0) splice(0xffffffffffffffff, &(0x7f0000000000)=0x3ff, r0, &(0x7f0000000040)=0x101, 0x2, 0x2) r2 = socket$inet6_udp(0xa, 0x2, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x4}, 0x1c) 17:51:40 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0, 0x0, 0x0, 0xffffff7f}}], 0x2, 0x0) 17:51:40 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f00000000018a000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:51:40 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffff801, 0x0, @perf_bp={&(0x7f0000000000), 0xdc09}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = fork() perf_event_open(&(0x7f0000000200)={0x0, 0x80, 0x20, 0x5, 0x8, 0x0, 0x0, 0xffff, 0x1010, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1ff, 0x2, @perf_bp={&(0x7f0000000080), 0x1}, 0x401a8, 0x3, 0x9, 0x8, 0x7fffffff, 0x2, 0x2, 0x0, 0x7, 0x0, 0x3}, r1, 0x10, 0xffffffffffffffff, 0x1) r2 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r2, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r3 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r3, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) ioctl$EVIOCGSW(r3, 0x8040451b, &(0x7f0000001540)) r4 = syz_open_dev$tty20(0xc, 0x4, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) ppoll(&(0x7f0000001480)=[{r4, 0x200}, {0xffffffffffffffff, 0xc255}, {r5, 0x208}, {0xffffffffffffffff, 0xa280}, {r2, 0x20, 0xf509}, {0xffffffffffffffff, 0x142}, {r0, 0x40}], 0x7, &(0x7f00000014c0)={0x0, 0x3938700}, &(0x7f0000001500)={[0x583]}, 0x8) 17:51:40 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0, 0x0, 0x0, 0xffffffe0}}], 0x2, 0x0) 17:51:40 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f00000000009c000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:51:40 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0, 0x0, 0x0, 0xfffffff5}}], 0x2, 0x0) 17:51:40 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f0000000003ae000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:51:40 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x300}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:51:40 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0x5000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:51:40 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0, 0x0, 0x0, 0xffff00000000}}], 0x2, 0x0) 17:51:40 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f0000000003af000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:51:40 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0, 0x0, 0x0, 0x4000000000000}}], 0x2, 0x0) 17:51:40 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f0000000003b0000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:51:40 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffff801, 0x0, @perf_bp={&(0x7f0000000000), 0xdc09}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = fork() perf_event_open(&(0x7f0000000200)={0x0, 0x80, 0x20, 0x5, 0x8, 0x0, 0x0, 0xffff, 0x1010, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1ff, 0x2, @perf_bp={&(0x7f0000000080), 0x1}, 0x401a8, 0x3, 0x9, 0x8, 0x7fffffff, 0x2, 0x2, 0x0, 0x7, 0x0, 0x3}, r1, 0x10, 0xffffffffffffffff, 0x1) r2 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r2, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r3 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r3, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) ioctl$EVIOCGSW(r3, 0x8040451b, &(0x7f0000001540)) r4 = syz_open_dev$tty20(0xc, 0x4, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) ppoll(&(0x7f0000001480)=[{r4, 0x200}, {0xffffffffffffffff, 0xc255}, {r5, 0x208}, {0xffffffffffffffff, 0xa280}, {r2, 0x20, 0xffff}, {0xffffffffffffffff, 0x142}, {r0, 0x40}], 0x7, &(0x7f00000014c0)={0x0, 0x3938700}, &(0x7f0000001500)={[0x583]}, 0x8) 17:51:40 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0x6000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:51:40 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x4}, 0x1c) r1 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x9, 0x12, 0xffffffffffffffff, 0x8000000) syz_io_uring_setup(0x2bb3, &(0x7f0000000000), &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006dd000/0x3000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000140)=@IORING_OP_OPENAT2={0x1c, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000080)={0x200080}, &(0x7f00000000c0)='./file0\x00', 0x18}, 0x0) syz_io_uring_submit(r1, r3, &(0x7f0000000000)=@IORING_OP_CLOSE={0x13, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x36a6) r4 = socket$nl_audit(0x10, 0x3, 0x9) writev(r4, &(0x7f0000000040)=[{&(0x7f00000000c0)="b1257ea5c3f2ba880b8038197b93216ea2f486861447c3b281ec0080218a6fcc9e9dc17398a49f75d027a612c8ed52a99ebd27ce564476320564335ea28a4a6d19341c03d3af2d702bd448eb59ec99d201c6bf0e3da334f4ee43b8e9ceb2ba0559e9efaa5f5d5716f00fd577f879a0b9e2290b01b503882a7ad29fa28843fe13fa2353b341952306d1ba88b70d76c861c2912c64da4a42805c34eec097aaf0bfa1c00085e22644b04520db795b7152916babbc4c162a92152c41001121c77cb9a9e55f", 0xc3}, {&(0x7f00000001c0)="909bef1af2f3d473b022b59f27970239c5db9f1de91a75d67a204e9327545f542d34c264d832083538763214bf2ba7ad7f64fc63b198235d4c0f0ff2512cff2f1a1f96ffc84b49c9c26e81c415604d3c2371e7b3dee760041fba7b9c778c538d728cc5f0717b4d0befedea1ec7dcfaad69b238c4cc7bc83fd83c743333cdb8c49a6f76f4f950217c6f10ff89fed45960b8c765163a359a0ded6603fa957f9d84a7ad9056d4fbbcd30451c7eb81b86f18469b468ef1d70a2652", 0xb9}], 0x2) 17:51:40 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x300}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:51:40 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0, 0x0, 0x0, 0x10000000000000}}], 0x2, 0x0) 17:51:40 executing program 4: ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000200)=""/11) r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f00000000c0)={'syztnl0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x29, 0x3f, 0x7, 0xfffffffd, 0x20, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @ipv4={'\x00', '\xff\xff', @broadcast}, 0x40, 0x7800, 0x2, 0x1}}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000180)={'syztnl1\x00', &(0x7f0000000100)={'ip6_vti0\x00', r1, 0x2f, 0x2, 0x5, 0x8, 0x8, @local, @empty, 0x0, 0x8, 0xe52, 0x81}}) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x4}, 0x1c) 17:51:40 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f0000000003b1000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:51:41 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0, 0x0, 0x0, 0x100000000000000}}], 0x2, 0x0) 17:51:41 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f0000000000b8000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:51:41 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0, 0x0, 0x0, 0x200000000000000}}], 0x2, 0x0) 17:51:41 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000280)={'sit0\x00'}) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x4}, 0x1c) 17:51:41 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f0000000000b9000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:51:41 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffff801, 0x0, @perf_bp={&(0x7f0000000000), 0xdc09}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = fork() perf_event_open(&(0x7f0000000200)={0x0, 0x80, 0x20, 0x5, 0x8, 0x0, 0x0, 0xffff, 0x1010, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1ff, 0x2, @perf_bp={&(0x7f0000000080), 0x1}, 0x401a8, 0x3, 0x9, 0x8, 0x7fffffff, 0x2, 0x2, 0x0, 0x7, 0x0, 0x3}, r1, 0x10, 0xffffffffffffffff, 0x1) r2 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r2, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r3 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r3, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) ioctl$EVIOCGSW(r3, 0x8040451b, &(0x7f0000001540)) r4 = syz_open_dev$tty20(0xc, 0x4, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) ppoll(&(0x7f0000001480)=[{r4, 0x200}, {0xffffffffffffffff, 0xc255}, {r5, 0x208}, {0xffffffffffffffff, 0xa280}, {r2, 0x20}, {0xffffffffffffffff, 0x142}, {r0, 0x40}], 0x7, &(0x7f00000014c0)={0x0, 0x3938700}, &(0x7f0000001500)={[0x583]}, 0x8) 17:51:41 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f0000000000bc000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:51:41 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0, 0x0, 0x0, 0x300000000000000}}], 0x2, 0x0) 17:51:41 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x300}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:51:41 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4e23, 0x8, @rand_addr=' \x01\x00', 0xc}, 0x1c) 17:51:41 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0x7000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:51:41 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0, 0x0, 0x0, 0x400000000000000}}], 0x2, 0x0) 17:51:41 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f0000000002bc000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:51:41 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x4}, 0x1c) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180), 0xa000, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r3, 0x89f0, &(0x7f0000000240)={'ip6tnl0\x00', &(0x7f00000001c0)={'sit0\x00', 0x0, 0x4, 0x8, 0x7, 0x6, 0x0, @initdev={0xfe, 0x88, '\x00', 0x6, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x700, 0x7800, 0xc50f, 0x9}}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000280)={'sit0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'veth1_to_bridge\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r1, 0x89f7, &(0x7f0000000140)={'sit0\x00', &(0x7f00000000c0)={'syztnl2\x00', r5, 0x16, 0xbc, 0x80, 0x6, 0x8, @dev={0xfe, 0x80, '\x00', 0x38}, @empty, 0x20, 0x20, 0x9, 0x4}}) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000040)={@mcast1, @local, @private2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa2420200, r4}) sendto$inet6(r1, &(0x7f0000000000)="44166e641eb451bafae1cc34f5219c1f7046478549dc8cf483ae9002b35e26ba5bf37c174338c433a0ab3bb74dbcea9bbe09165ac07feb72be9f24decf17ff2694519235389c9e77", 0x48, 0x4001, &(0x7f00000000c0)={0xa, 0x4e22, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x8001}, 0x1c) 17:51:41 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0, 0x0, 0x0, 0x500000000000000}}], 0x2, 0x0) 17:51:41 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f0000000003c1000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:51:41 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0, 0x0, 0x0, 0x600000000000000}}], 0x2, 0x0) 17:51:41 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffff801, 0x0, @perf_bp={&(0x7f0000000000), 0xdc09}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = fork() perf_event_open(&(0x7f0000000200)={0x0, 0x80, 0x20, 0x5, 0x8, 0x0, 0x0, 0xffff, 0x1010, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1ff, 0x2, @perf_bp={&(0x7f0000000080), 0x1}, 0x401a8, 0x3, 0x9, 0x8, 0x7fffffff, 0x2, 0x2, 0x0, 0x7, 0x0, 0x3}, r1, 0x10, 0xffffffffffffffff, 0x1) r2 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r2, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r3 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r3, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) ioctl$EVIOCGSW(r3, 0x8040451b, &(0x7f0000001540)) r4 = syz_open_dev$tty20(0xc, 0x4, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) ppoll(&(0x7f0000001480)=[{r4, 0x200}, {0xffffffffffffffff, 0xc255}, {r5, 0x208}, {0xffffffffffffffff, 0xa280}, {r2, 0x20}, {0xffffffffffffffff, 0x142, 0x3}, {r0, 0x40}], 0x7, &(0x7f00000014c0)={0x0, 0x3938700}, &(0x7f0000001500)={[0x583]}, 0x8) 17:51:41 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f0000000003d6000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:51:41 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x14, &(0x7f0000000000)={@initdev, 0x0}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000140)={'syztnl1\x00', &(0x7f00000000c0)={'ip6_vti0\x00', r1, 0x4, 0x0, 0x7, 0x0, 0x2, @empty, @dev={0xfe, 0x80, '\x00', 0x14}, 0x7, 0x7800, 0xffffffc1, 0x3ff}}) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x4}, 0x1c) 17:51:41 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x300}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:51:41 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0, 0x0, 0x0, 0x700000000000000}}], 0x2, 0x0) 17:51:41 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f00000000c0ed000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:51:41 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0x8000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:51:41 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x4}, 0x1c) sendto$inet6(r0, &(0x7f0000000000)="ff78ee9cb8249a971217dbd0b9af412e401fab7e51", 0x15, 0x8, 0x0, 0x0) socket$inet6(0xa, 0x808, 0x3ff) 17:51:41 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0, 0x0, 0x0, 0x800000000000000}}], 0x2, 0x0) 17:51:41 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f0000000002f0000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:51:41 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x8000, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x4}, 0x1c) r1 = socket$inet6(0xa, 0x80803, 0x5) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@private1={0xfc, 0x1, '\x00', 0x1}, @in6=@private2, 0x0, 0x0, 0x0, 0x0, 0xa, 0x80}, {0x0, 0x0, 0x0, 0x0, 0x2000}, {0x0, 0x800000}, 0x0, 0x0, 0x2}, {{@in=@local, 0x0, 0x2b}, 0x0, @in=@multicast1}}, 0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f00000000c0)={{{@in=@private, @in=@initdev}}, {{@in=@remote}, 0x0, @in6=@private2}}, &(0x7f0000000000)=0xe8) 17:51:41 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffff801, 0x0, @perf_bp={&(0x7f0000000000), 0xdc09}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = fork() perf_event_open(&(0x7f0000000200)={0x0, 0x80, 0x20, 0x5, 0x8, 0x0, 0x0, 0xffff, 0x1010, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1ff, 0x2, @perf_bp={&(0x7f0000000080), 0x1}, 0x401a8, 0x3, 0x9, 0x8, 0x7fffffff, 0x2, 0x2, 0x0, 0x7, 0x0, 0x3}, r1, 0x10, 0xffffffffffffffff, 0x1) r2 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r2, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r3 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r3, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) ioctl$EVIOCGSW(r3, 0x8040451b, &(0x7f0000001540)) r4 = syz_open_dev$tty20(0xc, 0x4, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) ppoll(&(0x7f0000001480)=[{r4, 0x200}, {0xffffffffffffffff, 0xc255}, {r5, 0x208}, {0xffffffffffffffff, 0xa280}, {r2, 0x20}, {0xffffffffffffffff, 0x142, 0x8}, {r0, 0x40}], 0x7, &(0x7f00000014c0)={0x0, 0x3938700}, &(0x7f0000001500)={[0x583]}, 0x8) 17:51:41 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x4}, 0x1c) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r0, 0x4008941a, &(0x7f0000000000)=0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) ppoll(&(0x7f00000001c0)=[{r2}], 0x1, 0x0, 0x0, 0x0) r3 = dup2(r2, r1) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0xe03, 0x64, 0x9, 0x6}) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000000)={'veth1_to_bridge\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r4, 0x89f7, &(0x7f0000000140)={'sit0\x00', &(0x7f00000000c0)={'syztnl2\x00', r5, 0x16, 0xbc, 0x80, 0x6, 0x8, @dev={0xfe, 0x80, '\x00', 0x38}, @empty, 0x20, 0x20, 0x9, 0x4}}) r7 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0xc4000, 0x0) r8 = syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000180)={0x14, r8, 0x1, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r7, &(0x7f0000000380)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000200)={0x64, r8, 0x200, 0x70bd25, 0x25dfdbff, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x50, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}]}, 0x64}, 0x1, 0x0, 0x0, 0x4}, 0x250c8e04860779a5) r9 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100), r3) sendmsg$TIPC_NL_PEER_REMOVE(r7, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x14, r9, 0x4, 0x70bd27, 0x25dfdbfc}, 0x14}, 0x1, 0x0, 0x0, 0x40}, 0x48090) 17:51:41 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000ff8000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:51:41 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0, 0x0, 0x0, 0xf00000000000000}}], 0x2, 0x0) 17:51:42 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x300}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:51:42 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0x9000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:51:42 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f0000000003fa000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:51:42 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0, 0x0, 0x0, 0x1000000000000000}}], 0x2, 0x0) 17:51:42 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f0000000002fe000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:51:42 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0, 0x0, 0x0, 0x1008000000000000}}], 0x2, 0x0) 17:51:42 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffff801, 0x0, @perf_bp={&(0x7f0000000000), 0xdc09}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = fork() perf_event_open(&(0x7f0000000200)={0x0, 0x80, 0x20, 0x5, 0x8, 0x0, 0x0, 0xffff, 0x1010, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1ff, 0x2, @perf_bp={&(0x7f0000000080), 0x1}, 0x401a8, 0x3, 0x9, 0x8, 0x7fffffff, 0x2, 0x2, 0x0, 0x7, 0x0, 0x3}, r1, 0x10, 0xffffffffffffffff, 0x1) r2 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r2, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r3 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r3, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) ioctl$EVIOCGSW(r3, 0x8040451b, &(0x7f0000001540)) r4 = syz_open_dev$tty20(0xc, 0x4, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) ppoll(&(0x7f0000001480)=[{r4, 0x200}, {0xffffffffffffffff, 0xc255}, {r5, 0x208}, {0xffffffffffffffff, 0xa280}, {r2, 0x20}, {0xffffffffffffffff, 0x142, 0x64}, {r0, 0x40}], 0x7, &(0x7f00000014c0)={0x0, 0x3938700}, &(0x7f0000001500)={[0x583]}, 0x8) 17:51:42 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0, 0x0, 0x0, 0x2001001000000000}}], 0x2, 0x0) 17:51:42 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f0000000003fe000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:51:42 executing program 4: ioprio_get$pid(0x3, 0xffffffffffffffff) r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x4}, 0x1c) 17:51:42 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f00000000fffe000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:51:42 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0, 0x0, 0x0, 0x2800000000000000}}], 0x2, 0x0) 17:51:42 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x300}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:51:42 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffff801, 0x0, @perf_bp={&(0x7f0000000000), 0xdc09}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = fork() perf_event_open(&(0x7f0000000200)={0x0, 0x80, 0x20, 0x5, 0x8, 0x0, 0x0, 0xffff, 0x1010, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1ff, 0x2, @perf_bp={&(0x7f0000000080), 0x1}, 0x401a8, 0x3, 0x9, 0x8, 0x7fffffff, 0x2, 0x2, 0x0, 0x7, 0x0, 0x3}, r1, 0x10, 0xffffffffffffffff, 0x1) r2 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r2, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r3 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r3, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) ioctl$EVIOCGSW(r3, 0x8040451b, &(0x7f0000001540)) r4 = syz_open_dev$tty20(0xc, 0x4, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) ppoll(&(0x7f0000001480)=[{r4, 0x200}, {0xffffffffffffffff, 0xc255}, {r5, 0x208}, {0xffffffffffffffff, 0xa280}, {r2, 0x20}, {0xffffffffffffffff, 0x142, 0x300}, {r0, 0x40}], 0x7, &(0x7f00000014c0)={0x0, 0x3938700}, &(0x7f0000001500)={[0x583]}, 0x8) 17:51:42 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0xa000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:51:42 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0, 0x0, 0x0, 0x2900000000000000}}], 0x2, 0x0) 17:51:42 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0, 0x0, 0x0, 0x3f00000000000000}}], 0x2, 0x0) 17:51:42 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f0000000001ff000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:51:42 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100), 0xc000, 0x0) setsockopt$inet6_udp_int(r1, 0x11, 0x6e8d9ad45c701ad9, &(0x7f0000000140)=0x3, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x4}, 0x1c) 17:51:42 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0, 0x0, 0x0, 0x4000000000000000}}], 0x2, 0x0) 17:51:42 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f0000000002ff000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:51:42 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0xb000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:51:42 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0, 0x0, 0x0, 0x6000000000000000}}], 0x2, 0x0) 17:51:42 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000080)=0x14, 0x800) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r3) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000000c0)={{{@in6=@dev={0xfe, 0x80, '\x00', 0x2b}, @in6=@private2, 0x4e22, 0x0, 0x4e24, 0x7, 0x2, 0x80, 0x80, 0x87, r1, r3}, {0x9e, 0x0, 0x10000, 0xc0, 0x1, 0x6, 0x4419, 0x100000001}, {0x621, 0x2, 0x3, 0xffff}, 0x3, 0x6e6bb6, 0x2, 0x0, 0x0, 0x2}, {{@in=@empty, 0x4d3, 0xff}, 0x2, @in6=@loopback, 0x34ff, 0x4, 0x3, 0x9, 0x200, 0x3ff, 0x800}}, 0xe8) sendto$inet6(r0, 0x0, 0x0, 0x404c004, &(0x7f0000000000)={0xa, 0x4e63, 0x4, @local, 0x4}, 0x1c) 17:51:43 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x300}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:51:43 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000fff000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:51:43 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4e23, 0x5, @private1, 0x9}, 0x1c) 17:51:43 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0, 0x0, 0x0, 0x8000000000000000}}], 0x2, 0x0) 17:51:43 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffff801, 0x0, @perf_bp={&(0x7f0000000000), 0xdc09}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = fork() perf_event_open(&(0x7f0000000200)={0x0, 0x80, 0x20, 0x5, 0x8, 0x0, 0x0, 0xffff, 0x1010, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1ff, 0x2, @perf_bp={&(0x7f0000000080), 0x1}, 0x401a8, 0x3, 0x9, 0x8, 0x7fffffff, 0x2, 0x2, 0x0, 0x7, 0x0, 0x3}, r1, 0x10, 0xffffffffffffffff, 0x1) r2 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r2, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r3 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r3, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) ioctl$EVIOCGSW(r3, 0x8040451b, &(0x7f0000001540)) r4 = syz_open_dev$tty20(0xc, 0x4, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) ppoll(&(0x7f0000001480)=[{r4, 0x200}, {0xffffffffffffffff, 0xc255}, {r5, 0x208}, {0xffffffffffffffff, 0xa280}, {r2, 0x20}, {0xffffffffffffffff, 0x142, 0x483}, {r0, 0x40}], 0x7, &(0x7f00000014c0)={0x0, 0x3938700}, &(0x7f0000001500)={[0x583]}, 0x8) 17:51:43 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0xc000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:51:43 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0, 0x0, 0x0, 0xa005000000000000}}], 0x2, 0x0) 17:51:43 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f00000000feff000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:51:43 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x4}, 0x1c) pipe(&(0x7f0000000000)={0xffffffffffffffff}) r2 = socket$inet6(0xa, 0x80803, 0x5) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@multicast1, @in6=@private2, 0x0, 0x0, 0x4, 0x1ff, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local, 0x0, 0x2b}, 0x0, @in6=@private1}}, 0xe8) connect$inet6(r2, &(0x7f00000000c0), 0x1c) r3 = socket$inet6_udp(0xa, 0x2, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000280)={'sit0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000000)={'veth1_to_bridge\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r3, 0x89f7, &(0x7f0000000140)={'sit0\x00', &(0x7f00000000c0)={'syztnl2\x00', r6, 0x16, 0xbc, 0x80, 0x6, 0x8, @dev={0xfe, 0x80, '\x00', 0x38}, @empty, 0x20, 0x20, 0x9, 0x4}}) ioctl$sock_inet6_SIOCADDRT(r3, 0x890b, &(0x7f0000000040)={@mcast1, @local, @private2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa2420200, r5}) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r2, 0x89fb, &(0x7f0000000140)={'sit0\x00', &(0x7f0000000080)={'ip6tnl0\x00', r5, 0x0, 0x7f, 0xad, 0x3, 0x70, @private0, @dev={0xfe, 0x80, '\x00', 0x29}, 0x7800, 0x7800, 0x80000001, 0x6}}) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f00000000c0)={@empty, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private2={0xfc, 0x2, '\x00', 0x1}, 0x8001, 0x6000, 0x3e, 0x100, 0x1ff, 0x100, r5}) 17:51:43 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0, 0x0, 0x0, 0xc805000000000000}}], 0x2, 0x0) 17:51:43 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000020001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:51:43 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0, 0x0, 0x0, 0xe0ffffff00000000}}], 0x2, 0x0) 17:51:43 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x300}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:51:43 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f00000000ffff030001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:51:43 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x40000, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @private0, 0x4}, 0x1c) 17:51:43 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0, 0x0, 0x0, 0xeffdffff00000000}}], 0x2, 0x0) 17:51:43 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffff801, 0x0, @perf_bp={&(0x7f0000000000), 0xdc09}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = fork() perf_event_open(&(0x7f0000000200)={0x0, 0x80, 0x20, 0x5, 0x8, 0x0, 0x0, 0xffff, 0x1010, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1ff, 0x2, @perf_bp={&(0x7f0000000080), 0x1}, 0x401a8, 0x3, 0x9, 0x8, 0x7fffffff, 0x2, 0x2, 0x0, 0x7, 0x0, 0x3}, r1, 0x10, 0xffffffffffffffff, 0x1) r2 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r2, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r3 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r3, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) ioctl$EVIOCGSW(r3, 0x8040451b, &(0x7f0000001540)) r4 = syz_open_dev$tty20(0xc, 0x4, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) ppoll(&(0x7f0000001480)=[{r4, 0x200}, {0xffffffffffffffff, 0xc255}, {r5, 0x208}, {0xffffffffffffffff, 0xa280}, {r2, 0x20}, {0xffffffffffffffff, 0x142, 0x9f5}, {r0, 0x40}], 0x7, &(0x7f00000014c0)={0x0, 0x3938700}, &(0x7f0000001500)={[0x583]}, 0x8) 17:51:43 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0xd000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:51:43 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0, 0x0, 0x0, 0xf5ffffff00000000}}], 0x2, 0x0) 17:51:43 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000040001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:51:43 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x4}, 0x1c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) ppoll(&(0x7f00000001c0)=[{r2}], 0x1, 0x0, 0x0, 0x0) dup2(r2, r1) fcntl$setstatus(r2, 0x4, 0x44400) 17:51:43 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0, 0x0, 0x0, 0xfc00000000000000}}], 0x2, 0x0) 17:51:43 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000080001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:51:43 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0, 0x0, 0x0, 0xfe80000000000000}}], 0x2, 0x0) 17:51:43 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x300}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:51:43 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000004000080001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:51:43 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0, 0x0, 0x0, 0xfe80ffff00000000}}], 0x2, 0x0) 17:51:43 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffff801, 0x0, @perf_bp={&(0x7f0000000000), 0xdc09}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = fork() perf_event_open(&(0x7f0000000200)={0x0, 0x80, 0x20, 0x5, 0x8, 0x0, 0x0, 0xffff, 0x1010, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1ff, 0x2, @perf_bp={&(0x7f0000000080), 0x1}, 0x401a8, 0x3, 0x9, 0x8, 0x7fffffff, 0x2, 0x2, 0x0, 0x7, 0x0, 0x3}, r1, 0x10, 0xffffffffffffffff, 0x1) r2 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r2, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r3 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r3, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) ioctl$EVIOCGSW(r3, 0x8040451b, &(0x7f0000001540)) r4 = syz_open_dev$tty20(0xc, 0x4, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) ppoll(&(0x7f0000001480)=[{r4, 0x200}, {0xffffffffffffffff, 0xc255}, {r5, 0x208}, {0xffffffffffffffff, 0xa280}, {r2, 0x20}, {0xffffffffffffffff, 0x142, 0x6400}, {r0, 0x40}], 0x7, &(0x7f00000014c0)={0x0, 0x3938700}, &(0x7f0000001500)={[0x583]}, 0x8) 17:51:43 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0xe000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:51:43 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0, 0x0, 0x0, 0xfec0ffff00000000}}], 0x2, 0x0) 17:51:43 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f0000000000000c0001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:51:43 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0, 0x0, 0x0, 0xff00000000000000}}], 0x2, 0x0) 17:51:44 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0, 0x0, 0x0, 0xffff000000000000}}], 0x2, 0x0) 17:51:44 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000100001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:51:44 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0x10000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:51:44 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffff801, 0x0, @perf_bp={&(0x7f0000000000), 0xdc09}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = fork() perf_event_open(&(0x7f0000000200)={0x0, 0x80, 0x20, 0x5, 0x8, 0x0, 0x0, 0xffff, 0x1010, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1ff, 0x2, @perf_bp={&(0x7f0000000080), 0x1}, 0x401a8, 0x3, 0x9, 0x8, 0x7fffffff, 0x2, 0x2, 0x0, 0x7, 0x0, 0x3}, r1, 0x10, 0xffffffffffffffff, 0x1) r2 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r2, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r3 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r3, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) ioctl$EVIOCGSW(r3, 0x8040451b, &(0x7f0000001540)) r4 = syz_open_dev$tty20(0xc, 0x4, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) ppoll(&(0x7f0000001480)=[{r4, 0x200}, {0xffffffffffffffff, 0xc255}, {r5, 0x208}, {0xffffffffffffffff, 0xa280}, {r2, 0x20}, {0xffffffffffffffff, 0x142, 0x8304}, {r0, 0x40}], 0x7, &(0x7f00000014c0)={0x0, 0x3938700}, &(0x7f0000001500)={[0x583]}, 0x8) 17:51:44 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x300}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:51:44 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0, 0x0, 0x0, 0xffffff7f00000000}}], 0x2, 0x0) 17:51:44 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x1c) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000280)={'sit0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'veth1_to_bridge\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r2, 0x89f7, &(0x7f0000000140)={'sit0\x00', &(0x7f00000000c0)={'syztnl0\x00', r4, 0x16, 0xbc, 0x80, 0x6, 0x8, @dev={0xfe, 0x80, '\x00', 0x36}, @empty, 0x1, 0x20, 0x9, 0xb94d}}) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000040)={@mcast1, @local, @private2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa2420200, r3}) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(0xffffffffffffffff, 0x89fb, &(0x7f0000000140)={'sit0\x00', &(0x7f0000000080)={'ip6tnl0\x00', r3, 0x0, 0x7f, 0xad, 0x3, 0x70, @private0, @dev={0xfe, 0x80, '\x00', 0x29}, 0x7800, 0x7800, 0x80000001, 0x6}}) getsockname$packet(0xffffffffffffffff, &(0x7f00000026c0)={0x11, 0x0, 0x0}, &(0x7f0000002700)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000002780)={'syztnl0\x00', &(0x7f0000002740)={'gre0\x00', 0x0, 0x7, 0x8, 0x4, 0x9, {{0x7, 0x4, 0x0, 0x3, 0x1c, 0x68, 0x0, 0x7f, 0x2d, 0x0, @dev={0xac, 0x14, 0x14, 0x1a}, @dev={0xac, 0x14, 0x14, 0x2a}, {[@end, @lsrr={0x83, 0x7, 0x75, [@private=0xa010100]}]}}}}}) r7 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000000)={'veth1_to_bridge\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r7, 0x89f7, &(0x7f0000000140)={'sit0\x00', &(0x7f00000000c0)={'syztnl2\x00', r8, 0x16, 0xbc, 0x80, 0x6, 0x8, @dev={0xfe, 0x80, '\x00', 0x38}, @empty, 0x20, 0x20, 0x9, 0x4}}) r10 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0xc4000, 0x0) r11 = syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000004e80)={&(0x7f0000000180)={0x14, r11, 0x1, 0x70bd26, 0x25dfdbfe, {0x3}}, 0x14}, 0x1, 0x0, 0x0, 0x4004014}, 0x40800) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r10, &(0x7f0000000380)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000200)={0x64, r11, 0x200, 0x70bd25, 0x25dfdbff, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x50, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}]}, 0x64}, 0x1, 0x0, 0x0, 0x4}, 0x250c8e04860779a5) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000004d00)=[{{&(0x7f0000000080)={0x2, 0x4e23, @rand_addr=0x64010101}, 0x10, &(0x7f0000001340)=[{&(0x7f00000000c0)="2e1e6d8c9b191c0d76d8bfdc24c9e8987aad3cddc5813e662ce7da2b05f67f515b6619e9f628e462f32a5e18f103266005369f13dee1", 0x36}, {&(0x7f0000000100)="ffaaf56b5693e5bd70b812c6438f0b01c5ae5fdfa20793fc82", 0x19}, {&(0x7f0000000140)="cede4c6177024cb5e80338b50b73157bf688846ed3b8d8b115cd1911d9887641ea001ea24e1a3f8db2444258512e298e33577ebe34e005acf84b175658455cc9f03752ad708547230f539360c5ee14534445cbe7b92ba659f17a3ac2770ba170ea0ddac7cc5d4e53e0f6dcacc533675595222de34f892ad0314a6fb5b23c950ec56e7c51061a912a252de23153ac713eb4669de48c6bfc9e15d2e6b5378583831e1e0346ffeef105b2814b61046148394bd4fa0e97eb5e95cc13293d41d89465e5d121a203682dc1f9ad470adebbb5849c12405d6f13a0adb0910828c39e23a39c97f6461c4b68e721b753477551ddb5f9121d6e7c481ae6", 0xf8}, {&(0x7f0000000240)="21b64c45a39937f4611f54040c07014fc756b948e4b0ab1688dd46251cd8713446cf2acc6e5b2c3f3425589a1179e0f8cc3b18aaf03c1d9cbf65c468a3f20800aac5cea5ca0c677e23df916fe4ffbd885bbdc6c329c2050b3ed1a6419e2d1235acade72b52223275f4f5b5887b6ee496ac578efa939f01f4ab9d5cf4af1aedbcf9d988782f8696a04aad56829304474a938b26274a5b3fa204fc6c3850d136ed55adcd178eca69d2fa20b2a23d768f7113545903eb9ce3312715fc7e2d0006523718db362bb46979ed68908724abf054f18a538749bb1eb252e21349e6a586", 0xdf}, {&(0x7f0000000340)="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", 0x1000}], 0x5, &(0x7f00000013c0)=[@ip_retopts={{0x5c, 0x0, 0x7, {[@timestamp={0x44, 0x28, 0x40, 0x0, 0x8, [0x1, 0x5, 0x2, 0x80000000, 0x9, 0x80000001, 0xfff, 0x3f, 0x20]}, @timestamp_prespec={0x44, 0x24, 0x29, 0x3, 0x8, [{@multicast1, 0x2}, {@loopback, 0x2c}, {@loopback, 0x7}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x8}]}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @multicast2, @rand_addr=0x64010102}}}], 0x80}}, {{&(0x7f0000001440)={0x2, 0x4e23, @loopback}, 0x10, &(0x7f0000002480)=[{&(0x7f0000001480)="ca3b0b7eb2fd0cfd54e2c338e1ec1c54c2f57f60dd304b181fe803594b678694f4684fb132b35b0be2aacf566ce3a69dbab283b9ef528a466c53f544cf8ba65af240fea357c3e8594dbc3569341d058bcec70ee3c47659275fea441d6d56da51a6f4d43e6dee1d238d3fc18ec227f8ccae51981b5d78e9a0900a35879c4effb45d24fef59b815d59b96485f63835bc1a3843de2e4b2118cb22d4b052eabb0e7ed68b96df422720f1e5b078a6d5c0f0bb18845708344c450ebe9ecbde5acc6ea091d9cd971b751185ed586bb583f94323a7f52fb07e2a72aa43f2a30cf1c8e7c757206a0a72ebe686e35e68e7e526f66773a26eef13220b6d770d9ff6feed34af3186054ded6812ae3b756d968dbc0d0169db32fb58f015a9c2edefcb1c06d90ba63475e2b4435222a28b12da59120c0fe1c1939b3a17f91b7209c434c680801ac3e176891d1626dffbb329ec7007799ba12cfb84de7ec576b653be887a55886ac69ebaefba003b5f78855fce46d8558cf5e85ec3df91e6b913c0f38893a68ba85c8f0f254ca9d0db3c9b924c6c5b7d616b235c7315ded7a8585db216b867fe8b3cb9582182ee31ba02150952e0c331d029bc3dc77bfe506824cd417bb344925949e65d406ac1fa15054a8d75b77f221d887a0d4be55494736829e8d5f1b1544965c3899064f7a2f2aed7dbca79c36a5a9b3bccf2622e65db0195e06caecbef94473751ffc371c9a446cf29fc458b52f74bac04c7587900341e775a832ca4c8f2e584768b6c7b271008bca4d9b3c5ca51574463d4adbb53f957c291d562a58e8a36c9e551ca452ec77ec4674174c6d35bc0908bb49e112a8cbb20d19b28e84144d7acabad81ea7c1958798ba07597aa4a5f45ff971f05185b477bdfab36cc6d49f4449a91773a9dc964e2175f6b3944455be048ff78d7ef3d2e31e062d813b66fa26ac6b436fd3724648ec7e634bdf3cd534a9d1c97db1690a4463376a9bb14d8c4fdfaabb59922dea8e55b03a2ab1040abe101bbb954618a1f3bd12ac4b6337f42866fa9cc42ae4dd8ee1f200baecb8c8d43f1d5b17cc3c4c75f29c685884240e6321a0f19831f4a8c793cb52c9f8707199f3f854c097f874312ad83c9b42ce3d01944203d6affee8d892cdd7c70c770e81534f4b6de256b02acc895a19b8d2272c14fd6bf93413757c0a976fc580c022ca4b9f873d5b3a6d51dbb662fa87504e2c5de781cb1bf650128b75f5836e9aa200aa8049e97943e074744a8a74ea3507ed428b4db7127bbe65a5638bd43dc4e0b87e0d4a9715610d22817dde0ec540726d26966159eb7ebf0581e506a52af579c9deea532fc73ed772217413cbc28b96c0d39571dd33b8e160314794efe470ac123c1d93d9c53359f9c6eeea92e546dd0ba074e648a2f9d26b2873e8641189fa39efa8488a3ea07aa8a04d8880a3a0846e56574c4e336c5dad0b10a8ab6586bfd23fa960d6aec4317cdf4effabef8d0ee76dfaa47461e85d1d1886502ecd2b45ede652975d2de6718755f1e8fd1b92d3372a698ec58d0d442de7641590bf6295d3eb4b104246e42cd382c5842ecec53397da37d693c79fa75fe1a01f1819fc1b1e78d37f21de5dedc5cace3032128cf2e9795157fc5a79dfaac20f86d71a0fa94e2a8d56f2e6b7f7d7730b8dd4cce1218f0d9aa1ad739d4d5396a8ca3b3471497b2860877402b720bc1f44738ab968704484b7090af15cc6703c28cd9e60787fe6ba5595c362e830af5af4b46bc483c4f5bb53914db65b718b6fbda27ed74af4d19ba7f2654c75dcf06145f523cb1bb096a523182bfc84f96727139967bd88e52e302fd50da74da0c0d475ac59f8f1d68f7ceaf302f48952873d0979b0affa3b2ef3299fea8d13ec0a3fb4c1b366b143ace88316b2320b75537966acc5b5d467125475815b01c97336ca4fcca9b4cdc5b784ecd35236efbbb09ee58f7c9f306f27803f086e9c4bd0c2381e3b61d6570dbf507caa2f10b7268093a2953cb9110e4638b4bf3a530aa49c342c293fa9312bce3b96768b066c33f27ee2c11ea4efab6d2e94c7fcd7e0ef1909f993419b82ada762aa2b937a62c9bc2204c7d2256b791ac4ce90724ed1d13acab69db7c36865c262080cb84f115de602e6c8f230a53c42f305eaa6aeb37e02f94dbc67cf59a81b67fcf1ddd3fb7b6ed577fb201934d59f80f842df6ad4072adb3adf5be35449b8b3a1fd08c698bde218795580da950412ad10b4b8365e83197617ac5ef77cf5eb93e96232d46f8f047e2828e34d60fb2355210d5562bcb425a101e740763a42cd6990c3b4b76f768e4762fb2220649ff550e5b37216786c8b0f9e817ef9ae27cd2234a37a56e968e948884cf88d1c34f401e7c9c805823e7c728cafa0df9c4828afb78a3c4797388c0059bce8a23f0517095be8bd7f333fb6b7f3019fe3d87785a4f5389f9c7f40d0c92911bd4da691168ad1dbf9e15838947a6246da5f1844e27c2cbafafc1e8c934a419db7b77cb6904fc8faf36036f8c0e190cb95d3523449eda4a36e33ec0714abb378f0d908d4d08bef710484f4b79aa34902a48899795a4699f3343c2144335398d93fd4534b041e59756fe1073818d6cce51a049f8acf663e6e6b03b7d9f2c718968399fc4e9183964ebea8b15ff05a734be3fefdf790466d5d09da5c13db393a69a4c95b5872fd3eae7b0268205af3f3bce42406f41ce053f8b80b68ff9994895f317934cd1af6b21f309e32e398ae1a4ba3b9c0c92d7718aa0bd37ae5b7e32f52558546ae9cae21128c05cacdf2dbccf361b667f699f3ecbe2fad2ae3deac477f90d0430007b4bd63c4db6d3178eef48ae8045b65f18324f0ecb117d8cc371f9f0ffb6d6e8da73b670e0590bac0bf738146f8e34af236b644015f942977a3b2bf60757ecf52deb5a17b5f1305111e4f05147386b0378aa772fb675eb0d99f6b1b381001a44e28e70c32160d6c1ef9f140aca84a15bd0c2b01b4814eed4affafbf15cf40e28dc550d50d2e81bac330837055ed4207a69e856412aa1410357845936518d48d8888993cb7ddd176ef1608964d0913141c24fa477503b05a38d4598497892829913da50c2f069e7265b140d846ae7f1060f458e4e3a01d4761b0c6fd8914a4e41e4e747e1cb8879096b9ca6fc88fc804183d61e5c9eb8c491555c6ef23d6466d478fb76ec49819a5f37d3dc6793ef810323c6827baae44568a013bfd0804494f67e94cfd067eff945b58e6b06e9c33961e452177aea53e2cbb1a7c5c23860e0a445e1f73b3349f5ad17ab5429348fd04745817453dfa9fe3ce4a2ffc52cb149d3b1956a164539ff33b4bd6457a5064e4206ad3e1f850a2a0a65087a908295eea6576071e71fb7a0fdeebbb459278038ac02268cf08f935a65686a984596eb21283961f99f91751aeb38e7afa2bfe923ed4128bdd78d92204da87ef487aa0441722659a5a387c4bc920f5c973993703e78fdf9c101fe6d081498e47c47242fd00a40743179da4f01da1d50caafc771c453a8bab7e4878dc52d9c1137f3913e83b0156dbecf8320bd74d0912bb132ada634dab786f7a3d97a34a7ccc6f3fae0c0306e44ba8b5fd91dcf4944cefb6d8dd66b6809348c07164b7777aab3c35b54ad0344f57bd8d796330f8781dde029b7c980e310c3f10de286e0728ea4612e64904c921bbdc20ab3c18d2c2c51800ae210610601a33628c3c6c3a4adae640d7bee28b5bc1e1e7990b636019d1ce91fb6451112bca087e1614f1b3919b2bcb1137566975c3d41e2c0e56b4958bce07d01ef99d3b190af157c83b4e2ea9a31a2d92e057bb2ebdf3764530fecbd89bf0c4c5f1234d775edb776986c8d0b4df32da1981ace0a4a93ea191a3b1dcfeadb1c44aa39f397b55b1a1b53585f77861c3c0f494cdc3b8535c19ffbb68d26760785c3804500b9e40e0b88c34ab969daa343b547b90e2a7a76608b00d648b55130daece7d076fd93f48d344f39dbb91c5f46bccfbb52afea0015811fb6141ea73cbfdc9530da63521a909c28896cf5731b458f8c417b59fc0c72a841beb34ef53851af68b312149768a64f1b61a1ecfdd2c59fd88ef6d6d10b2521087b5110b4972847ddd27bcc3708725b5b68ddc7605449ff5b8af209f8d4d0d60f67c78d43e64b815abae70cb01deae1fdc90e481ee891c6d5a02f3ec8d5e914b0377247414037f11b35b3b9d271e9626fb918664d0b54faf2b673a6bf95a55874862841647573664e9a405afbda27447e83a6b51480c63e6de39aec3646d135078b400f1945065ffc8b75991213c7e2eca43582ad200cc735a79fa55c6cd2c81ad3a650a26d13822e44b3d02c78e468a098bac5fd7560abf62744a7766d448e0f6d89a568e3d00a0f77750a94728ddaaebcc84b12397b438cab9e9832d53a4d10f81b97a7a6c8ebc466f80150a0e6eddce88a7941f01912e0d7f8cd9ff742c41e65a56fe86b5f9c0a41982b62d9217098802604d30febd54a21c7f6a40f9fa56be2eabba7890c127f3e9ab6fb05b657b781f56bef714bdbcdecd6a5cfbad0ab6f2af660c928caa227dca1d274f098afd754e520ab4fbb251ad1f2d1d84b01a098705634506cc19a0c0472142da0f7f574ad9fdafd1588e9cce5f77e9bde9a0cb0c8dc62959182b5d841942b9b4cc354e9ea76db40bc1e3464783d60794a771bf2d861be41ba6c6bd96a7e159314e26b34a8dff444cf0fac9dfc4ffd631691ffa4bd67a5a019ba0ae4e9befa03918997e66ee410c2a5f31a57ecb3fb3f551189903ce23f5397fcfb898c6483a73d5dfe98c961f53aea5b0fa5d2917278b12be6c3249ddcaa1cdc01e256d48cc12c2c91fefa1fc2cf2f272f575df0822b775b4127ad9fcd4193eb810625841a1034abc72ed7d85dd6ed189854fa9897c36eaef7156ad0eba44020b38fe0016e0e760aec0c1017f4328ec8a3301eb273de9911a12b286599b7d39699f8959d29da4aa75d097638b789996c1d24ff0e6ae8fe77065c3b3be2c14897e2a4b3f2a79b86c098d5bf10fa4a27585856077f5d008460738c5c31b81b77ae3a6917320fd262ade6d40b3eaec996b45f214c103daa396c56f15ce94469b8355d47de574bd78b5b10824b737c25675828ed7fd5f541d4c69123267efe55c804f0a5cc86c60e0738fe2dc5bf90605f5e31a22832c1ef790578d23f1a04634e6d895459a3bdeb5d19cb7e7eea9a510ac7d32827fe4bfa06ba3bfe88a087a69f3936a6cd6884f5b9520afdf0f9b106bcd6782ca4bdb7ef4b82bcc0496f7f049fd8dcfe4cfce837a95b8be0a0e411dbbd52018a88ada165503b2951b280ff5f922ad3e4c949154cff0aaa22512d39a9a3a9e1bac08c423979f01340f331df4095aceb5bbfb509709f552e8851a72a540c2464cf7b59c1626c312fc2cc1fda2315c98034f8daf44d993438c8717cdd07d79dc80b5be90a5bd40345572b408f1b8b30c06494613edea12ee0049136e65af2a102433e5cf22972970cd85ead090ea71d316982aa71410428b07b9901beba74fc6968e32dff1086222bd68f84004acccb389c213ec6d5d2e53a20b1335ed373fb0a86a35607d47c5cbe89e6238ab40b14acbde72201dc849da1aae398622d99ba912259c9a7da0643e346e02f4c4902b75f04912764f44d4a1a86223faa6a60af7eaf90bf759962901fb07e7c8e2eb8be35575f156fcd92e2392370754f2e86c18230d54b748da7403157c11f6ecc9424af063eda9d76e4411fea185108cc592e01e6f35779771f966b99593d4b6b75c0b444", 0x1000}], 0x1, &(0x7f00000024c0)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0x4}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @private=0xa010100, @empty}}}, @ip_retopts={{0x6c, 0x0, 0x7, {[@end, @timestamp_addr={0x44, 0x2c, 0x7, 0x1, 0x3, [{@private=0xa010100, 0xffffffff}, {@loopback, 0x81}, {@loopback, 0xfffffff8}, {@private=0xa010102, 0x8c}, {@local, 0x1b5}]}, @timestamp_prespec={0x44, 0x2c, 0x2b, 0x3, 0x2, [{@multicast2, 0x8}, {@loopback, 0x63}, {@multicast1, 0x8}, {@remote, 0x6}, {@rand_addr=0x64010102, 0x429}]}, @generic={0x82, 0x3, "81"}]}}}], 0xa8}}, {{&(0x7f0000002580)={0x2, 0x4e23, @remote}, 0x10, &(0x7f0000002680)=[{&(0x7f00000025c0)="41b246834bb09cd7a703a92b6105cd4a951e16f8b5bd5c83be5ee8145573c2a49cba2a8139c0f243dc2ba249da4c5e9570abcaf40778906da499c95ffbcb9d49dbe91602dd785c2b6193d456224d89905d14a20fd1d7c758e5853084cdd1a3e9fb09992f212968fa8b246e249b0d53c1c132ffe1cc2e7321e50dcab5c4c39a362e33545d2fd35163fd1b82291091636b420d130ba63d4772382cad2797f3038b78f09ccdfcb5529110d6eed6740d9b6840cf4cdf4ef1b3", 0xb7}], 0x1, &(0x7f0000004f40)=[@ip_retopts={{0x58, 0x0, 0x7, {[@ra={0x94, 0x4}, @timestamp_prespec={0x44, 0xc, 0x67, 0x3, 0xe, [{@multicast2, 0x9}]}, @timestamp={0x44, 0x8, 0xef, 0x0, 0x2, [0x18000000]}, @noop, @ra={0x94, 0x4, 0x1}, @ssrr={0x89, 0xb, 0x56, [@rand_addr=0x64010100, @remote]}, @generic={0x88, 0xb, "67e2d07752480cf4d2"}, @generic={0x86, 0x12, "590e46d51bf1f9e24b626805563e3c91"}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xc0000000}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @initdev={0xac, 0x1e, 0x1, 0x0}, @remote}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x3}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @dev={0xac, 0x14, 0x14, 0xf}, @local}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xbd2}}, @ip_retopts={{0xf8, 0x0, 0x7, {[@noop, @timestamp_addr={0x44, 0x4c, 0x5b, 0x1, 0x9, [{@rand_addr=0x64010101}, {@rand_addr=0x64010100, 0xfffffffc}, {@rand_addr=0x64010102, 0x42}, {@local, 0x80000001}, {@remote, 0x45}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x5}, {@multicast2, 0x7}, {@broadcast, 0x8001}, {@private=0xa010101, 0x4}]}, @ssrr={0x89, 0x17, 0x71, [@rand_addr=0x64010102, @local, @multicast1, @private=0xa010102, @private=0xa010102]}, @noop, @lsrr={0x83, 0x17, 0xac, [@empty, @loopback, @empty, @multicast1, @remote]}, @timestamp_addr={0x44, 0x34, 0xd1, 0x1, 0x2, [{@rand_addr=0x64010102, 0x7}, {@rand_addr=0x64010102, 0x9}, {@rand_addr=0x64010100, 0x6}, {@local, 0x5}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x8}, {@loopback, 0xe7}]}, @lsrr={0x83, 0x17, 0x8a, [@loopback, @local, @local, @dev={0xac, 0x14, 0x14, 0xb}, @private=0xa010100]}, @lsrr={0x83, 0x1f, 0xc8, [@broadcast, @rand_addr=0x64010100, @loopback, @remote, @dev={0xac, 0x14, 0x14, 0x12}, @private=0xa010102, @multicast2]}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x2}}, @ip_tos_u8={{0x11}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @private=0xa010100, @rand_addr=0x64010100}}}], 0x228}}, {{0x0, 0x0, &(0x7f0000002c00)=[{&(0x7f0000002a00)="4eef699d071bf501", 0x8}, {&(0x7f0000002a40)="299ef214275038d4770c5d9d7ba0818e49c516f64fc261df5313d838ffb8b30aaab6d6ad290c9f5bd27b7a37e28bac06b863bb851093fad43c074de373410be87d3471e6f975b8d703c50c6258b653581d503e98522e0b458e7167826d6772b7ce72c7ee2bbcd6cd6dfc7d8de13d860c611e31d61b4903fc47dc53ffcbd92af3244e10a99c14b4ea987aba7efa807e0746d3f5abc73ddbd6ab1bf19b4fade3f5d25e2e73b69116545f4bad63056e49a42a7b2ea87c33da1aa3373cacf1caf228", 0xc0}, {&(0x7f0000002b00)="0034bbbf441584776e74dc3f0a806a1115ae2822c8da7b70d49665ced32f3d7105e0ddacaf999e500c56ddd8f19734a9d678d18535902b692c550e6cc6186c17f9b2b01d4fa1839a73d8e232bb17e15ac97ad2c88242621ceda101b90b2361ca4249da900d360dbca06c2062148ad2b57f59f9cc527f3a691b9e3affd259b39e4d06bc4d67b31a3730711b1775c051d51c13632a16ddb023f04ce7fce34e0b1983a58e93fc60303e2d7f198bd79ae68a01466c3270ce54ddb1b9b5818a390cec701cf4323044b160b73eb2605d9566682ac436035c4294f0a05b0055c251", 0xde}], 0x3, &(0x7f0000002c40)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x100}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x5}}, @ip_ttl={{0x14, 0x0, 0x2, 0x9}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @empty, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x3f}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r8, @rand_addr=0x64010100, @dev={0xac, 0x14, 0x14, 0x3d}}}}, @ip_retopts={{0x48, 0x0, 0x7, {[@rr={0x7, 0xb, 0x1c, [@remote, @empty]}, @timestamp_addr={0x44, 0x2c, 0x4c, 0x1, 0x6, [{@multicast2, 0x4}, {@dev={0xac, 0x14, 0x14, 0x12}, 0x694}, {@broadcast, 0x3ff}, {@local, 0x4}, {@empty, 0x13}]}]}}}, @ip_retopts={{0xd0, 0x0, 0x7, {[@noop, @ssrr={0x89, 0xb, 0x3d, [@multicast1, @private=0xa010101]}, @cipso={0x86, 0x5c, 0x3, [{0x1, 0xb, "473d6b532928c06107"}, {0x84dc1b3bf33e5977, 0x5c, "f82343492c"}, {0x1, 0x4, "c205"}, {0x7, 0xe, "2f629d7c5e12becf739e0c3f"}, {0x0, 0x3, "1c"}, {0x2, 0x8, "24301d3c5cb1"}, {0x0, 0x3, 'Q'}, {0x2, 0xa, "c9ffebba7d2d6832"}, {0x2, 0xe, "b7279a514f34ac76e769ab7a"}, {0x1, 0xc, "24b0de6751e6678fb453"}]}, @generic={0x82, 0x11, "084c9515b1119045a6724511a4a79f"}, @lsrr={0x83, 0x1f, 0xb0, [@loopback, @loopback, @empty, @dev={0xac, 0x14, 0x14, 0x37}, @multicast2, @initdev={0xac, 0x1e, 0x1, 0x0}, @empty]}, @generic={0x86, 0x3, "95"}, @rr={0x7, 0xf, 0x36, [@initdev={0xac, 0x1e, 0x1, 0x0}, @multicast2, @loopback]}, @timestamp_addr={0x44, 0x14, 0xe4, 0x1, 0x4, [{@multicast2, 0x101}, {@multicast2}]}]}}}, @ip_retopts={{0x60, 0x0, 0x7, {[@timestamp={0x44, 0x8, 0x40, 0x0, 0x5, [0x6]}, @timestamp_addr={0x44, 0x2c, 0x15, 0x1, 0x2, [{@remote, 0x5}, {@private=0xa010100, 0x48}, {@private=0xa010102, 0xfffffffa}, {@local, 0x1}, {@local, 0x72f2df6f}]}, @ssrr={0x89, 0x1b, 0x55, [@rand_addr=0x64010100, @dev={0xac, 0x14, 0x14, 0x10}, @dev={0xac, 0x14, 0x14, 0xe}, @multicast1, @multicast2, @empty]}]}}}], 0x218}}, {{&(0x7f0000002e80)={0x2, 0x4e22, @multicast1}, 0x10, &(0x7f0000004500)=[{&(0x7f0000002ec0)="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", 0x1000}, {&(0x7f0000003ec0)="7c35fadc9d4cca7d7a2d25aff3a8661493791844faebd6e69e9fbcb86fb50431aa7dd86b7b957aa7f6cf2c99cdf697eddd74", 0x32}, {&(0x7f0000003f00)="ab70ff14161dbf3388d38fb9681392b4f893e25244527195c342ed010a970794f5f71494cfbc53657cceb966c865e9ef78d4889d1c58f892f771b084dc348c0a91bdd2d577cba2e423b83c7d02e01c015d4550fa644dd372cb00b0b6824ca28ddb01aa83e9e942fc8eed60818e32db37120a0b9dc8b8228d9a48c39fe4e02f0ef27ad86cbb186ec30ff1014e7d1fc4255f5ae7661301458b0600080c2cd928aff366724a7a5b450acb80c7c2c7d1d5bb5910c436607d0050497137861f928b9ae79abeaead75c1d3109e9ce7662d05da37ad003f3165c7f9176249c2841bca0c5912b70986036916239d3727b8d8466fe1", 0xf1}, {&(0x7f0000004000)="68ea88f355ac7e77c85f2974f985165c342079588972086bf260a60425df7fa93c3fcedbfe5cb1f29b18ae0a161bcca73a77753cc429cfefecd869c984fd7903d30613629c951cd7d17990fbf4d6d12e490575dda2a8ff0fa64380fe9f197d7c19f211415a27794682004b6bdd02f37eb670441d9b232a4fe83946a46450b22ab11d4fa0a781efcc0d848e5dbd13fc13b94f80d6f704020d6af845fc0bd1aaf2371a167d7e0ba1f7674ca8983a62ba3d3424d95f436327c940cb76a4ab71d91ee54fbfaf5f1ff17be6535945c396679f7269", 0xd2}, {&(0x7f0000004100)="27d9d8f63ec72765add84ba18da87dee", 0x10}, {&(0x7f0000004140)="340deaa6e04f7facea6f0ff7fa37b35c34", 0x11}, {&(0x7f0000004180)="070021b05620e80e6b0fd33c9877541473af3a86903383d26af21f3f7b90506f7b4360ec37348e1a3eb5aa75d4123771804b63abc343ab5ab230d9e7ed78b5fad49396f9cce96a1ea2d9bc480731d2549f6a9b18c0", 0x55}, {&(0x7f0000004200)="67ce4099b03df426759ccda15ae2d36b748f86739ef2342b6e9f2e949ad9259914eae1e15a14b544fec05437d028050860892434e6efce3b9b78e482e60583cb6f60e8b732f774073145b0196cb2e17747a788de42f603d7b9dea621bddafe3a35bb88a3d7834d06de8b5c1e8a0896a55ff31aa915e35852a655f5c308274b4d9cc0a07fadc18b6b50cf342f5795f786ddd4c6bdb9254db9a23d1994631051b86fefba1930f8334a00c8b692ad2ffb16f70244e0365d5605bc794a9b0c9c2bb48e33d29b0d6e33ad", 0xc8}, {&(0x7f0000004300)="9b039183cc44a2793fd1072b380a3af10e62f8079fb9db9d10a3d9ed6f1e808b95118b3dc2bdfbf35d02b7850f0c8c9d1cfc36ff8dbbda0175214ea0b4f0263d0402487fcb75e54509f9dab1edac8cf801c1d33b5cdd7dfa78d445f65a0aee486bd368b424f6c5dc7cfa081fcb5fcb688eae4664c9312f78110c4fb95238157cb888fa6820618b37b931c3f268de0373fa1ee18f832046b62f21c2f5a2f1375bc014cf1b5961af020aa322ee2b08d109138fcf2532c98a4202e35b87bca25880a7e057c7f2cf8b8dae043c1f487f4de2ed7ed76bee8adfe130b6ff21588b4d3051ae7a8dcf", 0xe5}, {&(0x7f0000004400)="2166d8916dacbb05eab6878f3e7a1fcc84abac01017695982feacb4b8ad37faeb9ee67b4f6448cd85805ef2593f41d7b6f7d992f91e5e285939b0a75f60b55ecd11e8e7fcdbf9e2d7605208237fa70582803140c8c0f2e3cf33de5446b9d8f1699ed756214632baccd37851beabe9424c19a49492d310c782f3650ee7a1288f3cf8b0cb777a56e9a0caf7ec36755cfadc9f5b003f45ff5c43477196407a2ee788042dfa459bcd42e3c44fec2cfeea225e7f726e96805aba5cedcf24d0412a6ba552156ee63411fccf5993a69304342905c1f5967edec5c09d93b94d786bcedbe29f2b197233487", 0xe7}], 0xa, &(0x7f00000045c0)=ANY=[@ANYBLOB="11000000000000000000000001000000200000000000000014000000000000000000000001000000ff0f0000000000001100000000000000000000000100000009000000000000001400000000000000000000000200000001000000000000001c000000000000000000000008000000", @ANYRES32=0x0, @ANYBLOB="64010100e0000002001000001c000000000000000000000008000000", @ANYRES32=0x0, @ANYBLOB="e0000001ac1414aa0000000014000000000000000000000002000000ffffffff00000000140000000000000000000000070000000100000000000000"], 0xd0}}, {{&(0x7f00000046c0)={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x12}}, 0x10, &(0x7f0000004b80)=[{&(0x7f0000004700)="bb30eefd750268badb3594ca53d1cfff77e8a3ecc3e5e6c56e1cc951d880967530dba600377a3a3f508e855919c80659ca49906899d39e702b24082023874c49c7b05fbb525f8c37d3f6c8c5825468221ada283defa855af9897a9797cd6f83103ab97ed418062482daf817abf0f81fc12c16b77a720e1a3", 0x78}, {&(0x7f0000004780)="e3939480fad83085c4ca37b533ab1ec1a81496f4fead67a2184e2b810d1f8f9b18b0f9528a8ba05e4e5e5ff620bf8a653f24c6b854ebb71fa05e09b535ffcb78ac03d039b13f6461148484c18a71748398e02154002985302fe36ffa4c41dfe61c5cc81392f283bd470616728d5757e193dfe741021c695f1980f6797496ad3defbfa101d61339f81e28e872d822039999c25151a9663a085aebffe14aeb9134b523de1fff50256331bc87f6cde7d4f45bbf853c9b60e763353eb19a06c3fc3a875a905d9e89b414dbf36d534d29", 0xce}, {&(0x7f0000004880)="17671325a2cc9f844f467c08a6518ff7576736edb5b6e59e33fbfd4181b62529473c7425a809cc19243cf1bb7130c38e07ce3ebef04fa6b0e245b0f83d510f31f7f6bf2cc810b6a0ae88cbd9f545680bd645a26c2ee3b7909261b375ddaa9b528f5667ed963a1f22b6b42fa3e9b53b683383bc7c8963d184a800f72eb542aa1d05c0a467ee846323e47326e772689a6d00e6cdf9ce06777d33f616b4a26336d5809ee7df888bbe2677495903e977b04881cb444adb57fe379f3de437", 0xbc}, {&(0x7f0000004940)="d413f428dc3dbf9d1b557ba0b698c87cdcea4f81b7f8069a570d81119f6e134b0b915a108eed7bd217f447d3aa8b8c88d3cbb98e172b54359124704664e82bff392fb1fcb63fe1ea2ec33ee253a9a4945ec0dde0cf5591c91487b701573d", 0x5e}, {&(0x7f00000049c0)="c92666add659a2a9831ac16c5d4a08feaaddb1a4014e0903945f7b4249f68add570d28080781b8408380b6db1c457232b8444086dd27cc09003bbf9fcfbd0bea5f3e67bd475621a738e7114b0c8623182887886b992d2760a218fd5c526b30fa78b480ce3ef4da78a589a45bc784263eb186bb7c9873482d5a99a7d2053411ae03f4e47a60701ec6a8b50435433d7be6ced328727fe6da1d866d69198e4fb6d50f39202f02fbf85c415572e403163562a44ca668409fd422a01706122a1b605dfe3e50ab3c29357ec707ce537f5530a7d3a4ed0212abc2d82e67d42a016d2068bb0c", 0xe2}, {&(0x7f0000004ac0)="8b6db5879de5dd11251bbfda308810ef37ff131736160456433d56af1286460a5debb5146901ede972ef3ec1e825b7d3398a5f3079e7a84152a6c883e678128c658348b52f653f3e847de56db5acb1bd1b5dabadd7cedff6a802899acc69e2537dac1b507c4365f15fb56252962c1d732cf455a23628920231af6a549cad307465", 0x81}], 0x6, &(0x7f0000004c00)=[@ip_retopts={{0xac, 0x0, 0x7, {[@lsrr={0x83, 0x23, 0x48, [@empty, @rand_addr=0x64010100, @private=0xa010100, @dev={0xac, 0x14, 0x14, 0x26}, @rand_addr=0x64010101, @remote, @multicast1, @rand_addr=0x64010100]}, @cipso={0x86, 0x2a, 0x3, [{0x5, 0x10, "a05d38832827ae333b2349b394ec"}, {0x5, 0xa, "7ac5896143cc381f"}, {0x1, 0x2}, {0x76907ab6a7a6f388, 0x3, "bb"}, {0x2, 0x5, "876abe"}]}, @timestamp_addr={0x44, 0x4c, 0xdf, 0x1, 0x6, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x5}, {@remote, 0x6}, {@empty, 0x6}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x7}, {@broadcast, 0x5177f2d8}, {@local, 0x800}, {@broadcast, 0x9}, {@dev={0xac, 0x14, 0x14, 0x13}, 0x5}, {@dev={0xac, 0x14, 0x14, 0x32}}]}, @noop]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @rand_addr=0x64010102, @rand_addr=0x64010102}}}, @ip_ttl={{0x14, 0x0, 0x2, 0x2}}], 0xe8}}], 0x6, 0x24040041) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x1}, 0x1c) 17:51:44 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000400001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:51:44 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0, 0x0, 0x0, 0xffffffff00000000}}], 0x2, 0x0) 17:51:44 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0}}], 0x2, 0x0) 17:51:44 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000101000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:51:44 executing program 4: ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f00000000c0)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @struct}, {0x0, @struct, 0x0}}) ioctl$BTRFS_IOC_GET_DEV_STATS(0xffffffffffffffff, 0xc4089434, &(0x7f00000004c0)={r1, 0x0, 0x1, [0x4, 0x9, 0x2, 0xfffffffffffffffb, 0x3], [0x4d73, 0x20, 0xfffffffffffff6fb, 0x6f92, 0x3, 0x80000000, 0x7, 0xca, 0x1, 0x58dc21c, 0x7, 0x80000001, 0xffffffffffffffff, 0x400, 0x9, 0x6e1, 0x7fffffff, 0x31, 0x4, 0x6b, 0x1000, 0x9, 0x0, 0x3, 0x2, 0x9, 0x71a419ce, 0x7fffffff, 0x4, 0x400, 0x100000000, 0xff, 0x488, 0xfffffffffffff800, 0xff, 0xe9a7, 0xfd, 0x1, 0x0, 0x3122, 0xffff, 0x2, 0x8, 0x0, 0x2, 0x3ff, 0x81, 0x20, 0x7, 0x7, 0x5, 0x5862, 0x2, 0xffff, 0x2, 0x2, 0x32, 0x9, 0x100, 0x7, 0x0, 0x100000001, 0x5, 0xfffffffffffff800, 0x45e, 0x20, 0x3, 0x5, 0x1, 0x8001, 0x7, 0x1b5, 0x2, 0x9, 0x6, 0x4, 0x2, 0x3, 0x2, 0x2, 0x20, 0xfffffffffffffff7, 0x4, 0x5, 0x1, 0x2, 0x6, 0x0, 0x8, 0x8, 0xf778, 0xff, 0xc3, 0x5d7, 0x3, 0xffffffff, 0x3, 0x7fff, 0x3, 0x69, 0x4, 0xfff, 0x1, 0xffff, 0x400, 0x6, 0x6, 0x9, 0x2, 0x2, 0x685, 0x9, 0x0, 0x0, 0x2, 0x29aa, 0x80000000, 0x7, 0x6, 0x3d630883, 0x2]}) r3 = dup2(0xffffffffffffffff, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000200)={0x64, 0x0, 0x200, 0x70bd25, 0x25dfdbff, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x50, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}]}, 0x64}, 0x1, 0x0, 0x0, 0x4}, 0x250c8e04860779a5) io_submit(0x0, 0x2, &(0x7f0000001580)=[&(0x7f0000001400)={0x0, 0x0, 0x0, 0x6, 0x4, r3, &(0x7f0000001380)="28116c5bc961a808cbbdd5716c3dea1487cc282b2fc86de06af0948e2e4ad491f2470c80b508ba343dc0bb0f8a6106769af5764be9841f459e3d4ae7d3d041feee6cc89e4cd247b1fc6bd31ceb5653d4674bd8489cb58199c4f0523ded53b9a3dc6f4336a38c7bf764361d", 0x6b, 0x2}, &(0x7f0000001540)={0x0, 0x0, 0x0, 0x7, 0x671e, r3, &(0x7f0000001440)="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", 0xfa, 0x2d2, 0x0, 0x1}]) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='pagemap\x00') r5 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000f80)={0x1, &(0x7f0000000f40)=[{0x7f}]}) r6 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, &(0x7f0000001000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0, 0x0}) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x8914, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc8J,\x00\xd2\x97\x04\x03\xdc\r') ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x8923, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') sendmsg$NLBL_CIPSOV4_C_REMOVE(r9, &(0x7f0000000240)={&(0x7f0000000fc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f0000001740)=ANY=[@ANYBLOB="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", @ANYRES64=r8, @ANYRESHEX, @ANYRES32=r7, @ANYRESOCT, @ANYRES64, @ANYRESHEX=r6], 0x3}, 0x1, 0x0, 0x0, 0x4}, 0x40025) r10 = syz_open_procfs(0x0, &(0x7f0000000040)='pagemap\x00') ioctl$BTRFS_IOC_BALANCE_PROGRESS(r10, 0x84009422, &(0x7f0000002940)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f0000000540)={0x8, 0x0, {0x5, @usage=0x8, 0x0, 0x5, 0x55e, 0x8, 0x3, 0x9, 0x20, @usage, 0xffffff00, 0x7, [0x100000001, 0x20000000, 0x7, 0x1, 0xfffffffffffffffe, 0xa4d]}, {0x2, @usage=0xfffffffffffffffe, 0x0, 0xfffffffffffffbff, 0x3, 0x100000000, 0x8, 0x0, 0x448, @struct={0x3b64, 0x3}, 0x800, 0x7fff, [0xb, 0x4, 0x0, 0x2, 0x0, 0xd71]}, {0x9, @usage=0xe1, r11, 0xe1, 0x4, 0x5, 0x1, 0x3, 0x487, @usage=0x7, 0x2, 0x3, [0xfff, 0xb74, 0x0, 0x101, 0xe2b, 0x8]}, {0x78d, 0x40, 0x3}}) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(r3, 0x5000943f, &(0x7f0000000340)={{r4}, r8, 0x6, @inherit={0x88, &(0x7f0000000100)={0x4645e2ae752c5674, 0x8, 0x7, 0x1, {0x9, 0x20, 0x0, 0x7, 0x2}, [0x3, 0x4, 0x15, 0x6, 0x0, 0x1, 0x0, 0x1]}}, @devid=r11}) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f0000000900)={0x0, 0x1, {0x9, @struct={0x0, 0x1000}, r0, 0x100000000, 0x1, 0x1f, 0x16, 0x2, 0xe1, @usage=0x8, 0x4c72, 0x7, [0x1, 0xfffffffffffffffa, 0x3, 0x6, 0x5, 0x8]}, {0x4, @usage=0x3, r2, 0x0, 0x8, 0xfffffffffffffbff, 0x4, 0x8000, 0x420, @struct={0x1f, 0x8000}, 0x6, 0x20, [0x1ff, 0xffffffffffff7fff, 0x9, 0x100, 0x0, 0x56c]}, {0x5, @usage=0x3, r11, 0x4, 0x4, 0x3, 0x100, 0x2, 0x80, @usage, 0x2000, 0x0, [0x2, 0x1, 0x450343d3, 0x8000, 0x4, 0x6]}, {0x400, 0x80000001, 0x1}}) r12 = socket$inet6_udp(0xa, 0x2, 0x0) sendto$inet6(r12, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x4}, 0x1c) 17:51:44 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}}], 0x2, 0x0) 17:51:44 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000010101000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:51:44 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0x11000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:51:44 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffff801, 0x0, @perf_bp={&(0x7f0000000000), 0xdc09}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = fork() perf_event_open(&(0x7f0000000200)={0x0, 0x80, 0x20, 0x5, 0x8, 0x0, 0x0, 0xffff, 0x1010, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1ff, 0x2, @perf_bp={&(0x7f0000000080), 0x1}, 0x401a8, 0x3, 0x9, 0x8, 0x7fffffff, 0x2, 0x2, 0x0, 0x7, 0x0, 0x3}, r1, 0x10, 0xffffffffffffffff, 0x1) r2 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r2, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r3 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r3, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) ioctl$EVIOCGSW(r3, 0x8040451b, &(0x7f0000001540)) r4 = syz_open_dev$tty20(0xc, 0x4, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) ppoll(&(0x7f0000001480)=[{r4, 0x200}, {0xffffffffffffffff, 0xc255}, {r5, 0x208}, {0xffffffffffffffff, 0xa280}, {r2, 0x20}, {0xffffffffffffffff, 0x142, 0xf509}, {r0, 0x40}], 0x7, &(0x7f00000014c0)={0x0, 0x3938700}, &(0x7f0000001500)={[0x583]}, 0x8) 17:51:44 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x300}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:51:44 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x3}}], 0x2, 0x0) 17:51:44 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f00000000ffff800101000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:51:44 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @dev={0xfe, 0x80, '\x00', 0xa}, 0x4}, 0x1c) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x800c0, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x400, @ipv4={'\x00', '\xff\xff', @empty}, 0x3}, 0x1c) 17:51:44 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}}], 0x2, 0x0) 17:51:44 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000201000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:51:44 executing program 4: socket$nl_netfilter(0x10, 0x3, 0xc) r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x4}, 0x1c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) ppoll(&(0x7f00000001c0)=[{r2}], 0x1, 0x0, 0x0, 0x0) dup2(r2, r1) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x6, 0x50, r2, 0x80648000) 17:51:44 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x5}}], 0x2, 0x0) 17:51:45 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000040201000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:51:45 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6}}], 0x2, 0x0) 17:51:45 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0x12000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:51:45 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffff801, 0x0, @perf_bp={&(0x7f0000000000), 0xdc09}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = fork() perf_event_open(&(0x7f0000000200)={0x0, 0x80, 0x20, 0x5, 0x8, 0x0, 0x0, 0xffff, 0x1010, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1ff, 0x2, @perf_bp={&(0x7f0000000080), 0x1}, 0x401a8, 0x3, 0x9, 0x8, 0x7fffffff, 0x2, 0x2, 0x0, 0x7, 0x0, 0x3}, r1, 0x10, 0xffffffffffffffff, 0x1) r2 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r2, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r3 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r3, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) ioctl$EVIOCGSW(r3, 0x8040451b, &(0x7f0000001540)) r4 = syz_open_dev$tty20(0xc, 0x4, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) ppoll(&(0x7f0000001480)=[{r4, 0x200}, {0xffffffffffffffff, 0xc255}, {r5, 0x208}, {0xffffffffffffffff, 0xa280}, {r2, 0x20}, {0xffffffffffffffff, 0x142, 0xffff}, {r0, 0x40}], 0x7, &(0x7f00000014c0)={0x0, 0x3938700}, &(0x7f0000001500)={[0x583]}, 0x8) 17:51:45 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x300}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:51:45 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000301000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:51:45 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x7}}], 0x2, 0x0) 17:51:45 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000401000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:51:45 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8}}], 0x2, 0x0) 17:51:45 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000501000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:51:45 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x4, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @rand_addr=' \x01\x00', 0x4}, 0x1c) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000000000)=""/32, 0x20}], 0x1, 0xfffffff7, 0xdca) 17:51:45 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0, 0x0, 0x0, 0x0, 0xf}}], 0x2, 0x0) 17:51:45 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000601000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:51:45 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffff801, 0x0, @perf_bp={&(0x7f0000000000), 0xdc09}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = fork() perf_event_open(&(0x7f0000000200)={0x0, 0x80, 0x20, 0x5, 0x8, 0x0, 0x0, 0xffff, 0x1010, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1ff, 0x2, @perf_bp={&(0x7f0000000080), 0x1}, 0x401a8, 0x3, 0x9, 0x8, 0x7fffffff, 0x2, 0x2, 0x0, 0x7, 0x0, 0x3}, r1, 0x10, 0xffffffffffffffff, 0x1) r2 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r2, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r3 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r3, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) ioctl$EVIOCGSW(r3, 0x8040451b, &(0x7f0000001540)) r4 = syz_open_dev$tty20(0xc, 0x4, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) ppoll(&(0x7f0000001480)=[{r4, 0x200}, {0xffffffffffffffff, 0xc255}, {r5, 0x208}, {0xffffffffffffffff, 0xa280}, {r2, 0x20}, {0xffffffffffffffff, 0x142}, {r0, 0x40}], 0x7, &(0x7f00000014c0)={0x0, 0x3938700}, &(0x7f0000001500)={[0x583]}, 0x8) 17:51:45 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0x27000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:51:45 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x300}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:51:45 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x10}}], 0x2, 0x0) 17:51:45 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x4}, 0x1c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) ppoll(&(0x7f00000001c0)=[{r2}], 0x1, 0x0, 0x0, 0x0) dup2(r2, r1) ftruncate(r2, 0x401) r3 = socket$inet6(0xa, 0x80803, 0x5) setsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@multicast1, @in6=@private2, 0x0, 0x0, 0x4, 0x1ff, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local, 0x0, 0x2b}, 0x0, @in6=@private1}}, 0xe8) connect$inet6(r3, &(0x7f00000000c0), 0x1c) r4 = socket$inet6_udp(0xa, 0x2, 0x0) r5 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000280)={'sit0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000000)={'veth1_to_bridge\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r4, 0x89f7, &(0x7f0000000140)={'sit0\x00', &(0x7f00000000c0)={'syztnl2\x00', r7, 0x16, 0xbc, 0x80, 0x6, 0x8, @dev={0xfe, 0x80, '\x00', 0x38}, @empty, 0x20, 0x20, 0x9, 0x4}}) ioctl$sock_inet6_SIOCADDRT(r4, 0x890b, &(0x7f0000000040)={@mcast1, @local, @private2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa2420200, r6}) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r3, 0x89fb, &(0x7f0000000140)={'sit0\x00', &(0x7f0000000080)={'ip6tnl0\x00', r6, 0x0, 0x7f, 0xad, 0x3, 0x70, @private0, @dev={0xfe, 0x80, '\x00', 0x29}, 0x7800, 0x7800, 0x80000001, 0x6}}) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r3, 0x6, 0x23, &(0x7f0000000000)={&(0x7f0000ffd000/0x3000)=nil, 0x3000}, &(0x7f0000000040)=0x10) 17:51:45 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000040601000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:51:45 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x28}}], 0x2, 0x0) 17:51:45 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000701000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:51:46 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x29}}], 0x2, 0x0) 17:51:46 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000801000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:51:46 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x60}}], 0x2, 0x0) 17:51:46 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000901000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:51:46 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffff801, 0x0, @perf_bp={&(0x7f0000000000), 0xdc09}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = fork() perf_event_open(&(0x7f0000000200)={0x0, 0x80, 0x20, 0x5, 0x8, 0x0, 0x0, 0xffff, 0x1010, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1ff, 0x2, @perf_bp={&(0x7f0000000080), 0x1}, 0x401a8, 0x3, 0x9, 0x8, 0x7fffffff, 0x2, 0x2, 0x0, 0x7, 0x0, 0x3}, r1, 0x10, 0xffffffffffffffff, 0x1) r2 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r2, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r3 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r3, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) ioctl$EVIOCGSW(r3, 0x8040451b, &(0x7f0000001540)) r4 = syz_open_dev$tty20(0xc, 0x4, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) ppoll(&(0x7f0000001480)=[{r4, 0x200}, {0xffffffffffffffff, 0xc255}, {r5, 0x208}, {0xffffffffffffffff, 0xa280}, {r2, 0x20}, {0xffffffffffffffff, 0x142}, {r0, 0x40, 0x3}], 0x7, &(0x7f00000014c0)={0x0, 0x3938700}, &(0x7f0000001500)={[0x583]}, 0x8) 17:51:46 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0x2f010000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:51:46 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x300}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:51:46 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0, 0x0, 0x0, 0x0, 0xfc}}], 0x2, 0x0) 17:51:46 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0x3f000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:51:46 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000a01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:51:46 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x300}}], 0x2, 0x0) 17:51:46 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffff801, 0x0, @perf_bp={&(0x7f0000000000), 0xdc09}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = fork() perf_event_open(&(0x7f0000000200)={0x0, 0x80, 0x20, 0x5, 0x8, 0x0, 0x0, 0xffff, 0x1010, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1ff, 0x2, @perf_bp={&(0x7f0000000080), 0x1}, 0x401a8, 0x3, 0x9, 0x8, 0x7fffffff, 0x2, 0x2, 0x0, 0x7, 0x0, 0x3}, r1, 0x10, 0xffffffffffffffff, 0x1) r2 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r2, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r3 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r3, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) ioctl$EVIOCGSW(r3, 0x8040451b, &(0x7f0000001540)) r4 = syz_open_dev$tty20(0xc, 0x4, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) ppoll(&(0x7f0000001480)=[{r4, 0x200}, {0xffffffffffffffff, 0xc255}, {r5, 0x208}, {0xffffffffffffffff, 0xa280}, {r2, 0x20}, {0xffffffffffffffff, 0x142}, {r0, 0x40, 0x8}], 0x7, &(0x7f00000014c0)={0x0, 0x3938700}, &(0x7f0000001500)={[0x583]}, 0x8) 17:51:46 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x300}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:51:46 executing program 4: sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="7c0000000303050028bd7000fddbdf250100000005001b0000000000505ac5525a3ab8fbb4f718496fbd80c2d0269542573be1ce932796abbecd750f055dbfb11aa4a36213d0004a0a2bc174f0a1af1d7d9f2ecc4bb3e6111e2dadf46fda59ad873c44b69ca5f75b0d1c141f345119d67d5a5a8cb2cedd8798000000"], 0x7c}, 0x1, 0x0, 0x0, 0x4040015}, 0xc0041) r0 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) ppoll(&(0x7f00000001c0)=[{r2}], 0x1, 0x0, 0x0, 0x0) dup2(r2, r1) sendmsg(r1, &(0x7f0000000380)={&(0x7f0000000240)=@nl=@kern={0x10, 0x0, 0x0, 0x1}, 0x80, &(0x7f0000000700)=[{&(0x7f00000002c0)="8b3223ee2b3c11", 0x7}, {&(0x7f0000000540)="e9c716a3976013797ef4a727b66190d8b9d030b420f6c1976eef5f6c136a01e6a44ca602da93cf813cfbba8f122a8ae0f727a4acdddea98b9f79e8fac5c7b2a81432d5f388cf6be6d0947d5cd49d569c2b73b915167e077a265de91a71942204374fe0ea85191ffc2808072439666dc76e5103e14a694cec7ff8ba05d0a9b4400bb78bf208ef0ccfafc0b70acbb1cbae69825e7ddf32594f34cb68adae8e46d06aeba5d45db9cdcf352b2c65c29bec7849fe168547695239990ec3fe860a29347990", 0xc2}, {&(0x7f0000000640)="dce11cc502ffe7d47e5be3e362780f834a492e0f6b8258b3b063613309635a4d93be198dde2898574c58629e38fa78469a4dd014bcb93f3a9dacd71bfd28bb086ea3e07b04b4a697db34327ea92533af10397457d0989ae1d451fc5c5b3c5e1aa4beba52a6352958933edb47a95abdc12d5aabc237f20032e4cf2fefdac8dac27fa511e6569fb0dba31964dc4325e634ef28596f7775db06addc0028", 0x36}], 0x3, &(0x7f0000000340)}, 0x4000050) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000200)={'dummy0\x00'}) getsockopt$inet6_udp_int(r0, 0x11, 0xb, &(0x7f0000000040), &(0x7f00000001c0)=0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x4}, 0x1c) recvfrom$inet6(r0, &(0x7f00000000c0)=""/245, 0xf5, 0x40000002, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @loopback, 0x3ff}, 0x1c) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000000)={'veth1_to_bridge\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r3, 0x89f7, &(0x7f0000000140)={'sit0\x00', &(0x7f00000000c0)={'syztnl2\x00', r4, 0x16, 0xbc, 0x80, 0x6, 0x8, @dev={0xfe, 0x80, '\x00', 0x38}, @empty, 0x20, 0x20, 0x9, 0x4}}) r5 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0xc4000, 0x0) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="14000000", @ANYRES16=r6, @ANYBLOB="0100000000000000000003000000c099dc9f578da79c929b66dbf8df9f2565396f870396150df2fd22d6cc14bf65e65af850c31639249375696f08599f3760992624849f423bf0ba1e5853b1991cd6731accd1625613"], 0x14}}, 0x0) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r5, &(0x7f0000000380)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="14000000", @ANYRES16=r6, @ANYBLOB="0002a5b97000ffdbdf2505001000"], 0x14}, 0x1, 0x0, 0x0, 0x4}, 0x250c8e04860779a5) sendto$inet6(r5, &(0x7f0000000340)="a334a7629becfd1bf43166879434c23efcb4190fcb4eaec2df90a035d7cb8c64119da2cd6931fd9ecc6ddc5ee8a891aa70b001", 0x33, 0x800, &(0x7f00000003c0)={0xa, 0x4e22, 0x3, @private0={0xfc, 0x0, '\x00', 0x1}, 0x4}, 0x1c) socket$inet6_udp(0xa, 0x2, 0x0) 17:51:46 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x500}}], 0x2, 0x0) 17:51:46 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000b01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:51:46 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x5a0}}], 0x2, 0x0) 17:51:46 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000c01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:51:46 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x5c8}}], 0x2, 0x0) 17:51:46 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x600}}], 0x2, 0x0) 17:51:47 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0x40000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:51:47 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000d01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:51:47 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x700}}], 0x2, 0x0) 17:51:47 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffff801, 0x0, @perf_bp={&(0x7f0000000000), 0xdc09}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = fork() perf_event_open(&(0x7f0000000200)={0x0, 0x80, 0x20, 0x5, 0x8, 0x0, 0x0, 0xffff, 0x1010, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1ff, 0x2, @perf_bp={&(0x7f0000000080), 0x1}, 0x401a8, 0x3, 0x9, 0x8, 0x7fffffff, 0x2, 0x2, 0x0, 0x7, 0x0, 0x3}, r1, 0x10, 0xffffffffffffffff, 0x1) r2 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r2, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r3 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r3, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) ioctl$EVIOCGSW(r3, 0x8040451b, &(0x7f0000001540)) r4 = syz_open_dev$tty20(0xc, 0x4, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) ppoll(&(0x7f0000001480)=[{r4, 0x200}, {0xffffffffffffffff, 0xc255}, {r5, 0x208}, {0xffffffffffffffff, 0xa280}, {r2, 0x20}, {0xffffffffffffffff, 0x142}, {r0, 0x40, 0x64}], 0x7, &(0x7f00000014c0)={0x0, 0x3938700}, &(0x7f0000001500)={[0x583]}, 0x8) 17:51:47 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x300}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:51:47 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000e01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:51:47 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x810}}], 0x2, 0x0) 17:51:47 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0x48000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:51:47 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffff801, 0x0, @perf_bp={&(0x7f0000000000), 0xdc09}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = fork() perf_event_open(&(0x7f0000000200)={0x0, 0x80, 0x20, 0x5, 0x8, 0x0, 0x0, 0xffff, 0x1010, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1ff, 0x2, @perf_bp={&(0x7f0000000080), 0x1}, 0x401a8, 0x3, 0x9, 0x8, 0x7fffffff, 0x2, 0x2, 0x0, 0x7, 0x0, 0x3}, r1, 0x10, 0xffffffffffffffff, 0x1) r2 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r2, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r3 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r3, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) ioctl$EVIOCGSW(r3, 0x8040451b, &(0x7f0000001540)) r4 = syz_open_dev$tty20(0xc, 0x4, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) ppoll(&(0x7f0000001480)=[{r4, 0x200}, {0xffffffffffffffff, 0xc255}, {r5, 0x208}, {0xffffffffffffffff, 0xa280}, {r2, 0x20}, {0xffffffffffffffff, 0x142}, {r0, 0x40, 0x300}], 0x7, &(0x7f00000014c0)={0x0, 0x3938700}, &(0x7f0000001500)={[0x583]}, 0x8) 17:51:47 executing program 4: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000), 0x101100, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r3) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000000c0)={{{@in=@loopback, @in6=@loopback, 0x4e20, 0x81, 0x4e22, 0x0, 0xa, 0x0, 0x20, 0x0, 0x0, r3}, {0xce, 0x9, 0x0, 0x0, 0xaf3f, 0x10001, 0xfffffffffffffff7, 0xcb3}, {0x80, 0x1, 0xffffffff, 0x41}, 0x1ff, 0x6e6bb7, 0x0, 0x0, 0x2, 0x1}, {{@in=@dev={0xac, 0x14, 0x14, 0x3e}, 0x4d2, 0x32}, 0x2, @in6=@ipv4={'\x00', '\xff\xff', @multicast2}, 0x3500, 0x3, 0xa393065df4c2166c, 0xc, 0xff, 0x6, 0x5}}, 0xe8) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x4}, 0x1c) 17:51:47 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x300}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:51:47 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0, 0x0, 0x0, 0x0, 0xf00}}], 0x2, 0x0) 17:51:47 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000f01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:51:47 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x1008}}], 0x2, 0x0) 17:51:47 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2800}}], 0x2, 0x0) 17:51:47 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000001001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:51:47 executing program 4: rmdir(&(0x7f0000000000)='./file0\x00') r0 = socket$inet6_udp(0xa, 0x2, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="7f454c46a98002ff00020000000000000200060000000000520200000000000040000000000000003e03000000000000000100000000380001000200040025ff070000000a0000000000000000000000ff0100000000000001000000000000000200000000000000080000000000000007000000000000000300000001040000050000000000000007000000000000000700000000000000010000000000000009000000000000005b0000000000000002ae909c2442ecedcd0869a178d14d6a44d79c2977d7570ef007fd8055b58ab526175399bd57fd50cebb6c00"/2006], 0x7db) r1 = accept4$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @private2}, &(0x7f00000008c0)=0x1c, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'veth1_to_bridge\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r2, 0x89f7, &(0x7f0000000140)={'sit0\x00', &(0x7f00000000c0)={'syztnl2\x00', r3, 0x16, 0xbc, 0x80, 0x6, 0x8, @dev={0xfe, 0x80, '\x00', 0x38}, @empty, 0x20, 0x20, 0x9, 0x4}}) r5 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0xc4000, 0x0) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000180)={0x14, r6, 0x1, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r5, &(0x7f0000000380)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000200)=ANY=[@ANYBLOB='d\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="000225bd7000ffd3df250500000050000180080003000100000008000100", @ANYRES32=r3, @ANYBLOB="08000100", @ANYRES32=r3, @ANYBLOB="08000100", @ANYRES32=r3, @ANYBLOB="08000100", @ANYRES32=r4, @ANYBLOB="140002006272696467655f736c6176655f30000008000100", @ANYRES32=r3, @ANYBLOB="0800030000000000"], 0x64}, 0x1, 0x0, 0x0, 0x4}, 0x250c8e04860779a5) openat(r5, &(0x7f00000009c0)='./file0\x00', 0x600a00, 0x3) preadv(r1, &(0x7f0000000980)=[{&(0x7f0000000900)=""/94, 0x5e}], 0x1, 0x0, 0xbc) r7 = socket$inet6(0xa, 0x800, 0x8) sendmsg$sock(r7, &(0x7f0000000c00)={&(0x7f0000000a00)=@rxrpc=@in6={0x21, 0x4, 0x2, 0x1c, {0xa, 0x4e21, 0xffffff16, @rand_addr=' \x01\x00', 0x4}}, 0x80, &(0x7f0000000b40)=[{&(0x7f0000000a80)="7e133c7aabbf4e84acf8963e4543cd51b662fc490353ca0f668530bc224e3903ba7c528b62fd1c52a391ebc489de2939cb9f935511092cc0cd80de9174c3623b84c5d2479bf8995aa94ddd85067f2dd2012c4bd8f4f4cfe1a5326a", 0x5b}, {&(0x7f0000000b00)="b3146776fde6d7a78ff27dc22fcae5b74e97a7805d62610814a0c6ec49d32d42b490ea", 0x23}], 0x2, &(0x7f0000000b80)=[@txtime={{0x18, 0x1, 0x3d, 0x5}}, @mark={{0x14, 0x1, 0x24, 0x1}}, @timestamping={{0x14, 0x1, 0x25, 0x9}}], 0x48}, 0x1) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x4}, 0x1c) 17:51:48 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2900}}], 0x2, 0x0) 17:51:48 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000001101000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:51:48 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0x4c000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:51:48 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x3f00}}], 0x2, 0x0) 17:51:48 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000001201000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:51:48 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x300}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:51:48 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffff801, 0x0, @perf_bp={&(0x7f0000000000), 0xdc09}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = fork() perf_event_open(&(0x7f0000000200)={0x0, 0x80, 0x20, 0x5, 0x8, 0x0, 0x0, 0xffff, 0x1010, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1ff, 0x2, @perf_bp={&(0x7f0000000080), 0x1}, 0x401a8, 0x3, 0x9, 0x8, 0x7fffffff, 0x2, 0x2, 0x0, 0x7, 0x0, 0x3}, r1, 0x10, 0xffffffffffffffff, 0x1) r2 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r2, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r3 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r3, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) ioctl$EVIOCGSW(r3, 0x8040451b, &(0x7f0000001540)) r4 = syz_open_dev$tty20(0xc, 0x4, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) ppoll(&(0x7f0000001480)=[{r4, 0x200}, {0xffffffffffffffff, 0xc255}, {r5, 0x208}, {0xffffffffffffffff, 0xa280}, {r2, 0x20}, {0xffffffffffffffff, 0x142}, {r0, 0x40, 0x483}], 0x7, &(0x7f00000014c0)={0x0, 0x3938700}, &(0x7f0000001500)={[0x583]}, 0x8) 17:51:48 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) fsconfig$FSCONFIG_SET_BINARY(0xffffffffffffffff, 0x2, &(0x7f0000000000)='\x00', &(0x7f00000000c0)="a5d27c5d14753ec63ccb3b33dc515e95d54279d450683709931c5b0076afb16acb896c41cd87ca830eba45a821e66956e68570e7d89493f8fae9519ffbc40d289ce993e4b519cafa80123a1107050455d2772de94291384ff04640c7e61ebf23314939187c085e1a39891876c7f1a778b1cccabc8e70845e792716c5f299caf18334b325a4a66ed0834ab40306e6cff49ddbe5f6c322b67a112f1369e1612ecac32ae877f435e9f1424d26d45d4ea95178e78cef1163f028ccee07f77e79a2404bb17aa1e5dd9e451c848b8b307c0b0fa5ef5aecef54cc25a1d483a69f2e68c72f467bef65d79b0eca8bc71b8013e8a7b4821aa4630356bb1c", 0xf9) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x4}, 0x1c) 17:51:48 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000031201000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:51:48 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4000}}], 0x2, 0x0) 17:51:48 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0x68000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:51:48 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6000}}], 0x2, 0x0) 17:51:48 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000031a01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:51:48 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x80fe}}], 0x2, 0x0) 17:51:48 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @dev={0xfe, 0x80, '\x00', 0x18}, 0x8}, 0xe) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'veth1_to_bridge\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r1, 0x89f7, &(0x7f0000000140)={'sit0\x00', &(0x7f00000000c0)={'syztnl2\x00', r2, 0x16, 0xbc, 0x80, 0x6, 0x8, @dev={0xfe, 0x80, '\x00', 0x38}, @empty, 0x20, 0x20, 0x9, 0x4}}) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0xc4000, 0x0) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000180)={0x14, r4, 0x1, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) r5 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000340), r3) r6 = socket$inet6(0xa, 0x80803, 0x5) setsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@multicast1, @in6=@private2, 0x0, 0x0, 0x4, 0x1ff, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local, 0x0, 0x2b}, 0x0, @in6=@private1}}, 0xe8) connect$inet6(r6, &(0x7f00000000c0), 0x1c) socket$inet6_udp(0xa, 0x2, 0x0) r7 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000280)={'sit0\x00', 0x0}) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r3, &(0x7f0000000380)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000200)={0x70, r5, 0x200, 0x70bd25, 0x25dfdbff, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x5c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_FLAGS, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0xfffffffffffffd56, 0x2, 'bond_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}]}, 0x70}, 0x1, 0x0, 0x0, 0x4000005}, 0x250c8e04860779a5) syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), r3) r9 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000000280)={'sit0\x00'}) getsockopt$inet6_int(r9, 0x29, 0x48, &(0x7f0000000000), &(0x7f0000000040)=0x4) 17:51:48 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000001f01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:51:48 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0, 0x0, 0x0, 0x0, 0xa005}}], 0x2, 0x0) 17:51:48 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000002001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:51:48 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffff801, 0x0, @perf_bp={&(0x7f0000000000), 0xdc09}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = fork() perf_event_open(&(0x7f0000000200)={0x0, 0x80, 0x20, 0x5, 0x8, 0x0, 0x0, 0xffff, 0x1010, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1ff, 0x2, @perf_bp={&(0x7f0000000080), 0x1}, 0x401a8, 0x3, 0x9, 0x8, 0x7fffffff, 0x2, 0x2, 0x0, 0x7, 0x0, 0x3}, r1, 0x10, 0xffffffffffffffff, 0x1) r2 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r2, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r3 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r3, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) ioctl$EVIOCGSW(r3, 0x8040451b, &(0x7f0000001540)) r4 = syz_open_dev$tty20(0xc, 0x4, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) ppoll(&(0x7f0000001480)=[{r4, 0x200}, {0xffffffffffffffff, 0xc255}, {r5, 0x208}, {0xffffffffffffffff, 0xa280}, {r2, 0x20}, {0xffffffffffffffff, 0x142}, {r0, 0x40, 0x9f5}], 0x7, &(0x7f00000014c0)={0x0, 0x3938700}, &(0x7f0000001500)={[0x583]}, 0x8) 17:51:48 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x300}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:51:48 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @dev={0xfe, 0x80, '\x00', 0xe}}, 0x1c) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000280)={'sit0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'veth1_to_bridge\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r1, 0x89f7, &(0x7f0000000140)={'sit0\x00', &(0x7f00000000c0)={'syztnl2\x00', r4, 0x16, 0xbc, 0x80, 0x6, 0x8, @dev={0xfe, 0x80, '\x00', 0x38}, @empty, 0x20, 0x20, 0x9, 0x4}}) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000040)={@mcast1, @local, @private2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa2420200, r3}) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f00000000c0)={{{@in6=@mcast2, @in=@multicast2}}, {{@in6=@dev}, 0x0, @in=@multicast1}}, &(0x7f0000000000)=0xe8) 17:51:48 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0, 0x0, 0x0, 0x0, 0xc805}}], 0x2, 0x0) 17:51:48 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000102001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:51:48 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0x6c000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:51:49 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0, 0x0, 0x0, 0x0, 0xfc00}}], 0x2, 0x0) 17:51:49 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000002201000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:51:49 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0, 0x0, 0x0, 0x0, 0xfe80}}], 0x2, 0x0) 17:51:49 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4e23, 0x200, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x4}, 0x1c) 17:51:49 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000002501000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:51:49 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0, 0x0, 0x0, 0x0, 0xff00}}], 0x2, 0x0) 17:51:49 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000032601000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:51:49 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x300}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:51:49 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x4}, 0x1c) getsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f0000005d40)={@loopback, 0x0}, &(0x7f0000005d80)=0x14) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000005dc0)={@loopback, r1}, 0x14) sendto$inet6(r0, &(0x7f0000000000)="73237bae12d3cac843547e561fad8a25c96c8b8bdc76d46c40fabf11f23d7e93cb9f827a4d", 0x25, 0x1, &(0x7f0000000040)={0xa, 0x4e21, 0x5, @private0, 0x40}, 0x1c) 17:51:49 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0x74000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:51:49 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x40000}}], 0x2, 0x0) 17:51:49 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffff801, 0x0, @perf_bp={&(0x7f0000000000), 0xdc09}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = fork() perf_event_open(&(0x7f0000000200)={0x0, 0x80, 0x20, 0x5, 0x8, 0x0, 0x0, 0xffff, 0x1010, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1ff, 0x2, @perf_bp={&(0x7f0000000080), 0x1}, 0x401a8, 0x3, 0x9, 0x8, 0x7fffffff, 0x2, 0x2, 0x0, 0x7, 0x0, 0x3}, r1, 0x10, 0xffffffffffffffff, 0x1) r2 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r2, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r3 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r3, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) ioctl$EVIOCGSW(r3, 0x8040451b, &(0x7f0000001540)) r4 = syz_open_dev$tty20(0xc, 0x4, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) ppoll(&(0x7f0000001480)=[{r4, 0x200}, {0xffffffffffffffff, 0xc255}, {r5, 0x208}, {0xffffffffffffffff, 0xa280}, {r2, 0x20}, {0xffffffffffffffff, 0x142}, {r0, 0x40, 0x6400}], 0x7, &(0x7f00000014c0)={0x0, 0x3938700}, &(0x7f0000001500)={[0x583]}, 0x8) 17:51:49 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000002e01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:51:49 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x100000}}], 0x2, 0x0) 17:51:49 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x4}, 0x1c) 17:51:49 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000003201000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:51:49 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x1000000}}], 0x2, 0x0) 17:51:49 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x4}, 0x1c) sendto$inet6(r0, &(0x7f00000000c0)="6b8e8e52a37c4dffe7ffbccb4a049ee009bbd17a1e4543930f82e78274885362f9fdd2110ee457cf931121b5163d288aa3e5dff17525725d38d6016eabe304ca088dc625235a3a907ee7f5cf50c23d3f8e82142a1b28218b92c5561a714563ffbdb77199e48d0774f71aa2d6b90956f4a5bb77d3d89b485c32d73c3bb6f4229548bc7830235ab4f14040364dd145d594dddb1e01db184bc377b0c1a6711d2ff303789244d72556802ef3bfacd14a904cfe33e13d3070f9e2a0bd6097d06ca1082d19adc81df7880e85d70c39bb3d9f3cb58a94b3e434aa728befab9b34b5bb83dbd2c3c1cc8ccee3eb77437cdcb6e5afb6e47426954eef0728f80887885f0998d0b03ab2235f10591bd2b3c283034e1047e263fa929e3b5ff2247d5097ea86182e3632758eb5e8db182f72e3123af01e20fe02bcc09308f807b9f21cab9911bb9298388036f7a69747136d4149cc60fb330fb4abef6831db028321b9cc017f4e758274e4348ba765ad3b013e6eacea30ad8ef332fe4ee345c018dc0bd862a2031cf03c5ea059a6f086df21b9601a431ef54fdda06e92d208e920ae2928a951d5b1ce26e5b7dd74288bedd13e06aa848770fb64f0627508969cd4f854581f9cc5972c54c181730f1e3f1ed75e2c92228ccf5852acd54c52aa8f2ebfece1c3f9642dc4a3ba3a11069bbb80addc3507e4e13ecce95932b49e4b04944c6f030671af11418fa09b8837f674309291d56852e73d4e948f8d38ce1b681d35604be9003d4862e77f8226d9331ce5d88e9026af1dea1ab0c8b72a759f345b300108b9cef53ed70ee7166a37c90a69ce2eaa9557ee2c7d78441138f3cbc1e4cd0404ce37cc89c16157283c6818dbbf4f6cbe6ae2890946fc932a771eb7e895be75c6c20ee42e80a00117561d7656e2cef34800ed46e8fbe1b18312b7dfc7874dcc9c64e44cabbb7400faa92350f0dff0ffeb66e8df58c5f9410dd86807ede208428369aa423fe294497e69e900b03faab25dae1441810eff2d5ccacf42f57b598d534f276b4947897607893e92ebc57b9032b658d73f4cc57fd385d57d4c7d271efa64fae759d010c07f8935cc3ec3401eb994536fe3f37fbf11956ad7b3d5c762fe76718001ea17b286164654f37457f19eeb26b6c7dc16cbb42c996522c7810c444ca98af0aedc7c54850d601678d70cb7ed6884d9b2fea33606725fc112f0568db42e289f67309ba422920f9d75a6500852df7faeecbbf4f6649c5a3c580fe757458211bf3cbc8b49135336e65a79d1afb6e02fe2303d60941f4e253049fe798c5abc7fde217c18a929aafef335c99699fd5f175b606763692b8426d41199bc006bb55d61cdaa2dcdb53e1642ee2077ef6e9957d03215929761aeaa198d4a831400b23032bd6c9f8703bb56211734b9a7966d1dba27e8f809d99227b39aeea43a838c09a566327c5d48ae616b1dbb2dc97feb6be2bec17335871fd1a03618993e5559ea9b37b4013321b4a9f58a34f3f4200340d95397ecffd8c1d582b36138b5974f547a6b9751ddbac855e5d0a4b614282de857d9070f30f2d011f562e7db13299c7ac66953992b6dfce78f53a4c6bfe09c6b7633f6bdd3733efa2dd3d5f13a099027e1956b3d1bd098b84015e7a00d06636d2b6f0473b5beb28892175b818b7eac1f07f11854cbcce9598fff78a90fe348e8fc56658e519df56be2c039ce65d1c9e9d8bdb88fa0d1445fe5237e5726e3f4bea45e60d5a5eb6c27ac0164e73afd53c7d770342ce9b5d8058ce780938301469a2c146ff0b23ee383dd6fe4d11e8ce318d82f28e2a12c2a8207a399da0a2263e4cf9ea84055c64f9b4374603f9673c12b4d77083fdd1f88d0114be875485297daf89a6511cb0363aa254f1887421c8b4c8863ca9e763d6aac9bfe4393ef0d6e8fa140eb6bd6b23815d20cef9e1b0f1087b8689a869866be0fd53681a06f66987f6d4529652f9645afbc57b6a23c30619d568ee67dd31ac7326f84c573dc60bf5804f8611f6ab535ba7fc1222becb791531b08ec58f8c21fc8006a23136ef40386d205944f5a3e2cab6c8055065d3d0ce74f2cf20ab0e3ad93e089114221445078d594b2aef43d2c80b8f50ad59da9f4b4fb61eaaae8f922538225d2139e1b2d36f815d1c94c37da094f8a600ced408125bca82c191a5c3cd6b8a7057dcf7ea33e783f93910e2653fe94a05f9a45bf80c5b27acb75f594dc928964ec4fad30cb925d620a9fa18cc9a15d5ccefd76fa82ca98653aec15875985c15a09c01eaf394673705bd37808651e4689a27d167b1614f5d3bd48b38513a3338e39b81d077af34679dbd00eb8385f45edd0bff6c95133b721465c86e3403b3af04aabc33f713af1ee7ae55594ef4ae5d0bd7a0b2cb53ac39b493eda330a1a8b247836541a9fe82d22171d4bc9d4152ae745363c0b6ecaef269fbfbd5625bcff104615e6faa9821b46eac57defddda66b67b4b4bb16b320e40d2ce7e8cf56c96a09518db0016202400d49f689a81b46adda65d924a3a342711699c9535916908c73470f036287e7c22367db60fc81f96f2756a4f99677cfc30cf34635285382213f8867d397e2524134f716162bb8893ed4c264d00f8a303928ef3557a925688def052ffbd95aede0755ed2af80a36f4a62c274c01c812759c53fd00a38b6dc1df64aca07960e6b29e13120e0320571893cdd02cdf32c76b4eb9b9ef968949aa2e6318118ea44ace1d33125fea8e658a53788dc84f8cfa9dbc8df023c0418a492864ac877abb567aaf0720f01248dc277ac2934665a25751c7a8b0830ad8a94bab88b59dd58adb0f188bce550206e213b5b382454897001102c3bedf45214d5f2b2957ac0b096f2a6f603d83b347752db8cc82cf6d5331281059cd628862821e8ef1145196d00d39bb60c3dbc2e0fde95ecd91adfc1e78aa6e2ce76064a2a8a8a83496af9f113d11aedfc3718fd33e2d2de8952f71ed79860ebd376a83b63dad6601ea417a36f1b8d45bdb2b2f83e1e1e9ebdd9280e251560a206f4967cec2defa23fba6f0404152092d612353a2200d2079a96c213f13607e1309a7eb95aabc04e37b00f771902a75ee5a45b937e7a6782cd91393583caf09094899b86f50bf9313963d0295006bf98f05f989de8714eba67a289e8eb12a38f7baa504b67b6a6132e09ac158e8d12c98b668bb691e971b6b7e7eee0842fd567412b2963e41d35e6177c2b78289ee8be81853cf8f061e1ca635846245cd0b73ad3b708dced299a5ef209c6f5680543f2ea497379d8d6964c42e1fc060bf34d87b1e1a007edf0e2f73b48c577f3abf9533aad63e3f095e23f380481ad11f7de37c5d4f67fb69dec345c495469212795bad25d1ec37201b54c394347cae5e022171f110bc998ba91559dc14bbfe5e738d88d77f118665b5546472940e6d3c72223d91b3a98cc53305a7f7e3ea466326afef746b62732898082a317cf89a7422b96843d4d810c0c596cb2b97a842364405f63440a4ef63f6ebbb609806140b9cbef690a985f69f67789847f48984404f3d4a06bdc55cce0f38315fbfcd89c3368be6874df205144dfa347c0c2238d7603069d4fc40fbc8944bec29c64fb120457b7c0bd99459d82f82c82daf40b8c07c13939e4db86af54c5c3836853ec7a748fcf0b1af70e0e839f1196103aa9b6fd7bfa7d12021e29195c2b2b9fc2458903c825413eff78b9e35887ba08b518afc8fde20001197dd2822aa451531e977ba22d22810ad346e56ae0d68152a048ae81963e54cb3f1ba83e977a707d83233a9cca074e83c21ba2f0de9eb1412a64b7eeb52e5ae2086e8baf21b9bd669d164cd71e3e659f722a0218f99f26cabb3e953497e94947358b9f1aab1745dab79fa99416475409c0f67ce5d1ae76150d8486714ca2019e44ca503c0e1220469339ce4bf6247f2f1536f18d2f3b33156315eb33924e52c4185d9ab8d79d44710645ee8e16979038c6b90bb5ca8e2292b5b4f1c19d5817594b81b6ec4d6fdf0cc3ef1e2f874cd39a20434d5567f3dd3f7de2799d4e0b3586d198f7804a47097500ced99c64cd159675e62b6eff63975707fad461c249ba7e27ffeaabadbbeff02d11f96703c19918ddf6977ce12cbe284876acbfa5077c0474bc1d7ba733b88d58ac4bec19581004d31d1c9b35d2c335f586df23f004a4b277b2b1952016a332fe4c5c96168af35161bf0c67d37df311dfbe3de281f09b8452f42bc76522e27e95a11ec75bb70a5500de36306038d8818a9d86d26c93cf45223741c22c28d7b70be15bb89515bd4c37111d80967d806efaf96c293aed7b355657c0721fd242f2af1a6806ca168ba0451459f4158a46bf0539ba3eed89ebaa77ccf86a718097b304067ecdb0f662bfa8b5783e75c1ef17a507e4020437a8bffffd2430d88defda180a25d24ba68004b722ddc7239217dba88e44dca2f20cd996227f701db20ffc4219ff3c29830743b3c582e2c83096e3fbb929ca904da674af8d4b5d3074851204b2eb2c8ea0226302833fbc9d4d53f3371fa9c7e6866a2212fc3668c65162957b7e9a97593133a43b31a60a2cea1f685b9e054a78268c0cdf3441271c34c111a94b606b0502fb7ecb386f1c9de68582c73432a505a0724960b90cddaae0b66bb4c53a50e9bb278160d5281060dd79f21bb3c010d6f007c5aab2b03f4a53e41d7537d08a57a08cfd5f5870ba1136ad0e31444f0ff0035db12be43ef50b5b650e5eaecdc0763193bc90e4a2ca08e7a5a5378a77bb6fb294a77a08e18640961872516353ea367356cde6e17a537c1ba352eff33db820ae6a985241ebb56478131e21971c5b74332ac392a1e84a0e4054b5b133eb8c9430ec52c57aa1c042974d5ac319d8b10773d7d6c7ecd2b3411db402f48e502937c436f3fbfa0389f3a6b254b200ac0e84fc2cd0184e6b35dc5da86a805fe05ce103af6b9415dd53b60cea4c7a4505091c113f69f366a13253ca5d1988560b15628117702ae8b416505673ee2f03104bfd15b545667d5432a07e16bbe283f92a559e7d9f44126a58270410684e7849e69bda516984b72a93bd4d65b3dbb31a527ae324eff18b2fd5ecf3a532af400baab70a586e8f62149f3de3ecefabe5813a544586b5e3d2b6cef2e0aea18693331cd12cfecbc887998803c0f5037bcd8c9ec7b1b8ad15b7638a25bf1e426d580a07deac4ebfbcbc46013fbb271847dbc5f9e56fdda2908b0c59ca95f358cc2ff19c82f6e095084da9179221bee262b72bdcf8b033c7c3ec2dbb3120e7cc0d1a509bdfb7d8ee26d9c1371c0b826ae2f6ed4f0081d5b30297ce88f7dc59fa848f9c09efe857632116f895845ce0d5f5941fa546c295eee74eb3e1a6d8dc61dc738299c594e419f35a955153a449ab0dc8cb06d26747d8419ce61a941303922a8d2b425b9932a8c0ea2c8732466c6bf643c2b21d27d720add5de36c88e5f1f0f3c1e2f657651f0285097cdcc62866c66e1f5015b2943c9279c4fcf8ff44f91b4d6367af57bd6e79b1bf317ac6cd2ca5546a41a0cd8e2a98e78c6e3dbf7ee7a3b4c47e43f44af0805866184c0d2bd4f86bc580a1b2c6d7a93ebb1416ca4b985c7159c4c3b791c7e8733551541703b3ae343eb614f17ae5aade9d3f9bdaaa41045b69152505f7e2ab94e3f99c6d473d7cf4ad2713a3a502b30028f25af2f29a3f1ff5261822b556864ead1dcc94c921b2e701c203adc3b2cedc2d74b3cd1a7a3ffde5517192e995dcbb9f204ff6aebd0e02cacba5dfc98e01406e488f815f8fbbbb9d74", 0x1000, 0x824, &(0x7f0000000000)={0xa, 0x4e21, 0xfffffffe, @private2={0xfc, 0x2, '\x00', 0x1}, 0x87d}, 0x1c) 17:51:49 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000003f01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:51:49 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x300}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:51:49 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2000000}}], 0x2, 0x0) 17:51:49 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0x7a000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:51:49 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000004001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:51:49 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x4}, 0x1c) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0xa8, @remote, 0x100}, 0x1c) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000040)) 17:51:49 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffff801, 0x0, @perf_bp={&(0x7f0000000000), 0xdc09}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = fork() perf_event_open(&(0x7f0000000200)={0x0, 0x80, 0x20, 0x5, 0x8, 0x0, 0x0, 0xffff, 0x1010, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1ff, 0x2, @perf_bp={&(0x7f0000000080), 0x1}, 0x401a8, 0x3, 0x9, 0x8, 0x7fffffff, 0x2, 0x2, 0x0, 0x7, 0x0, 0x3}, r1, 0x10, 0xffffffffffffffff, 0x1) r2 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r2, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r3 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r3, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) ioctl$EVIOCGSW(r3, 0x8040451b, &(0x7f0000001540)) r4 = syz_open_dev$tty20(0xc, 0x4, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) ppoll(&(0x7f0000001480)=[{r4, 0x200}, {0xffffffffffffffff, 0xc255}, {r5, 0x208}, {0xffffffffffffffff, 0xa280}, {r2, 0x20}, {0xffffffffffffffff, 0x142}, {r0, 0x40, 0x8304}], 0x7, &(0x7f00000014c0)={0x0, 0x3938700}, &(0x7f0000001500)={[0x583]}, 0x8) 17:51:49 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000008004001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:51:49 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x3000000}}], 0x2, 0x0) 17:51:49 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x4}, 0x1c) r1 = accept$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local}, &(0x7f0000000040)=0x1c) recvfrom$inet6(r1, &(0x7f00000000c0)=""/118, 0x76, 0x2040, &(0x7f0000000140)={0xa, 0x4e23, 0x8, @loopback, 0x80000000}, 0x1c) 17:51:49 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000034601000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:51:49 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0x8cffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:51:49 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4000000}}], 0x2, 0x0) 17:51:49 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x300}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:51:49 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000034701000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:51:49 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4e23, 0xfff, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x4}, 0x1c) 17:51:49 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x5000000}}], 0x2, 0x0) 17:51:49 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6000000}}], 0x2, 0x0) 17:51:50 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffff801, 0x0, @perf_bp={&(0x7f0000000000), 0xdc09}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = fork() perf_event_open(&(0x7f0000000200)={0x0, 0x80, 0x20, 0x5, 0x8, 0x0, 0x0, 0xffff, 0x1010, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1ff, 0x2, @perf_bp={&(0x7f0000000080), 0x1}, 0x401a8, 0x3, 0x9, 0x8, 0x7fffffff, 0x2, 0x2, 0x0, 0x7, 0x0, 0x3}, r1, 0x10, 0xffffffffffffffff, 0x1) r2 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r2, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r3 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r3, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) ioctl$EVIOCGSW(r3, 0x8040451b, &(0x7f0000001540)) r4 = syz_open_dev$tty20(0xc, 0x4, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) ppoll(&(0x7f0000001480)=[{r4, 0x200}, {0xffffffffffffffff, 0xc255}, {r5, 0x208}, {0xffffffffffffffff, 0xa280}, {r2, 0x20}, {0xffffffffffffffff, 0x142}, {r0, 0x40, 0xf509}], 0x7, &(0x7f00000014c0)={0x0, 0x3938700}, &(0x7f0000001500)={[0x583]}, 0x8) 17:51:50 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000004801000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:51:50 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = accept$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @initdev}, &(0x7f0000000040)=0x1c) setsockopt$inet6_group_source_req(r1, 0x29, 0x0, &(0x7f00000000c0)={0x0, {{0xa, 0x4e21, 0xf, @loopback, 0x6d8}}, {{0xa, 0x4e21, 0x7f, @local, 0x1000}}}, 0x108) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000200)={0xa, 0x4e20, 0x1000, @private2, 0x90}, 0x1c) 17:51:50 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x7000000}}], 0x2, 0x0) 17:51:50 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8000000}}], 0x2, 0x0) 17:51:50 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0xa6000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:51:50 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000004c01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:51:50 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x300}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:51:50 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x4}, 0x1c) sendto$inet6(r0, &(0x7f0000000000)="5aeb4d8aa770872306d8580e771efb91b5ddfa92ce95c25b684adb311021a33a199380624bd9d87c36ddd8b038df898c770639a6c0e871bf434a0ddde55294896862cae079", 0x45, 0x0, &(0x7f00000000c0)={0xa, 0x4e24, 0x1000, @ipv4={'\x00', '\xff\xff', @local}, 0x8}, 0x1c) 17:51:50 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000004e01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:51:50 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0, 0x0, 0x0, 0x0, 0xf000000}}], 0x2, 0x0) 17:51:50 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x4}, 0x1c) r1 = open(&(0x7f0000000000)='./file0\x00', 0x28a004, 0x52) setsockopt$inet6_IPV6_RTHDR(r1, 0x29, 0x39, &(0x7f0000000040)={0x2, 0x4, 0x2, 0xff, 0x0, [@mcast2, @private1={0xfc, 0x1, '\x00', 0x1}]}, 0x28) 17:51:50 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000004f01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:51:50 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x10000000}}], 0x2, 0x0) 17:51:50 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x4}, 0x1c) ioctl$sock_SIOCADDDLCI(r0, 0x8980, &(0x7f0000000000)={'veth1_to_bond\x00', 0x2}) socketpair(0x1a, 0x4, 0x10000, &(0x7f0000000040)) 17:51:50 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffff801, 0x0, @perf_bp={&(0x7f0000000000), 0xdc09}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = fork() perf_event_open(&(0x7f0000000200)={0x0, 0x80, 0x20, 0x5, 0x8, 0x0, 0x0, 0xffff, 0x1010, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1ff, 0x2, @perf_bp={&(0x7f0000000080), 0x1}, 0x401a8, 0x3, 0x9, 0x8, 0x7fffffff, 0x2, 0x2, 0x0, 0x7, 0x0, 0x3}, r1, 0x10, 0xffffffffffffffff, 0x1) r2 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r2, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r3 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r3, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) ioctl$EVIOCGSW(r3, 0x8040451b, &(0x7f0000001540)) r4 = syz_open_dev$tty20(0xc, 0x4, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) ppoll(&(0x7f0000001480)=[{r4, 0x200}, {0xffffffffffffffff, 0xc255}, {r5, 0x208}, {0xffffffffffffffff, 0xa280}, {r2, 0x20}, {0xffffffffffffffff, 0x142}, {r0, 0x40, 0xffff}], 0x7, &(0x7f00000014c0)={0x0, 0x3938700}, &(0x7f0000001500)={[0x583]}, 0x8) 17:51:50 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0xccffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:51:50 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x10000120}}], 0x2, 0x0) 17:51:50 executing program 4: ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000000)={0x0, 'bridge_slave_1\x00', {0x4}, 0x1}) r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x4}, 0x1c) 17:51:50 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x300}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:51:50 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000005001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:51:50 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x10080000}}], 0x2, 0x0) 17:51:50 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r0, 0x89f7, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x29, 0x15, 0x3, 0x9, 0x4, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @empty, 0x20, 0x40, 0x20, 0x6}}) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x1c) listen(r0, 0x3ff) r1 = socket$inet6(0xa, 0x80803, 0x5) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@private2, @in6=@initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x89}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@empty, 0x0, 0x2b}, 0x0, @in6=@private1}}, 0xe8) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x200c84b8, @dev={0xfe, 0x80, '\x00', 0x1d}}, 0x1c) 17:51:50 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0xe82a1b00}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:51:50 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000005101000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:51:50 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x20010010}}], 0x2, 0x0) 17:51:50 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) r0 = open_tree(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x80001) sendto$inet6(r0, 0x0, 0x0, 0xc090, &(0x7f0000000080)={0xa, 0x4e21, 0x0, @private2, 0x4}, 0x1c) 17:51:51 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffff801, 0x0, @perf_bp={&(0x7f0000000000), 0xdc09}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = fork() perf_event_open(&(0x7f0000000200)={0x0, 0x80, 0x20, 0x5, 0x8, 0x0, 0x0, 0xffff, 0x1010, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1ff, 0x2, @perf_bp={&(0x7f0000000080), 0x1}, 0x401a8, 0x3, 0x9, 0x8, 0x7fffffff, 0x2, 0x2, 0x0, 0x7, 0x0, 0x3}, r1, 0x10, 0xffffffffffffffff, 0x1) r2 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r2, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r3 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r3, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) ioctl$EVIOCGSW(r3, 0x8040451b, &(0x7f0000001540)) r4 = syz_open_dev$tty20(0xc, 0x4, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) ppoll(&(0x7f0000001480)=[{r4, 0x200}, {0xffffffffffffffff, 0xc255}, {r5, 0x208}, {0xffffffffffffffff, 0xa280}, {r2, 0x20}, {0xffffffffffffffff, 0x142}, {r0, 0x40}], 0xa, &(0x7f00000014c0)={0x0, 0x3938700}, &(0x7f0000001500)={[0x583]}, 0x8) 17:51:51 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000005801000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:51:51 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x28000000}}], 0x2, 0x0) 17:51:51 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) ppoll(&(0x7f00000001c0)=[{r2}], 0x1, 0x0, 0x0, 0x0) dup2(r2, r1) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0xd, 0x1010, r1, 0xfc6a1000) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x4}, 0x1c) 17:51:51 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x300}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:51:51 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000006001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:51:51 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x29000000}}], 0x2, 0x0) 17:51:51 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0xf6ffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:51:51 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x3f000000}}], 0x2, 0x0) 17:51:51 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000006101000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:51:51 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000006201000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:51:51 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x40000000}}], 0x2, 0x0) 17:51:51 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffff801, 0x0, @perf_bp={&(0x7f0000000000), 0xdc09}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = fork() perf_event_open(&(0x7f0000000200)={0x0, 0x80, 0x20, 0x5, 0x8, 0x0, 0x0, 0xffff, 0x1010, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1ff, 0x2, @perf_bp={&(0x7f0000000080), 0x1}, 0x401a8, 0x3, 0x9, 0x8, 0x7fffffff, 0x2, 0x2, 0x0, 0x7, 0x0, 0x3}, r1, 0x10, 0xffffffffffffffff, 0x1) r2 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r2, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r3 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r3, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) ioctl$EVIOCGSW(r3, 0x8040451b, &(0x7f0000001540)) r4 = syz_open_dev$tty20(0xc, 0x4, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) ppoll(&(0x7f0000001480)=[{r4, 0x200}, {0xffffffffffffffff, 0xc255}, {r5, 0x208}, {0xffffffffffffffff, 0xa280}, {r2, 0x20}, {0xffffffffffffffff, 0x142}, {r0, 0x40}], 0x1e, &(0x7f00000014c0)={0x0, 0x3938700}, &(0x7f0000001500)={[0x583]}, 0x8) 17:51:51 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000006301000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:51:51 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x60000000}}], 0x2, 0x0) 17:51:52 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x4}, 0x1c) sendto$inet6(r0, &(0x7f00000000c0)="fa0e21cc17abd180388c4a6b34a769b7a0c8204d754ee4e14da39cffc72c5c59e812c45ffd82a19c84c5d457760289afae4ed57d057c0abdd4f1556ca7d9a30ee22969923fd50c53db512838c1f26fd216f861859b179fe8237d9dad657f198f220911e1f63112d496ce56b63561cf690df6ffeaef8452e51548d14d72ef6f2ee624eac9323e3443e81b0a5e460a3453c46fd4b4353ca8b87d03822d748ed2e909c040efd06455ae597fc3ae4ddcf90b4daa0c8a92bc41d7021fc0489038803e315baa85ec3dba75bcb8a6c0dcedea10d9faf187cadb11dc6413f9c87e8ea1be5c4128f2a89dbe", 0xe7, 0x0, &(0x7f0000000000)={0xa, 0x4e20, 0x1, @loopback}, 0x1c) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000280)={'sit0\x00'}) sendmsg$inet6(r1, &(0x7f0000000400)={&(0x7f0000000040)={0xa, 0x4e24, 0x1, @private2={0xfc, 0x2, '\x00', 0x1}}, 0x1c, &(0x7f00000001c0), 0x0, &(0x7f0000000200)=[@pktinfo={{0x24, 0x29, 0x32, {@private2={0xfc, 0x2, '\x00', 0x1}}}}, @hopopts={{0xb8, 0x29, 0x36, {0x29, 0x13, '\x00', [@hao={0xc9, 0x10, @loopback}, @generic={0x3f, 0x89, "1744f524118e64b0c3a2c1a7012101c481721488b3b54fa948be57653ffadc735547d4b44d8808e6176b2e08471c4d227eecae8076ca4d0678c5725a51ab6156a4ab17a59b74b38ec3860c607695af61e4cf90ce725e3e30f32b74e1befff8c9b296019266045acab529be23d0605c79feaf8634c4bebb3bd7f0b594ddf39411dc161ade50e52b3dbd"}]}}}, @dstopts_2292={{0xf0, 0x29, 0x4, {0x1d, 0x1a, '\x00', [@padn={0x1, 0x4, [0x0, 0x0, 0x0, 0x0]}, @generic={0x0, 0x85, "9b523c520e65578ce1389cb975b9484926339a09e3214e17be0ffc570816e198c6fff7d6ed2d30ae7f93c06f34b42e3d8107e787330ae4a7fe1b5a5842413be1dc98ac572d5c98272b2812a403f7624b2edfa369a9735f0cd7840ea05ec71653170e16b470b5a504c594bcd0eb5a1c14126767c0d3ee9818a5eb6a2a0cb29cef5fbc628047"}, @jumbo={0xc2, 0x4, 0x100}, @ra={0x5, 0x2, 0x9}, @generic={0xc1, 0x3d, "98bd5c60602e8089c3c73bacd839c14d04fba53c5f806eb47e9e29a27ec0643cc493574752d67c4d7ed8ceb0b0a85f376ec759a8d722f84d9cd790c64b"}]}}}, @hoplimit={{0x14, 0x29, 0x34, 0x8001}}, @hoplimit={{0x14, 0x29, 0x34, 0x5}}], 0x200}, 0x44) 17:51:52 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0xfeffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:51:52 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000006401000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:51:52 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0, 0x0, 0x0, 0x0, 0xa0050000}}], 0x2, 0x0) 17:51:52 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x300}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:51:52 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffff801, 0x0, @perf_bp={&(0x7f0000000000), 0xdc09}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = fork() perf_event_open(&(0x7f0000000200)={0x0, 0x80, 0x20, 0x5, 0x8, 0x0, 0x0, 0xffff, 0x1010, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1ff, 0x2, @perf_bp={&(0x7f0000000080), 0x1}, 0x401a8, 0x3, 0x9, 0x8, 0x7fffffff, 0x2, 0x2, 0x0, 0x7, 0x0, 0x3}, r1, 0x10, 0xffffffffffffffff, 0x1) r2 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r2, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r3 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r3, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) ioctl$EVIOCGSW(r3, 0x8040451b, &(0x7f0000001540)) r4 = syz_open_dev$tty20(0xc, 0x4, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) ppoll(&(0x7f0000001480)=[{r4, 0x200}, {0xffffffffffffffff, 0xc255}, {r5, 0x208}, {0xffffffffffffffff, 0xa280}, {r2, 0x20}, {0xffffffffffffffff, 0x142}, {r0, 0x40}], 0x7, &(0x7f00000014c0)={0x0, 0x3938700}, &(0x7f0000001500)={[0x583]}, 0x20001508) 17:51:52 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0, 0x0, 0x0, 0x0, 0xc8050000}}], 0x2, 0x0) 17:51:52 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) r0 = signalfd(0xffffffffffffffff, &(0x7f0000000000)={[0x2]}, 0x8) sendto$inet6(r0, 0x0, 0x0, 0x8010, &(0x7f0000000080)={0xa, 0x4e1f, 0x0, @mcast1, 0x4}, 0x1c) 17:51:52 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000006501000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:51:52 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0, 0x0, 0x0, 0x0, 0xe0ffffff}}], 0x2, 0x0) 17:51:52 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000000c0)={'syztnl0\x00', &(0x7f0000000000)={'ip6tnl0\x00', 0x0, 0x0, 0x4, 0xd5, 0x1, 0x2, @remote, @private0={0xfc, 0x0, '\x00', 0x1}, 0x40, 0x8000, 0xa9, 0x6}}) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x4}, 0x1c) 17:51:52 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0, 0x0, 0x0, 0x0, 0xeffdffff}}], 0x2, 0x0) 17:51:52 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000006801000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:51:52 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0xff070000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:51:52 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x800, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x4}, 0x1c) 17:51:52 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0, 0x0, 0x0, 0x0, 0xf5ffffff}}], 0x2, 0x0) 17:51:52 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x300}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:51:52 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000026801000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:51:52 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffff801, 0x0, @perf_bp={&(0x7f0000000000), 0xdc09}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = fork() perf_event_open(&(0x7f0000000200)={0x0, 0x80, 0x20, 0x5, 0x8, 0x0, 0x0, 0xffff, 0x1010, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1ff, 0x2, @perf_bp={&(0x7f0000000080), 0x1}, 0x401a8, 0x3, 0x9, 0x8, 0x7fffffff, 0x2, 0x2, 0x0, 0x7, 0x0, 0x3}, r1, 0x10, 0xffffffffffffffff, 0x1) r2 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r2, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r3 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r3, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r4 = syz_open_dev$tty20(0xc, 0x4, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) ppoll(&(0x7f0000001480)=[{r4, 0x200}, {0xffffffffffffffff, 0xc255}, {r5, 0x208}, {0xffffffffffffffff, 0xa280}, {r2, 0x20}, {0xffffffffffffffff, 0x142}, {r0, 0x40}], 0x7, &(0x7f00000014c0)={0x0, 0x3938700}, &(0x7f0000001500)={[0x583]}, 0x8) 17:51:52 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000280)={'sit0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'veth1_to_bridge\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r1, 0x89f7, &(0x7f0000000140)={'sit0\x00', &(0x7f00000000c0)={'syztnl2\x00', r4, 0x16, 0xbc, 0x80, 0x6, 0x8, @dev={0xfe, 0x80, '\x00', 0x38}, @empty, 0x20, 0x20, 0x9, 0x4}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000240)={'syztnl0\x00', &(0x7f00000002c0)={'gretap0\x00', r3, 0x40, 0x700, 0x6, 0x200, {{0x20, 0x4, 0x0, 0x1c, 0x80, 0x67, 0x0, 0x0, 0x29, 0x0, @remote, @broadcast, {[@rr={0x7, 0x1b, 0x51, [@private=0xa010100, @multicast2, @multicast1, @rand_addr=0x64010100, @broadcast, @remote]}, @lsrr={0x83, 0x2b, 0x5b, [@remote, @rand_addr=0x64010100, @empty, @initdev={0xac, 0x1e, 0x1, 0x0}, @broadcast, @rand_addr=0x64010102, @multicast2, @multicast1, @broadcast, @loopback]}, @timestamp={0x44, 0x24, 0x9a, 0x0, 0x0, [0x1a9d80, 0x1, 0xa00, 0x7, 0x8, 0x9ba6, 0x2d29, 0xfb04]}]}}}}}) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000040)={@mcast1, @local, @private2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa2420200, r3}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000000c0)={{{@in=@empty, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@initdev}}, &(0x7f0000000000)=0xe8) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f00000001c0)={@loopback, @local, @empty, 0x10000, 0x6, 0xaa1f, 0x400, 0x7, 0x10200, r5}) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x4}, 0x1c) 17:51:52 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0, 0x0, 0x0, 0x0, 0xfc000000}}], 0x2, 0x0) 17:51:52 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0, 0x0, 0x0, 0x0, 0xfe800000}}], 0x2, 0x0) 17:51:52 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000006c01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:51:52 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0, 0x0, 0x0, 0x0, 0xfe80ffff}}], 0x2, 0x0) 17:51:52 executing program 4: r0 = openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000080)='devices.deny\x00', 0x2, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f00000000c0)) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) r1 = fsmount(0xffffffffffffffff, 0x1, 0x2) ioctl$SCSI_IOCTL_GET_IDLUN(r1, 0x5382, &(0x7f0000000000)) socket$inet6_udp(0xa, 0x2, 0x0) 17:51:52 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0xffffff7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:51:52 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000007401000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:51:52 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0, 0x0, 0x0, 0x0, 0xfec0ffff}}], 0x2, 0x0) 17:51:53 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000007a01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:51:53 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, &(0x7f0000000300)) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000040)=0x3b00, 0x4) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0), 0x6200, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000100)) setsockopt$netlink_NETLINK_NO_ENOBUFS(0xffffffffffffffff, 0x10e, 0x5, &(0x7f0000000340)=0x800, 0x4) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @local, 0x4}, 0x1c) fsconfig$FSCONFIG_SET_FLAG(0xffffffffffffffff, 0x0, &(0x7f0000000000)='nomand\x00', 0x0, 0x0) 17:51:53 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0, 0x0, 0x0, 0x0, 0xff000000}}], 0x2, 0x0) 17:51:53 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0xffffff8c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:51:53 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'veth1_to_bridge\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r0, 0x89f7, &(0x7f0000000140)={'sit0\x00', &(0x7f00000000c0)={'syztnl2\x00', r1, 0x16, 0xbc, 0x80, 0x6, 0x8, @dev={0xfe, 0x80, '\x00', 0x38}, @empty, 0x20, 0x20, 0x9, 0x4}}) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0xc4000, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), 0xffffffffffffffff) r3 = perf_event_open(&(0x7f0000000180)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffff801, 0x0, @perf_config_ext={0x9, 0x122}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2, 0x0, 0x8}, 0x0, 0x0, r2, 0xb) r4 = fork() perf_event_open(&(0x7f0000000200)={0x0, 0x80, 0x20, 0x5, 0x8, 0x0, 0x0, 0xffff, 0x1010, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1ff, 0x2, @perf_bp={&(0x7f0000000080), 0x1}, 0x401a8, 0x3, 0x9, 0x8, 0x7fffffff, 0x2, 0x2, 0x0, 0x7, 0x0, 0x3}, r4, 0x10, 0xffffffffffffffff, 0x1) r5 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r5, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r6 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) r7 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x8400, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r7, 0x2401, 0x0) ioctl$EVIOCSKEYCODE_V2(r6, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) ioctl$EVIOCGSW(r6, 0x8040451b, &(0x7f0000001540)) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000280)=""/178) r8 = syz_open_dev$tty20(0xc, 0x4, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) ppoll(&(0x7f0000001480)=[{r8, 0x200}, {0xffffffffffffffff, 0xc255}, {r9, 0x208}, {0xffffffffffffffff, 0xa280}, {r5, 0x20}, {0xffffffffffffffff, 0x142}, {r3, 0x40}], 0x7, &(0x7f00000014c0)={0x0, 0x3938700}, &(0x7f0000001500)={[0x583]}, 0x8) 17:51:53 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x300}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:51:53 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0, 0x0, 0x0, 0x0, 0xffff0000}}], 0x2, 0x0) 17:51:53 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000000)={'batadv_slave_1\x00'}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r5, &(0x7f00000bd000), 0x318, 0x0) ppoll(&(0x7f00000001c0)=[{r5}], 0x1, 0x0, 0x0, 0x0) dup2(r5, r4) recvmmsg(r5, &(0x7f0000003ac0)=[{{&(0x7f00000000c0)=@alg, 0x80, &(0x7f0000000640)=[{&(0x7f0000000140)=""/89, 0x59}, {&(0x7f0000000040)=""/48, 0x30}, {&(0x7f0000000240)=""/98, 0x62}, {&(0x7f00000002c0)=""/235, 0xeb}, {&(0x7f00000003c0)=""/196, 0xc4}, {&(0x7f00000004c0)=""/106, 0x6a}, {&(0x7f0000000540)=""/27, 0x1b}, {&(0x7f0000000580)=""/132, 0x84}], 0x8}, 0x101}, {{0x0, 0x0, &(0x7f0000001c40)=[{&(0x7f00000006c0)=""/193, 0xc1}, {&(0x7f00000007c0)=""/158, 0x9e}, {&(0x7f0000000880)=""/188, 0xbc}, {&(0x7f0000000940)=""/168, 0xa8}, {&(0x7f0000000a00)=""/108, 0x6c}, {&(0x7f0000000a80)=""/170, 0xaa}, {&(0x7f0000000b40)=""/51, 0x33}, {&(0x7f0000000b80)=""/120, 0x78}, {&(0x7f0000000c00)=""/4096, 0x1000}, {&(0x7f0000001c00)}], 0xa, &(0x7f0000001d00)=""/32, 0x20}, 0x3f}, {{&(0x7f0000001d40)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000002080)=[{&(0x7f0000001dc0)=""/75, 0x4b}, {&(0x7f0000001e40)=""/104, 0x68}, {&(0x7f0000001ec0)=""/72, 0x48}, {&(0x7f0000001f40)=""/248, 0xf8}, {&(0x7f0000002040)=""/22, 0x16}], 0x5}, 0x4}, {{&(0x7f0000002100)=@in6={0xa, 0x0, 0x0, @mcast1}, 0x80, &(0x7f0000003600)=[{&(0x7f0000002180)=""/87, 0x57}, {&(0x7f0000002200)=""/84, 0x54}, {&(0x7f0000002280)=""/160, 0xa0}, {&(0x7f0000002340)=""/4096, 0x1000}, {&(0x7f0000003340)=""/174, 0xae}, {&(0x7f0000003400)=""/167, 0xa7}, {&(0x7f00000034c0)=""/89, 0x59}, {&(0x7f0000003540)=""/177, 0xb1}], 0x8, &(0x7f0000003680)=""/237, 0xed}, 0x80000001}, {{&(0x7f0000003780)=@x25={0x9, @remote}, 0x80, &(0x7f0000003980)=[{&(0x7f0000003800)=""/34, 0x22}, {&(0x7f0000003840)=""/127, 0x7f}, {&(0x7f00000038c0)=""/90, 0x5a}, {&(0x7f0000003940)=""/17, 0x11}], 0x4, &(0x7f00000039c0)=""/252, 0xfc}, 0x81}], 0x5, 0x0, &(0x7f0000003c00)={0x0, 0x989680}) ppoll(&(0x7f00000001c0)=[{r3}], 0x1, 0x0, 0x0, 0x0) dup2(r3, r2) shutdown(r3, 0x1) sendto$inet6(r0, 0x0, 0x0, 0x4801, &(0x7f0000000080)={0xa, 0x4e23, 0x53, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010100}, 0x4}, 0x1c) 17:51:53 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000007e01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:51:53 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0, 0x0, 0x0, 0x0, 0xffff80fe}}], 0x2, 0x0) 17:51:53 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000018401000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:51:53 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffff801, 0x0, @perf_bp={&(0x7f0000000000), 0xdc09}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = fork() perf_event_open(&(0x7f0000000200)={0x0, 0x80, 0x20, 0x5, 0x8, 0x0, 0x0, 0xffff, 0x1010, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1ff, 0x2, @perf_bp={&(0x7f0000000080), 0x1}, 0x401a8, 0x3, 0x9, 0x8, 0x7fffffff, 0x2, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x10, 0xffffffffffffffff, 0x1) r3 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r3, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r4 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r4, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) ioctl$EVIOCGSW(r4, 0x8040451b, &(0x7f0000001540)) r5 = syz_open_dev$tty20(0xc, 0x4, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f0000000280)=""/181) ppoll(&(0x7f0000001480)=[{r5, 0x200}, {0xffffffffffffffff, 0xc255}, {r6, 0x208}, {0xffffffffffffffff, 0xa280}, {r3, 0x20}, {0xffffffffffffffff, 0x142}, {r1, 0x40}], 0x7, &(0x7f00000014c0)={0x0, 0x3938700}, &(0x7f0000001500)={[0x583]}, 0x8) 17:51:53 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0, 0x0, 0x0, 0x0, 0xffffc0fe}}], 0x2, 0x0) 17:51:53 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f00000000ffffff8501000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:51:53 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0xffffffcc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:51:53 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0, 0x0, 0x0, 0x0, 0xfffffdef}}], 0x2, 0x0) 17:51:53 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000018601000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:51:53 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x300}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:51:53 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0, 0x0, 0x0, 0x0, 0xffffff7f}}], 0x2, 0x0) 17:51:54 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0, 0x0, 0x0, 0x0, 0xffffffe0}}], 0x2, 0x0) 17:51:54 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000018901000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:51:54 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0xfffffff6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:51:54 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffff801, 0x0, @perf_bp={&(0x7f0000000000), 0xdc09}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = fork() perf_event_open(&(0x7f0000000200)={0x0, 0x80, 0x20, 0x5, 0x8, 0x0, 0x0, 0xffff, 0x1010, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1ff, 0x2, @perf_bp={&(0x7f0000000080), 0x1}, 0x401a8, 0x3, 0x9, 0x8, 0x7fffffff, 0x2, 0x2, 0x0, 0x7, 0x0, 0x3}, r1, 0x10, 0xffffffffffffffff, 0x1) r2 = syz_open_dev$evdev(&(0x7f0000000100), 0x1, 0x0) ioctl$EVIOCSKEYCODE_V2(r2, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r3 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r3, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) ioctl$EVIOCGSW(r3, 0x8040451b, &(0x7f0000001540)) r4 = syz_open_dev$tty20(0xc, 0x4, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) ppoll(&(0x7f0000001480)=[{r4, 0x200}, {0xffffffffffffffff, 0xc255}, {r5, 0x208}, {0xffffffffffffffff, 0xa280}, {r2, 0x20}, {0xffffffffffffffff, 0x142}, {r0, 0x40}], 0x7, &(0x7f00000014c0)={0x0, 0x3938700}, &(0x7f0000001500)={[0x583]}, 0x8) 17:51:54 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) r3 = socket$inet6(0xa, 0x80803, 0x5) setsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@multicast1, @in6=@private2, 0x0, 0x0, 0x4, 0x1ff, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local, 0x0, 0x2b}, 0x0, @in6=@private1}}, 0xe8) connect$inet6(r3, &(0x7f00000000c0), 0x1c) r4 = socket$inet6_udp(0xa, 0x2, 0x0) r5 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000280)={'sit0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000000)={'veth1_to_bridge\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r4, 0x89f7, &(0x7f0000000140)={'sit0\x00', &(0x7f00000000c0)={'syztnl2\x00', r7, 0x16, 0xbc, 0x80, 0x6, 0x8, @dev={0xfe, 0x80, '\x00', 0x38}, @empty, 0x20, 0x20, 0x9, 0x4}}) ioctl$sock_inet6_SIOCADDRT(r4, 0x890b, &(0x7f0000000040)={@mcast1, @local, @private2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa2420200, r6}) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r3, 0x89fb, &(0x7f0000000140)={'sit0\x00', &(0x7f0000000080)={'ip6tnl0\x00', r6, 0x0, 0x7f, 0xad, 0x3, 0x70, @private0, @dev={0xfe, 0x80, '\x00', 0x29}, 0x7800, 0x7800, 0x80000001, 0x6}}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000000)=0x8, 0x4) ppoll(&(0x7f00000001c0)=[{r2}], 0x1, 0x0, 0x0, 0x0) dup2(r2, r1) sendmsg$inet(r2, &(0x7f0000000180)={&(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10, &(0x7f0000000040)=[{&(0x7f00000000c0)="32047dd1a7da3f3aef1e5970d711d4fa7c75d547b06def033b2f832170fa97ed7d8d927f4e9052ec6e335bf1616c71a4fcfca70c3329fbbf504092728b91c1f634dabd7a9ec4c2d1a8a6b09b4175453a1e21638b4f64ad97da1039f5deda0c7e66dc0a8a9405942a5b07c0c7e0c0797f156372c319fba74100aae5a8c170792cb40bebfded4f883a48e394968fee6548ff0f00000000000005c84c180be1652242e85e610da2aaa7638caf67d63b569c", 0xb0}], 0x1}, 0x20000005) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x4}, 0x1c) 17:51:54 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x300}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:51:54 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0, 0x0, 0x0, 0x0, 0xfffffff5}}], 0x2, 0x0) 17:51:54 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000018a01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:51:54 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0}}], 0x2, 0x0) 17:51:54 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f00000000ffffff8c01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:51:54 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0}, 0x2}], 0x2, 0x0) 17:51:54 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f00000000ffffff9701000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:51:54 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x300}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:51:54 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0}, 0x3}], 0x2, 0x0) 17:51:54 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000009c01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:51:54 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0}, 0x4}], 0x2, 0x0) 17:51:55 executing program 4: r0 = open_tree(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x8800) sendmsg$SEG6_CMD_SET_TUNSRC(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB="24000000f0beddf37dbb163b06f73f3c0cef78b4e3a7b5b5adf7", @ANYRES16=0x0, @ANYBLOB="000126bd7000fddbdf250300000008000200030000000500050002000000"], 0x24}}, 0x4004800) r1 = socket$inet6_udp(0xa, 0x2, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x4}, 0x1c) 17:51:55 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0xfffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:51:55 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffff801, 0x0, @perf_bp={&(0x7f0000000000), 0xdc09}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = fork() perf_event_open(&(0x7f0000000200)={0x0, 0x80, 0x20, 0x5, 0x8, 0x0, 0x0, 0xffff, 0x1010, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1ff, 0x2, @perf_bp={&(0x7f0000000080), 0x1}, 0x401a8, 0x3, 0x9, 0x8, 0x7fffffff, 0x2, 0x2, 0x0, 0x7, 0x0, 0x3}, r1, 0x10, 0xffffffffffffffff, 0x1) r2 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r2, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r3 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r3, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) ioctl$EVIOCGSW(r3, 0x8040451b, &(0x7f0000001540)) r4 = syz_open_dev$tty20(0xc, 0x4, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) ppoll(&(0x7f0000001480)=[{r4, 0x200}, {0xffffffffffffffff, 0xc255}, {r5, 0x208}, {0xffffffffffffffff, 0xa280}, {r2, 0x20}, {0xffffffffffffffff, 0x142}, {r0, 0x40}], 0x7, &(0x7f00000014c0)={0x0, 0x3938700}, &(0x7f0000001500)={[0x583]}, 0x8) 17:51:55 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x300}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:51:55 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0}, 0x5}], 0x2, 0x0) 17:51:55 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f00000000000003ae01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:51:55 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0}, 0x6}], 0x2, 0x0) 17:51:55 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f00000000000003af01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:51:55 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0}, 0x7}], 0x2, 0x0) 17:51:55 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) r3 = accept$inet6(r0, 0x0, &(0x7f0000000000)) ioctl$sock_inet6_SIOCDELRT(r3, 0x890c, &(0x7f0000000040)={@private1={0xfc, 0x1, '\x00', 0x1}, @remote, @mcast2, 0x3, 0x5, 0x4, 0x100, 0x5}) setuid(r2) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f00000000c0)={{{@in=@empty, @in=@initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e20, 0x0, 0x4e21, 0xf97f, 0x2, 0x0, 0x0, 0x84, 0x0, r2}, {0x9e, 0x3, 0x800, 0x3, 0x3, 0x53cd, 0x1ff, 0x81}, {0xffffffffffffffff, 0x7ff, 0x9, 0x4}, 0x5, 0x6e6bb9, 0x2, 0x95b2c623015de1ff, 0x3, 0x2}, {{@in6=@mcast1, 0x4d5, 0xff}, 0xa, @in=@initdev={0xac, 0x1e, 0x1, 0x0}, 0x3503, 0x2, 0x3, 0x4, 0x9, 0x8, 0x1}}, 0xe8) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r5, &(0x7f00000bd000), 0x318, 0x0) ppoll(&(0x7f00000001c0)=[{r5}], 0x1, 0x0, 0x0, 0x0) r6 = open_tree(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', 0x8800) write$P9_RWALK(r6, &(0x7f0000000400)={0x30, 0x6f, 0x2, {0x3, [{0x1, 0x1, 0x3}, {0x4, 0x0, 0x2}, {0x40, 0x2, 0x2}]}}, 0x30) dup2(r5, r4) getpeername(r4, &(0x7f00000002c0)=@l2={0x1f, 0x0, @none}, &(0x7f0000000340)=0x80) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000000200)={'wg2\x00'}) r7 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000380), 0x100, 0x0) ftruncate(r7, 0x9) syz_io_uring_setup(0x2bb3, &(0x7f0000000000), &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006dd000/0x3000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r8, r9, &(0x7f0000000140)=@IORING_OP_OPENAT2={0x1c, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000080)={0x200080}, &(0x7f00000000c0)='./file0\x00', 0x18}, 0x0) syz_io_uring_submit(r8, 0x0, &(0x7f00000001c0)=@IORING_OP_ASYNC_CANCEL={0xe, 0x1, 0x0, 0x0, 0x0, 0x12345}, 0x8) 17:51:55 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f00000000000003b001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:51:55 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0}, 0x8}], 0x2, 0x0) 17:51:55 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f00000000000003b101000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:51:55 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:51:55 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f00000000fc281eb201000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:51:55 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0}, 0xf}], 0x2, 0x0) 17:51:55 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x300}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:51:55 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffff801, 0x0, @perf_bp={&(0x7f0000000000), 0xdc09}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = fork() perf_event_open(&(0x7f0000000200)={0x0, 0x80, 0x20, 0x5, 0x8, 0x0, 0x0, 0xffff, 0x1010, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1ff, 0x2, @perf_bp={&(0x7f0000000080), 0x1}, 0x401a8, 0x3, 0x9, 0x8, 0x7fffffff, 0x2, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x10, 0xffffffffffffffff, 0x1) r3 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r3, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r4 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) recvmmsg$unix(r0, &(0x7f0000002c00)=[{{&(0x7f0000000300)=@abs, 0x6e, &(0x7f0000001680)=[{&(0x7f0000000380)=""/98, 0x62}, {&(0x7f0000000400)=""/4096, 0x1000}, {&(0x7f0000001400)=""/71, 0x47}, {&(0x7f0000001540)=""/77, 0x4d}, {&(0x7f00000015c0)=""/143, 0x8f}], 0x5, &(0x7f00000000c0)=[@cred={{0x1c, 0x1, 0x2, {0x0}}}], 0x20}}, {{&(0x7f0000001700)=@abs, 0x6e, &(0x7f0000002a80)=[{&(0x7f0000001780)=""/4096, 0x1000}, {&(0x7f0000000140)=""/25, 0x19}, {&(0x7f0000002780)=""/107, 0x6b}, {&(0x7f0000002800)=""/250, 0xfa}, {&(0x7f0000002900)=""/176, 0xb0}, {&(0x7f00000029c0)=""/189, 0xbd}], 0x6, &(0x7f0000002b00)=[@rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xf0}}], 0x2, 0x40000020, &(0x7f0000002c80)={0x77359400}) r6 = syz_open_dev$vcsu(&(0x7f0000002cc0), 0x8, 0x40000) perf_event_open(&(0x7f0000000280)={0x5, 0x80, 0xfe, 0x6, 0xeb, 0x6, 0x0, 0x5, 0x80, 0x11, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x2, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7f, 0x2, @perf_config_ext={0x1, 0x101}, 0x8004, 0x7fff, 0x7f, 0x6, 0x0, 0xffff0001, 0x80, 0x0, 0x7fffffff, 0x0, 0x9}, r5, 0x8, r6, 0x0) ioctl$EVIOCSKEYCODE_V2(r4, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) ioctl$EVIOCGSW(r4, 0x8040451b, &(0x7f0000001540)) r7 = syz_open_dev$tty20(0xc, 0x4, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) ppoll(&(0x7f0000001480)=[{r7, 0x200}, {0xffffffffffffffff, 0xc255}, {r8, 0x208}, {0xffffffffffffffff, 0xa280}, {r3, 0x20}, {0xffffffffffffffff, 0x142}, {r1, 0x40}], 0x7, &(0x7f00000014c0)={0x0, 0x3938700}, &(0x7f0000001500)={[0x583]}, 0x8) 17:51:55 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:51:55 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0}, 0x10}], 0x2, 0x0) 17:51:55 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f00000000000000b801000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:51:56 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet(r0, &(0x7f0000000980)=[{{&(0x7f0000000000)={0x2, 0x4e20, @multicast1}, 0x10, &(0x7f0000000100)=[{&(0x7f0000000040)="68f6cb1abee1f99be2719b53846257a216629f4c9ad3344e7d8795f773a9c4ff47ac", 0x22}, {&(0x7f00000000c0)="0b6867b7100a1a2b9b730149688c", 0xe}], 0x2, &(0x7f0000000140)=[@ip_retopts={{0x50, 0x0, 0x7, {[@lsrr={0x83, 0x7, 0x18, [@multicast2]}, @lsrr={0x83, 0x1f, 0x88, [@loopback, @rand_addr=0x64010101, @dev={0xac, 0x14, 0x14, 0x2c}, @private=0xa010101, @loopback, @dev={0xac, 0x14, 0x14, 0x37}, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @cipso={0x86, 0x14, 0x1, [{0x2, 0xe, "bf9a5ed145b4e3ed671535bb"}]}, @ra={0x94, 0x4}, @noop]}}}], 0x50}}, {{&(0x7f00000001c0)={0x2, 0x4e21, @broadcast}, 0x10, &(0x7f0000000740)=[{&(0x7f0000000200)="734aaea7184fd40c379f4ec4930c3bffa4ed7bda1de14c21da0b552546d7f6ba8620200e3f7fb7130e517ba63fd7592bc6381abae6a4f8193a0e7dba968d80962c7798abcc60f121577758c8db09e5b397ee0692e3baad29abdedff6f0c3d54d01b12f6ea510308b4a6e8f4c41f3d345ece6ace4adff55678eb885826b4531515096cdc8f23bc381ee6e0e2491925ebdd3fde692532964cb3f300015937e1c8584c79406effbf52e4fd658278cac1ddbb46a4b8317eade6dcc73fbfbb050b7199997c2eb64916b7494281a3338dc4e6fb0b5d630de1b50b3e1b6dd7b048b90d4ab590eebeaa7b37968360f4bb97a5b0dfd", 0xf1}, {&(0x7f0000000300)="e256bcbc92874aa97566c2522a259030090eb407be53040734f3b4a993c3f2077e86a1ba67713e12008ca541358c4828f60441a055b8c362b7f42e7749b8d6ce8b68242852f99cfc73fd95d156d19e14485eb3eb88075764c731241e84ccdffdc926120b3f1940bc54f90e4d7110d036c6eec3c4d8f05d3fda95050a97bc682f8f6635a9a18ca046aef141e8b99f90cefffc89e692e7f8f6d4861db714826d56fddb2d194817f7d84b01b3eb09c34c8bdc95be4545e482516e7ec71d0e93cd53b88149cabdcf657b8f8277379a95", 0xce}, {&(0x7f0000000400)="888532f22ecb9d1112ef04b36ccc1068ec2662e83eec197ae4eeae7ebb1d3ee7ee266bdf7c2adfc56d17b21d8f2db1753c4097442fcaa63aa3bc5665a103d1b52fe1483a4b69786358bc1067986239d50e362c729a03113890184d6c3d57564679756425ce", 0x65}, {&(0x7f0000000480)="8295a7293e263bc77907018fc17b6222515200bdfd9cc335a19ee0de2109b181686bfc6952a833613edf32df4a3fc8d1552398683274f84c9d334aaa8dddd4c88ff9b33aedeaee1713109ecf2d15a417d14f8b2bb8cba8af477a43fb1d33e01e071c0721d45a7672f816c4f40fa18e84541d492fac2e3ab7eefd8490a0e0d3e131b44bda0f56304589be6a2424db731443ccc9ce3d027264e90c94384c1ba76e62c7641d467911e7bbf014eb78b136e243643f9a8034bf4b2b6e15d0f7627dacd8", 0xc1}, {&(0x7f0000000580)="654e71674bb9669cdf92bd5ee1f29b79b1961dad6a6b906e9d575652577e70c1b1241bbb949dadbb354619c81b7155a72983c7cb4083ca558cce3bed87ffc802436d3571962d561a0349f25952574000382a10e27bf36f379e0c34dc7d5e50e131cc7e19f25e306829cb7e1844ba9522f983b24115459d85e45174bc86ffb65b5b3af37eee579abce9a0dd616ed02f3f8315e0f259b366569390cc984648994401865711d46fcc3d981aa6", 0xab}, {&(0x7f0000000640)="73d8bfe8a2d526e49ecb4c7469bfa972a2160fa9f761cafa3c9dd15d34ccf07f265baa461c1e084e975a8164b508194e6486366c92d99992ad21d893c999af4b8104ad14790e70a283fbe36f85bc00fa79c208d7319a7845b62dc8cfae7f5fc4ac85f8f02a062591fe4a1e30003c26fe002f46054e9ef734285fd318e7d9ca8e180626988aa440c790dc87d3582bb81f25c2733aebb4f1a36c0841a64820dc357d842081552398020cd345e30e5f710574d02eea9f4c2213389f024547d799d4c3f1e50381adfa3a997bd1a12fd7d454222e853359c07742b8", 0xd9}], 0x6, &(0x7f00000007c0)=[@ip_ttl={{0x14, 0x0, 0x2, 0x101}}, @ip_retopts={{0x130, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x2c, 0xae, 0x3, 0x6, [{@dev={0xac, 0x14, 0x14, 0x16}, 0x9}, {@broadcast, 0x774}, {@empty, 0x40}, {@dev={0xac, 0x14, 0x14, 0x31}, 0x7}, {@local, 0x40}]}, @cipso={0x86, 0x29, 0x1, [{0x6, 0x5, '^/.'}, {0x6, 0x5, "58a579"}, {0x7, 0xd, "8ecb55b8b1d1b6b76d555e"}, {0x2, 0x3, "9c"}, {0x6, 0x9, "f0438f2098fdd5"}]}, @end, @cipso={0x86, 0xe, 0x3, [{0x6, 0x8, "8fb623259245"}]}, @cipso={0x86, 0xd, 0x1, [{0x2, 0x7, "7a7b874aa1"}]}, @ssrr={0x89, 0xf, 0x7a, [@empty, @multicast1, @remote]}, @cipso={0x86, 0x4e, 0x0, [{0x6, 0xe, "0773636bbf5221c29de1e2d2"}, {0x5, 0x2}, {0x5, 0x2}, {0x5, 0x9, "81d5f758979f56"}, {0x0, 0x10, "4ba8f6cfc2ea6a4a482afc4bb14c"}, {0x6, 0xc, "c4e311039dd5af61e923"}, {0x7, 0x11, "11b5b73617329776a1584e6992e134"}]}, @timestamp_prespec={0x44, 0x44, 0x78, 0x3, 0xc, [{@multicast2, 0xffffffff}, {@empty, 0x101}, {@local, 0x81}, {@private=0xa010101, 0x4}, {@rand_addr=0x64010100, 0x9}, {@broadcast, 0xff}, {@dev={0xac, 0x14, 0x14, 0x36}, 0x1}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0xc39e}]}, @generic={0x7, 0xd, "6039cfe7a4591ad49aa6b4"}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x8}}, @ip_ttl={{0x14, 0x0, 0x2, 0x5}}, @ip_ttl={{0x14, 0x0, 0x2, 0x6}}], 0x190}}], 0x2, 0x800) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x4}, 0x1c) 17:51:56 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0}, 0x28}], 0x2, 0x0) 17:51:56 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f00000000000000b901000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:51:56 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffff801, 0x0, @perf_bp={&(0x7f0000000000), 0xdc09}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = fork() r2 = perf_event_open(&(0x7f0000000200)={0x0, 0x80, 0x20, 0x5, 0x8, 0x0, 0x0, 0xffff, 0x1010, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1ff, 0x2, @perf_bp={&(0x7f0000000080), 0x1}, 0x401a8, 0x3, 0x9, 0x8, 0x7fffffff, 0x2, 0x2, 0x0, 0x7, 0x0, 0x3}, r1, 0x10, 0xffffffffffffffff, 0x1) r3 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r3, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r4 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) vmsplice(r2, &(0x7f00000000c0)=[{&(0x7f0000000280)="1e218e9c230c133f5dd87e4c849861bcf3a9a34921558487a762d8189ec27e0e48fe6425190f9e318b387121218d99d21d0af0a19d90269facaca1cae255ccee1749818c6ed53d1f597c455f82ed", 0x4e}, {&(0x7f0000000300)="b67c95e5d3a72073a50c045df7fe4e88235f2703c43da07431c4ef854c8085d54dcaa4e7173298ee42c450e8539ccbdc891aa32b7effa0bb727e58fb5bdc2637eeb781ed732dd6b8133d658d68ff480509dfe2f28e491fb5fe0c0199b33e7724526e527160782c4e35248f8915c0f07ccacf795f142cd1f20358322eaa51e36baf8524e254bf51fb83156a22d618bc14bbfa28672bc4fec8a10cf14a75ff761f45dff9648c1fe5c327877ebb100dc8a1ca291c0b277b0ea923c3e0d72e8bb6e4ffcc04", 0xc3}], 0x2, 0x4) ioctl$EVIOCSKEYCODE_V2(r4, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) ioctl$EVIOCGSW(r4, 0x8040451b, &(0x7f0000001540)) r5 = syz_open_dev$tty20(0xc, 0x4, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) ppoll(&(0x7f0000001480)=[{r5, 0x200}, {0xffffffffffffffff, 0xc255}, {r6, 0x208}, {0xffffffffffffffff, 0xa280}, {r3, 0x20}, {0xffffffffffffffff, 0x142}, {r0, 0x40}], 0x7, &(0x7f00000014c0)={0x0, 0x3938700}, &(0x7f0000001500)={[0x583]}, 0x8) 17:51:56 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:51:56 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x300}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:51:56 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0}, 0x29}], 0x2, 0x0) 17:51:56 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f00000000000000bc01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:51:56 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'veth1_to_bridge\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r1, 0x89f7, &(0x7f0000000140)={'sit0\x00', &(0x7f00000000c0)={'syztnl2\x00', r2, 0x16, 0xbc, 0x80, 0x6, 0x8, @dev={0xfe, 0x80, '\x00', 0x38}, @empty, 0x20, 0x20, 0x9, 0x4}}) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0xc4000, 0x0) r5 = syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000180)={0x14, r5, 0x1, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r4, &(0x7f0000000380)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000200)={0x64, r5, 0x200, 0x70bd25, 0x25dfdbff, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x50, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}]}, 0x64}, 0x1, 0x0, 0x0, 0x4}, 0x250c8e04860779a5) dup2(r4, r1) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r4, 0x89f0, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x2f, 0x1, 0x9, 0x8ce, 0x14, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast1, 0x40, 0x8000, 0x879f, 0x8000}}) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x4}, 0x1c) 17:51:56 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0}, 0x60}], 0x2, 0x0) 17:51:56 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x300}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:51:56 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f00000000000002bc01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:51:56 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0}, 0xfc}], 0x2, 0x0) 17:51:56 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000edc001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:51:56 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x24002800, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast1, 0x4}, 0x1c) 17:51:56 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffff801, 0x0, @perf_bp={&(0x7f0000000000), 0xdc09}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = fork() perf_event_open(&(0x7f0000000200)={0x0, 0x80, 0x20, 0x5, 0x8, 0x0, 0x0, 0xffff, 0x1010, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1ff, 0x2, @perf_bp={&(0x7f0000000080), 0x1}, 0x401a8, 0x3, 0x9, 0x8, 0x7fffffff, 0x2, 0x2, 0x0, 0x7, 0x0, 0x3}, r1, 0x10, 0xffffffffffffffff, 0x1) r2 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r2, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed0000003ec13e20000000eb00df0000000000001f00"}) r3 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r3, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) ioctl$EVIOCGSW(r3, 0x8040451b, &(0x7f0000001540)) r4 = syz_open_dev$tty20(0xc, 0x4, 0x1) r5 = syz_open_dev$vcsu(&(0x7f00000000c0), 0x1, 0x4000) ioctl$EVIOCSREP(r5, 0x40084503, &(0x7f0000000140)=[0x800, 0x82]) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) ppoll(&(0x7f0000001480)=[{r4, 0x200}, {0xffffffffffffffff, 0xc255}, {r6, 0x208}, {0xffffffffffffffff, 0xa280}, {r2, 0x20}, {0xffffffffffffffff, 0x142}, {r0, 0x40}], 0x7, &(0x7f00000014c0)={0x0, 0x3938700}, &(0x7f0000001500)={[0x583]}, 0x8) 17:51:56 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0}, 0x300}], 0x2, 0x0) 17:51:56 executing program 4: r0 = socket$inet_icmp(0x2, 0x2, 0x1) ioctl$FIOCLEX(r0, 0x5451) r1 = socket$inet6_udp(0xa, 0x2, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x4}, 0x1c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x2b, &(0x7f00000003c0)="8d31e183156939000000e28c0b1dd2a357b265c8745b78376e18cd3d3dfcb946cf885a21539a0c4a081cee"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x38) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) wait4(0x0, 0x0, 0x0, 0x0) r4 = gettid() wait4(0x0, 0x0, 0x4, 0x0) fork() tkill(r4, 0x34) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) ppoll(&(0x7f00000001c0)=[{r2}], 0x1, 0x0, 0x0, 0x0) 17:51:56 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:51:56 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f00000000000003c101000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:51:56 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f00000000000003d601000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:51:56 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0}, 0x500}], 0x2, 0x0) 17:51:56 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x300}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:51:56 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4}, 0x1c) 17:51:56 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0}, 0x5a0}], 0x2, 0x0) 17:51:56 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f00000000ffffffda01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:51:56 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:51:57 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffff801, 0x0, @perf_bp={&(0x7f0000000000), 0xdc09}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = fork() perf_event_open(&(0x7f0000000200)={0x0, 0x80, 0x20, 0x5, 0x8, 0x0, 0x0, 0xffff, 0x1010, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1ff, 0x2, @perf_bp={&(0x7f0000000080), 0x1}, 0x401a8, 0x3, 0x9, 0x8, 0x7fffffff, 0x2, 0x2, 0x0, 0x7, 0x0, 0x3}, r1, 0x10, 0xffffffffffffffff, 0x1) r2 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r2, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r3 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r3, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) ioctl$EVIOCGSW(r3, 0x8040451b, &(0x7f0000001540)) r4 = syz_open_dev$tty20(0xc, 0x4, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) ppoll(&(0x7f0000001480)=[{r4, 0x200}, {0xffffffffffffffff, 0xc255}, {r5, 0x208}, {0xffffffffffffffff, 0xa280}, {r2, 0x20}, {0xffffffffffffffff, 0x142}, {r0, 0x40}], 0x7, &(0x7f00000014c0)={0x0, 0x3938700}, &(0x7f0000001500)={[0x583]}, 0x8) r6 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/module/netconsole', 0x206a80, 0x2) ioctl$EVIOCGLED(r6, 0x80404519, &(0x7f0000000280)=""/4096) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, &(0x7f0000000140)={'sit0\x00', &(0x7f00000000c0)={'syztnl2\x00', 0x0, 0x16, 0xbc, 0x80, 0x6, 0x8, @dev={0xfe, 0x80, '\x00', 0x38}, @empty, 0x20, 0x20, 0x9, 0x4}}) r8 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0xc4000, 0x0) r9 = syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000180)={0x14, r9, 0x1, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r8, &(0x7f0000000380)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000001280)=ANY=[@ANYBLOB='d\x00\x00\x00', @ANYRES16=r9, @ANYBLOB="000225bd7000ffdbdf250500000050000180080003000100000008000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=r7, @ANYBLOB="140002006272696467655f736c6176655f30000008000100", @ANYRES32=0x0, @ANYBLOB="0800030000000000297bace847ea0926be661c48f0afb7dd37a72e4cc4090ac07059f6b1e635fbe69a1a723a462c06db391e64241ddc9404563ebf899599852337c7489a28921bf977a0e07a51a4b5f21c2b8916c78e6d6fddceefa765810b8819f40db2f124c4a6320283aaab10b682589808664bdaabb28a47cf990908f211e8c00d96c73c4e58d3b35cf3281c179971a116e58818385d38bedb0263e113daaf827c3ad5ed313210d43023948d182eda5fd6a47e159383f58eb1a61ff6907df316d72c70ff4c56b0b5f9ebcd"], 0x64}, 0x1, 0x0, 0x0, 0x4}, 0x250c8e04860779a5) ioctl$EVIOCGKEYCODE_V2(r8, 0x80284504, &(0x7f0000000140)=""/40) 17:51:57 executing program 4: sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x4}, 0x1c) 17:51:57 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f00000000ffffffe201000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:51:57 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0}, 0x5c8}], 0x2, 0x0) 17:51:57 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x300}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:51:57 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:51:57 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0}, 0x600}], 0x2, 0x0) 17:51:57 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f00000000000002f001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:51:57 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0}, 0x700}], 0x2, 0x0) 17:51:57 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) io_setup(0x36498e4, &(0x7f0000000040)=0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) ppoll(&(0x7f00000001c0)=[{r3}], 0x1, 0x0, 0x0, 0x0) dup2(r3, r2) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000000)={'veth1_to_bridge\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r4, 0x89f7, &(0x7f0000000140)={'sit0\x00', &(0x7f00000000c0)={'syztnl2\x00', r5, 0x16, 0xbc, 0x80, 0x6, 0x8, @dev={0xfe, 0x80, '\x00', 0x38}, @empty, 0x20, 0x20, 0x9, 0x4}}) r7 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0xc4000, 0x0) r8 = syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000180)={0x14, r8, 0x1, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r7, &(0x7f0000000380)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000200)={0x64, r8, 0x200, 0x70bd25, 0x25dfdbff, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x50, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}]}, 0x64}, 0x1, 0x0, 0x0, 0x4}, 0x250c8e04860779a5) io_submit(r1, 0x4, &(0x7f0000002300)=[&(0x7f0000001080)={0x0, 0x0, 0x0, 0x3, 0x4, r0, &(0x7f0000000080)="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", 0x1000, 0x7fff}, &(0x7f0000001180)={0x0, 0x0, 0x0, 0x8, 0x10, r0, &(0x7f00000010c0)="e7998f41e5b4f4a8ec89554f07dff7b9093a7a63f492386e689f89edc9c4c7eece95af3730e272ac6b07c4677b3b788df2357cca75f9cb7409fdc9a0f6ea706878f141bee943d90f4067488b0c81d79c98234b26d977c5c8bf479f82cca578aa6aabe28ec0c7bbc8fb8a4584d7de73e6418350478df323e14a7bfd22cff85c88057351d12f751f7c2417fd9f141047", 0x8f, 0x7, 0x0, 0x2}, &(0x7f0000001280)={0x0, 0x0, 0x0, 0x2, 0x3, r3, &(0x7f00000011c0)="d2471c01b62dfd42770051e4836709425a29f17edd3f0b425ab50d0b0d999d34fd347487fce7b70107bedc4eac99b3382b3581b16cb23e96c92ddaee8feea9443ccb989c1c0d15f11206cb2ae7e3ac619099afc808ef018ed153c6fd846ee49dce9d13032c97d03c0fecc4357130e0a2446133ae054978ceb7ba2cbdd4b5464ae476cc341b1c8cd57bc8ca27ccece73fc4a4a00fcb35e1079d8895d55aa52edfcce2cdd84afaccd5c2369ae641888d814fc17fce", 0xb4, 0x2, 0x0, 0x3, r7}, &(0x7f00000022c0)={0x0, 0x0, 0x0, 0x6, 0xffff, r0, &(0x7f00000012c0)="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", 0x1000, 0xda3f}]) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @private1={0xfc, 0x1, '\x00', 0x1}, 0x4}, 0x1c) 17:51:57 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0}, 0x810}], 0x2, 0x0) 17:51:57 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f00000000fffffff401000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:51:57 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffff801, 0x0, @perf_bp={&(0x7f0000000000), 0xdc09}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = fork() perf_event_open(&(0x7f0000000200)={0x0, 0x80, 0x20, 0x5, 0x8, 0x0, 0x0, 0xffff, 0x1010, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1ff, 0x2, @perf_bp={&(0x7f0000000080), 0x1}, 0x401a8, 0x3, 0x9, 0x8, 0x7fffffff, 0x2, 0x2, 0x0, 0x7, 0x0, 0x3}, r1, 0x10, 0xffffffffffffffff, 0x1) r2 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r2, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x1, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r3 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r3, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) ioctl$EVIOCGSW(r3, 0x8040451b, &(0x7f0000001540)) r4 = syz_open_dev$tty20(0xc, 0x4, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) r6 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000000)={'veth1_to_bridge\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r6, 0x89f7, &(0x7f0000000140)={'sit0\x00', &(0x7f00000000c0)={'syztnl2\x00', r7, 0x16, 0xbc, 0x80, 0x6, 0x8, @dev={0xfe, 0x80, '\x00', 0x38}, @empty, 0x20, 0x20, 0x9, 0x4}}) r9 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0xc4000, 0x0) r10 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000280), r9) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000180)={0x14, r10, 0x1, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r9, &(0x7f0000000380)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000200)={0x64, r10, 0x200, 0x70bd25, 0x25dfdbff, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x50, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}]}, 0x64}, 0x1, 0x0, 0x0, 0x4}, 0x250c8e04860779a5) ioctl$EVIOCSKEYCODE_V2(r9, 0x40284504, &(0x7f00000000c0)={0x3, 0x1e, 0x101, 0xfffffffd, "d97dcea4a8d1e16a17fb6855df08e24007cfee021b51bcea549b42833c6dfe9f"}) ppoll(&(0x7f0000001480)=[{r4, 0x200}, {0xffffffffffffffff, 0xc255}, {r5, 0x208}, {0xffffffffffffffff, 0xa280}, {r2, 0x20}, {0xffffffffffffffff, 0x142}, {r0, 0x40}], 0x7, &(0x7f00000014c0)={0x0, 0x3938700}, &(0x7f0000001500)={[0x583]}, 0x8) 17:51:57 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0}, 0xf00}], 0x2, 0x0) 17:51:57 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f00000000fffffff501000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:51:57 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x300}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:51:57 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:51:57 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0}, 0x1008}], 0x2, 0x0) 17:51:57 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f00000000fffffff601000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:51:57 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f0000000000000ff801000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:51:58 executing program 4: open(&(0x7f0000000000)='./file0\x00', 0x101000, 0x80) r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x4}, 0x1c) 17:51:58 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0}, 0x2800}], 0x2, 0x0) 17:51:58 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f00000000fffffdf901000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:51:58 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:51:58 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffff801, 0x0, @perf_bp={&(0x7f0000000000), 0xdc09}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = fork() perf_event_open(&(0x7f0000000200)={0x0, 0x80, 0x20, 0x5, 0x8, 0x0, 0x0, 0xffff, 0x1010, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1ff, 0x2, @perf_bp={&(0x7f0000000080), 0x1}, 0x401a8, 0x3, 0x9, 0x8, 0x7fffffff, 0x2, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x10, 0xffffffffffffffff, 0x1) r3 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r3, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r4 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r4, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) ioctl$EVIOCGSW(r4, 0x8040451b, &(0x7f0000001540)) r5 = syz_open_dev$tty20(0xc, 0x4, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) io_uring_enter(r0, 0x2145, 0x394, 0x2, &(0x7f00000000c0)={[0x8]}, 0x8) ppoll(&(0x7f0000001480)=[{r5, 0x200}, {0xffffffffffffffff, 0xc255}, {r6, 0x208}, {0xffffffffffffffff, 0xa280}, {r3, 0x20}, {0xffffffffffffffff, 0x142}, {r1, 0x40}], 0x7, &(0x7f00000014c0)={0x0, 0x3938700}, &(0x7f0000001500)={[0x583]}, 0x8) 17:51:58 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x300}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:51:58 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f00000000000003fa01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:51:58 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0}, 0x2900}], 0x2, 0x0) 17:51:58 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x4}, 0x1c) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc0c89425, &(0x7f00000000c0)={"31a91f66767b949d513552f1d999ed12", 0x0, 0x0, {0x0, 0x1}, {0x4, 0x40}, 0x137, [0xfff, 0x8, 0xe62, 0xfff, 0x0, 0x3, 0xdfbf, 0xb4, 0x2, 0x4, 0x2, 0x3, 0xe5, 0x81, 0x29, 0x100000000]}) 17:51:58 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0}, 0x3f00}], 0x2, 0x0) 17:51:58 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f00000000fffffffb01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:51:58 executing program 4: write(0xffffffffffffffff, &(0x7f0000000280)="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", 0xfa) r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x4}, 0x1c) sendto$inet6(r0, &(0x7f0000000040)="60cd399500bff92177d3981ec4f59a44d8b9489b6a177d4f61bd45bd6a07f08cab3f6379ef62c77c76f0424a6ec831f092582dd8", 0x34, 0x800, &(0x7f0000000100)={0xa, 0x4e22, 0x1, @empty, 0x7fff}, 0x1c) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@multicast1, @in6=@private2, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in=@local, 0x0, 0x2b}, 0x0, @in6=@private1}}, 0xe8) ftruncate(r0, 0xaa4) sendto$inet6(0xffffffffffffffff, &(0x7f0000000180)="8bb373953dfd815e56379b21a85d7e8b384ec0f51101000000e1ade69d07d36eeef875f798bf4ae35d92b9d93c32638fc9239dafb02f3aa634eb210b5a96746c85e84fa0dba6a8199008d39deeaf05cf7ec87045e2a5c8c80227ccee7692834b727df733f8d242479e0fb8af7a0c93e50976c01668234532df7da3b639d5dcf88cf0e491a68faca1072de3741878333671e47d7a098a0f1e25387418659c518cf3ef3f4654d2789cf9f13d5e00000029ba7c63c38258f76653eedc8d871b6a9645fce723a13ff0", 0xc7, 0x11, &(0x7f00000000c0)={0xa, 0x4e20, 0x20, @private2={0xfc, 0x2, '\x00', 0x1}, 0x2}, 0x1c) 17:51:58 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f00000000b21e28fc01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:51:58 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0}, 0x4000}], 0x2, 0x0) 17:51:58 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f00000000fffffdfd01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:51:58 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:51:58 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffff801, 0x0, @perf_bp={&(0x7f0000000000), 0xdc09}}, 0x0, 0x0, 0xffffffffffffffff, 0xa) r1 = fork() perf_event_open(&(0x7f0000000200)={0x0, 0x80, 0x20, 0x5, 0x8, 0x0, 0x0, 0xffff, 0x1010, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1ff, 0x2, @perf_bp={&(0x7f0000000080), 0x1}, 0x401a8, 0x3, 0x9, 0x8, 0x7fffffff, 0x2, 0x2, 0x0, 0x7, 0x0, 0x3}, r1, 0x10, 0xffffffffffffffff, 0x1) r2 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r2, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r3 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r3, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) ioctl$EVIOCGSW(r3, 0x8040451b, &(0x7f0000001540)) r4 = syz_open_dev$tty20(0xc, 0x4, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) ppoll(&(0x7f0000001480)=[{r4, 0x200}, {0xffffffffffffffff, 0xc255}, {r5, 0x208}, {0xffffffffffffffff, 0xa280}, {r2, 0x20}, {0xffffffffffffffff, 0x142}, {r0, 0x40}], 0x7, &(0x7f00000014c0)={0x0, 0x3938700}, &(0x7f0000001500)={[0x583]}, 0x8) 17:51:58 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0}, 0x6000}], 0x2, 0x0) 17:51:58 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x4}, 0x1c) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000280)={'sit0\x00'}) setsockopt$inet6_IPV6_HOPOPTS(r1, 0x29, 0x36, &(0x7f00000000c0)={0x3b, 0x29, '\x00', [@enc_lim={0x4, 0x1, 0xff}, @hao={0xc9, 0x10, @ipv4={'\x00', '\xff\xff', @multicast2}}, @generic={0x3, 0xc4, "4f4822779d3616ee40eda815bd1fd28114dae495e5d84d3dba616c8e9a05d03c67a10e39245db9dcf4b4d3c109e9e2ab12ea13dffa9383ee528f1bec19cc1b499ce48fe1029ce17036d5ebb6fadd1cbc7d2fab5f4d8dd3721b4a49c14fd7c371b0eb6aae4f51222a5c452c9f4a0966c8867b48ccf54fe8f6e18b11bf60866279a7308d2b32968294bec622cd2fe5917d212f60c89053ea7dbb6241026153c770da1544565592a237374c39432a5291e78c29a85b601583370b124d2c35fc2c95b9dc074f"}, @calipso={0x7, 0x10, {0x1, 0x2, 0x4, 0x4, [0x2]}}, @generic={0x40, 0x57, "721c85888a7e86c60996f8ae33f4e188bf6a62a65eb702b86487e2afcb7ee3f286c8ccd6e819fc0ac5764721c5984f19fc05fd4baaf93e0769265b33792ab2c66cd61a818469561d2734633cc2014c106c62ff80e69dec"}, @pad1, @pad1]}, 0x158) r2 = syz_open_dev$loop(&(0x7f0000000000), 0x7, 0x240000) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x2000000, 0x80010, r2, 0x31ecf000) 17:51:58 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x300}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:51:58 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f00000000fffffffd01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:51:58 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:51:58 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0}, 0x80fe}], 0x2, 0x0) 17:51:58 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x14, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4}, 0x1c) 17:51:58 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f00000000000002fe01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:51:59 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4e1f, 0x0, @rand_addr=' \x01\x00', 0x4}, 0x1c) 17:51:59 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0}, 0xa005}], 0x2, 0x0) 17:51:59 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f00000000000003fe01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:51:59 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffff801, 0x0, @perf_bp={&(0x7f0000000000), 0xdc09}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = fork() perf_event_open(&(0x7f0000000200)={0x0, 0x80, 0x20, 0x5, 0x8, 0x0, 0x0, 0xffff, 0x1010, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1ff, 0x2, @perf_bp={&(0x7f0000000080), 0x1}, 0x401a8, 0x3, 0x9, 0x8, 0x7fffffff, 0x2, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x10, 0xffffffffffffffff, 0x1) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000180)={0x14, r3, 0x1, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000200)={0x64, r3, 0x200, 0x70bd25, 0x25dfdbff, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x50, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}]}, 0x64}, 0x1, 0x0, 0x0, 0x4}, 0x250c8e04860779a5) openat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x40, 0x4) r4 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r4, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r5 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r5, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) ioctl$EVIOCGSW(r5, 0x8040451b, &(0x7f0000001540)) r6 = syz_open_dev$tty20(0xc, 0x4, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) r8 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCSETSF2(r8, 0x402c542d, &(0x7f00000000c0)={0x6, 0x4, 0xfffffffc, 0x7, 0x10, "e7cfbfd48646e58f5efaf30a5f40a4cdc2863c", 0x8000, 0x6}) ioctl$EVIOCGABS20(r0, 0x80184560, &(0x7f0000000280)=""/250) ioctl$EVIOCGPROP(r5, 0x80404509, &(0x7f0000000380)=""/237) ppoll(&(0x7f0000001480)=[{r6, 0x200}, {0xffffffffffffffff, 0xc255}, {r7, 0x208}, {0xffffffffffffffff, 0x8280}, {r4, 0x20}, {0xffffffffffffffff, 0x142}, {r1, 0x40}], 0x7, &(0x7f00000014c0)={0x0, 0x3938700}, &(0x7f0000001500)={[0x4583]}, 0x8) 17:51:59 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0}, 0xc805}], 0x2, 0x0) 17:51:59 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f00000000fffffffe01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:51:59 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x300}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:51:59 executing program 4: r0 = io_uring_setup(0x17f, &(0x7f00000001c0)={0x0, 0xd7fb, 0x4, 0x0, 0x3a2}) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r0, &(0x7f0000000100)={0xe000000a}) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f00000000c0)={'sit0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x4, 0x80, 0xb6, 0x0, 0x8, @mcast2, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x40, 0x8000, 0x6, 0xf8}}) r2 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000140)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r2, &(0x7f0000000180)='cpu.stat\x00', 0x0, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000280)={'sit0\x00'}) sendto$inet6(r3, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback, 0x400}, 0x1c) 17:51:59 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0}, 0xfc00}], 0x2, 0x0) 17:51:59 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f00000000000001ff01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:51:59 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0x0, 0xa}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:51:59 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0}, 0xfe80}], 0x2, 0x0) 17:51:59 executing program 4: openat2(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x80000, 0x20, 0x1d}, 0x18) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x44000, 0x10) r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x4}, 0x1c) 17:51:59 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f00000000000002ff01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:51:59 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f0000000000000fff01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:51:59 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fsconfig$FSCONFIG_SET_FD(0xffffffffffffffff, 0x5, &(0x7f0000000000)=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, r0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) fsconfig$FSCONFIG_SET_STRING(0xffffffffffffffff, 0x1, &(0x7f0000000040)='\x00', &(0x7f00000000c0)=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x4}, 0x1c) 17:51:59 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0}, 0xff00}], 0x2, 0x0) 17:51:59 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffff801, 0x0, @perf_bp={&(0x7f0000000000), 0xdc09}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = fork() perf_event_open(&(0x7f0000000200)={0x0, 0x80, 0x20, 0x5, 0x8, 0x0, 0x0, 0xffff, 0x1010, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1ff, 0x2, @perf_bp={&(0x7f0000000080), 0x1}, 0x401a8, 0x3, 0x9, 0x8, 0x7fffffff, 0x2, 0x2, 0x0, 0x7, 0x0, 0x3}, r1, 0x10, 0xffffffffffffffff, 0x1) r2 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r2, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r3 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r3, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) ioctl$EVIOCGSW(r3, 0x8040451b, &(0x7f0000001540)) r4 = syz_open_dev$tty20(0xc, 0x4, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) ioctl$EVIOCSKEYCODE_V2(r2, 0x40284504, &(0x7f00000000c0)={0x8, 0x3, 0x5, 0x4, "df09e49d61a1beadb7c1e704bf92793bc74c345379951e26a465c9690e48243c"}) ppoll(&(0x7f0000001480)=[{r4, 0x200}, {0xffffffffffffffff, 0xc255}, {r5, 0x208}, {0xffffffffffffffff, 0xa280}, {r2, 0x20}, {0xffffffffffffffff, 0x142}, {r0, 0x40}], 0x7, &(0x7f00000014c0)={0x0, 0x3938700}, &(0x7f0000001500)={[0x583]}, 0x8) 17:51:59 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x300}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:51:59 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f00000000ffffefff01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:51:59 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0}, 0x40000}], 0x2, 0x0) 17:51:59 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x4}, 0x1c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) ppoll(&(0x7f00000001c0)=[{r2}], 0x1, 0x0, 0x0, 0x0) dup2(r2, r1) ioctl$F2FS_IOC_GARBAGE_COLLECT(r2, 0x4004f506, &(0x7f0000000040)) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000000)={'veth1_to_bridge\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r3, 0x89f7, &(0x7f0000000140)={'sit0\x00', &(0x7f00000000c0)={'syztnl2\x00', r4, 0x16, 0xbc, 0x80, 0x6, 0x8, @dev={0xfe, 0x80, '\x00', 0x38}, @empty, 0x20, 0x20, 0x9, 0x4}}) r6 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0xc4000, 0x0) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB="14000000734e90d3fc3a49f36236e2a05255dabdf092d029adcbf3ad427e09ed8df85e2a311b8c36601f53b1ee987fdc2e79b58f4e923286699f809367e906d838c8deed9e944bfaf5627ae2584c2306be6c6d414d58028c1e4374099f81badb0315593b2903ae879e67eef9ce4b", @ANYRES16=r7, @ANYBLOB="0100000000000000000003000000"], 0x14}}, 0x0) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r6, &(0x7f0000000380)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000200)={0x64, r7, 0x200, 0x70bd25, 0x25dfdbff, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x50, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}]}, 0x64}, 0x1, 0x0, 0x0, 0x4}, 0x250c8e04860779a5) setsockopt$inet6_int(r6, 0x29, 0xee2e8620ae9c21c2, &(0x7f0000000000)=0x6, 0x4) 17:51:59 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0x0, 0xb}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:51:59 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f00000000fffffbff01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:51:59 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0}, 0x100000}], 0x2, 0x0) 17:52:00 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffff801, 0x0, @perf_bp={&(0x7f0000000000), 0xdc09}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = fork() perf_event_open(&(0x7f0000000200)={0x0, 0x80, 0x20, 0x5, 0x8, 0x0, 0x0, 0xffff, 0x1010, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1ff, 0x2, @perf_bp={&(0x7f0000000080), 0x1}, 0x401a8, 0x3, 0x9, 0x8, 0x7fffffff, 0x2, 0x2, 0x0, 0x7, 0x0, 0x3}, r1, 0x10, 0xffffffffffffffff, 0x1) r2 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r2, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r3 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r3, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) ioctl$EVIOCGSW(r3, 0x8040451b, &(0x7f0000001540)) r4 = syz_open_dev$tty20(0xc, 0x4, 0x1) r5 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000000)={'veth1_to_bridge\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r5, 0x89f7, &(0x7f0000000140)={'sit0\x00', &(0x7f00000000c0)={'syztnl2\x00', r6, 0x16, 0xbc, 0x80, 0x6, 0x8, @dev={0xfe, 0x80, '\x00', 0x38}, @empty, 0x20, 0x20, 0x9, 0x4}}) r8 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0xc4000, 0x0) r9 = syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000180)={0x14, r9, 0x1, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r8, &(0x7f0000000380)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000200)={0x64, r9, 0x200, 0x70bd25, 0x25dfdbff, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x50, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}]}, 0x64}, 0x1, 0x0, 0x0, 0x4}, 0x250c8e04860779a5) ioctl$EVIOCSFF(r8, 0x40304580, &(0x7f00000000c0)={0x57, 0x2, 0x7fff, {0xfff, 0x8000}, {0x7, 0x2c}, @cond=[{0xce1, 0x4, 0xda83, 0x4, 0x1f, 0x1}, {0x1000, 0xb6, 0x0, 0x2, 0x3, 0xfffe}]}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) ppoll(&(0x7f0000001480)=[{r4, 0x200}, {0xffffffffffffffff, 0xc255}, {r10, 0x208}, {0xffffffffffffffff, 0xa280}, {r2, 0x20}, {0xffffffffffffffff, 0x142}, {r0, 0x40}], 0x7, &(0x7f00000014c0)={0x0, 0x3938700}, &(0x7f0000001500)={[0x583]}, 0x8) 17:52:00 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000003ffff01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:52:00 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0}, 0x1000000}], 0x2, 0x0) 17:52:00 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000180ffff01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:52:00 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0}, 0x2000000}], 0x2, 0x0) 17:52:00 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x300}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:52:00 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0}, 0x3000000}], 0x2, 0x0) 17:52:00 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f00000000ffefffff01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:52:00 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f00000000fffbffff01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:52:00 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0x0, 0xc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:52:00 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0}, 0x4000000}], 0x2, 0x0) 17:52:00 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffff801, 0x0, @perf_bp={&(0x7f0000000000), 0xdc09}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = fork() perf_event_open(&(0x7f0000000200)={0x0, 0x80, 0x20, 0x5, 0x8, 0x0, 0x0, 0xffff, 0x1010, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1ff, 0x2, @perf_bp={&(0x7f0000000080), 0x1}, 0x401a8, 0x3, 0x9, 0x8, 0x7fffffff, 0x2, 0x2, 0x0, 0x7, 0x0, 0x3}, r1, 0x10, 0xffffffffffffffff, 0x1) r2 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r2, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) ioctl$EVIOCSKEYCODE_V2(r2, 0x40284504, &(0x7f00000000c0)={0x7, 0x13, 0x7, 0x10000, "45af2d66b9898a29822b046eb5c560b0fa78df966a0f67d2ef86eae26d4ed087"}) r3 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r3, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) ioctl$EVIOCGSW(r3, 0x8040451b, &(0x7f0000001540)) r4 = syz_open_dev$tty20(0xc, 0x4, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) ppoll(&(0x7f0000001480)=[{r4, 0x200}, {0xffffffffffffffff, 0xc255}, {r5, 0x208}, {0xffffffffffffffff, 0xa280}, {r2, 0x20}, {0xffffffffffffffff, 0x142}, {r0, 0x40}], 0x7, &(0x7f00000014c0)={0x0, 0x3938700}, &(0x7f0000001500)={[0x583]}, 0x8) 17:52:00 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x300}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:52:00 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x4}, 0x1c) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000040)={@mcast1, @local, @private2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa2420200}) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(0xffffffffffffffff, 0x89fb, &(0x7f0000000140)={'sit0\x00', &(0x7f0000000080)={'ip6tnl0\x00', 0x0, 0x0, 0x7f, 0xad, 0x3, 0x70, @private0, @dev={0xfe, 0x80, '\x00', 0x29}, 0x7800, 0x7800, 0x80000001, 0x6}}) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, &(0x7f0000003700)={'sit0\x00', &(0x7f0000003680)={'syztnl2\x00', 0x0, 0x2f, 0x4, 0x3, 0x20, 0x4, @dev={0xfe, 0x80, '\x00', 0x22}, @private2, 0x7800, 0x20, 0x7, 0x6}}) r2 = socket$inet6(0xa, 0x80803, 0x5) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@multicast1, @in6=@private2, 0x0, 0x0, 0x4, 0x1ff, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local, 0x0, 0x2b}, 0x0, @in6=@private1}}, 0xe8) connect$inet6(r2, &(0x7f00000000c0), 0x1c) r3 = socket$inet6_udp(0xa, 0x2, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000280)={'sit0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000000)={'veth1_to_bridge\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r3, 0x89f7, &(0x7f0000000140)={'sit0\x00', &(0x7f00000000c0)={'syztnl2\x00', r6, 0x16, 0xbc, 0x80, 0x6, 0x8, @dev={0xfe, 0x80, '\x00', 0x38}, @empty, 0x20, 0x20, 0x9, 0x4}}) ioctl$sock_inet6_SIOCADDRT(r3, 0x890b, &(0x7f0000000040)={@mcast1, @local, @private2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa2420200, r5}) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r2, 0x89fb, &(0x7f0000000140)={'sit0\x00', &(0x7f0000000080)={'ip6tnl0\x00', r5, 0x0, 0x7f, 0xad, 0x3, 0x70, @private0, @dev={0xfe, 0x80, '\x00', 0x29}, 0x7800, 0x7800, 0x80000001, 0x6}}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000004fc0)={{{@in=@empty, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6=@loopback}}, &(0x7f00000050c0)=0xe8) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r0, 0x89f7, &(0x7f0000008a40)={'ip6_vti0\x00', &(0x7f00000089c0)={'ip6gre0\x00', 0x0, 0x4, 0x88, 0x82, 0x20, 0x20, @private0, @private0={0xfc, 0x0, '\x00', 0x1}, 0x8000, 0x7800, 0x5, 0x4}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f000000c340)={'erspan0\x00', &(0x7f0000000200)={'syztnl1\x00', 0x0, 0x8, 0x700, 0x3, 0x7ff, {{0x7, 0x4, 0x1, 0x1, 0x1c, 0x66, 0x0, 0x8, 0x4, 0x0, @rand_addr=0x64010101, @rand_addr=0x64010100, {[@generic={0x44, 0x7, "6c66470639"}]}}}}}) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, &(0x7f000000c400)={'syztnl2\x00', &(0x7f000000c380)={'ip6_vti0\x00', 0x0, 0x29, 0x0, 0xf8, 0x0, 0x2, @dev={0xfe, 0x80, '\x00', 0x36}, @mcast1, 0x10, 0x700, 0x80000000, 0x1ff}}) sendmmsg$inet(0xffffffffffffffff, &(0x7f000000c580)=[{{&(0x7f0000000000)={0x2, 0x4e20, @local}, 0x10, &(0x7f00000001c0)=[{&(0x7f00000000c0)="9a15ecfcf1b2c16ccb50db06d5861f932a012f5e14a397c502466fff68551a2273bbc6c4eb84def190f5a0d5b404be8460e6387a60121a575de62eb76dcb68e923ad6daec71a456c5113cc29824ad2d7a01ae5c1702f3c63d3d8c5302f5b57a4e7a227a4f3fe7c102604c60a0cd6a04023539d2c2cc5be282b3d97d366f6568fb86561e76e7d4904978949d9143c0181b32252105e48cb02b05a703967548541f7b0a615d9a0b34ffded392a00d81d38d3def6babec8cff78eea05d3c982719d2abd4a2414d8b7104eae034a79f63fb142d8071171d22b74", 0xd8}, {&(0x7f0000000040)="3597091722242ddd8cbd", 0xa}], 0x2, &(0x7f0000003740)=[@ip_ttl={{0x14, 0x0, 0x2, 0x9ef5}}, @ip_retopts={{0x30, 0x0, 0x7, {[@cipso={0x86, 0x1d, 0x0, [{0x1, 0x6, "f4023a37"}, {0x5, 0x11, "b0bf86cd9182f1fea1383d1567c8bc"}]}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @multicast1, @broadcast}}}, @ip_ttl={{0x14, 0x0, 0x2, 0x3}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @private=0xa010102, @loopback}}}, @ip_retopts={{0x30, 0x0, 0x7, {[@ra={0x94, 0x4, 0x1}, @noop, @ssrr={0x89, 0x7, 0x71, [@initdev={0xac, 0x1e, 0x1, 0x0}]}, @generic={0x7, 0x8, "b2bca2c90e55"}, @timestamp={0x44, 0xc, 0x1, 0x0, 0xc, [0xff, 0x5]}]}}}, @ip_retopts={{0x14, 0x0, 0x7, {[@generic={0x82, 0x4, "f782"}]}}}], 0xe8}}, {{&(0x7f0000003840)={0x2, 0x4e22, @loopback}, 0x10, &(0x7f0000003a80)=[{&(0x7f0000003880)="f6bc4a29fb73d19de3a54f25507b9fa156f02c0109addce978f6cae27237b80eebab9065dda6ede31d055f869fa103f0a60e55bd5e9cb0eb870d1882726492eec6b615", 0x43}, {&(0x7f0000003900)="172236b3d619fb2524e2db553202cb1a0564b4a183b1ad2a89bf6b8e252459a21c9d687b4ca45b396fdf6fecb808f33c7ff52187bd33a1c3f551885c319d8c4671501d8412c98173bdfaa553a35e83c0d29d91a6cf0af2c83d6fea9a260b9a667c3b3ad26c963b0a23b185b63743837e13f03a76bf343c5af4ef45c765962b29229424762e", 0x85}, {&(0x7f00000039c0)="85858510fdcd119ed32bbfb2588ac2547b77651af2d3ac1519cd60a302c5fa113187664098bf628a85061528d1a765230b84c184bfa023441f0354841ea247fd", 0x40}, {&(0x7f0000003a00)="fc1ea6c144be38408dece9404d6105c110495b95eaaf278bc0b74d3f709b864faf24d01f0167f96f41", 0x29}, {&(0x7f0000003a40)="b64f48962cbaf036aa0c2221a7b3ce5a89bf24929587013ab3497b697f7e65846aeef7359c608ab39400105b55869c5c781d5ce390823ca39937", 0x3a}], 0x5, &(0x7f0000003b00)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x200}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x2}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @remote, @broadcast}}}], 0x50}}, {{&(0x7f0000003b80)={0x2, 0x4e21, @loopback}, 0x10, &(0x7f0000003e80)=[{&(0x7f0000003bc0)="f8b3bb2f456dc7d7db2a3b40de538bbccc1bbfaa4b4777169c1d53eab2d7629cfe002efc53c0a4d27e7a86e862de3bb538c12f5f2fdf65d206318c91a2ef5ac89bd224229b48ad9ae88c041834fe211bcbd5d5ede37c08cc4ea385ec6961bfd4e6395f9f247a5c858cc56b67e4cdca4f5c0bbf512588f5d1570de4258a9deb144a46760a0bbac07b8316873b3e00db60aeceb76e387d0ad50953d20ab9bfeed8574da86f79ce8cd581547904078af2d37caf791b0b11ae", 0xb7}, {&(0x7f0000003c80)="2f331de9e898b8a5b72d78a8b5ae56bc2dd3aff58aff6c274e14e906c95cae31df3056abebb607586d09474f29f54deb5e741716799fc83ab23ac25aaa808735a54848a5b51742590543ed23d77d2b5b4dd25274c55d05f674df66887b56b50d5bd34b53d48593bed2d602a94adbd594d0079fe689dff3721e2da30408e65296038295d8c371403a67a0f51e46108e2d9318baf937ac8133ba3301a3eaaabae987ec26d5fb2dec57f15626314f3a7688c34cd4d5cefd7547690f87ac4bb0d0b112c07d4c19225725fa8fa750df338aea1ce2c364226a892726d7a420addedd6deb33a7ea5470db1bad249855bf1fb5b26486fe1ba5b20f92", 0xf8}, {&(0x7f0000003d80)="f6330d233b60a6570c299316afebd9d6f00d1284c825d1fc99b1e696c7c6e720c7b6564acd45771dbcf37442e286fe8f1f926e93a4e4eee5bf317d29a5ebec8c48410623df9f251c991c9eeadba414ced59bf0f2995c795dcd39fbda9490c5f23c89cc6080c6d92b7621e123f1edd171168da5167e6efc8e8cb222704a86cb607ae86fd6ffe25bc89aae0b674c71fa05ca22b9271b51bea8f247cd36dea04cbe880bb021fbe0283159b030603d6300a0c97bc5d4f5296640b292c748ab013d9e9d", 0xc1}], 0x3, &(0x7f0000003ec0)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0xa0}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x8}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xffff8572}}], 0x48}}, {{&(0x7f0000003f40)={0x2, 0x4e22, @multicast2}, 0x10, &(0x7f0000004f80)=[{&(0x7f0000003f80)="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", 0x1000}], 0x1, &(0x7f0000005100)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0x2}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x9}}, @ip_retopts={{0xe0, 0x0, 0x7, {[@rr={0x7, 0x1b, 0x81, [@multicast1, @multicast1, @local, @loopback, @loopback, @remote]}, @timestamp_prespec={0x44, 0xc, 0x45, 0x3, 0x6, [{@rand_addr=0x64010102, 0x2}]}, @timestamp_addr={0x44, 0x2c, 0xf9, 0x1, 0xe, [{@dev={0xac, 0x14, 0x14, 0x3c}, 0x1}, {@multicast1, 0x100}, {@rand_addr=0x64010101, 0x4ef}, {@broadcast, 0xfffffad8}, {@private=0xa010101, 0x800}]}, @timestamp_addr={0x44, 0x34, 0xc7, 0x1, 0x1, [{@dev={0xac, 0x14, 0x14, 0x2b}, 0x40}, {@multicast2, 0x10000}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x7ff}, {@private=0xa010101, 0x7}, {@loopback, 0x7}, {@remote, 0x1ff}]}, @lsrr={0x83, 0x23, 0x6c, [@private=0xa010100, @dev={0xac, 0x14, 0x14, 0x29}, @private=0xa010102, @private=0xa010100, @rand_addr=0x64010101, @rand_addr=0x64010101, @remote, @loopback]}, @lsrr={0x83, 0x23, 0x1e, [@multicast1, @private=0xa010100, @remote, @multicast1, @loopback, @rand_addr=0x64010102, @loopback, @rand_addr=0x64010101]}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r7, @remote, @multicast2}}}, @ip_ttl={{0x14, 0x0, 0x2, 0x2}}, @ip_retopts={{0x54, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x34, 0xad, 0x3, 0x8, [{@multicast2, 0x1}, {@remote, 0x8001}, {@broadcast, 0x1}, {@loopback, 0x40}, {@broadcast, 0x7f}, {@private=0xa010102, 0x9}]}, @lsrr={0x83, 0xf, 0x7c, [@broadcast, @loopback, @private=0xa010100]}]}}}, @ip_retopts={{0x8c, 0x0, 0x7, {[@timestamp={0x44, 0x18, 0x5, 0x0, 0x4, [0x80000000, 0xffff, 0xfffffffc, 0x8, 0x67]}, @ssrr={0x89, 0x17, 0x7b, [@private=0xa010101, @private=0xa010100, @empty, @multicast2, @dev={0xac, 0x14, 0x14, 0x24}]}, @timestamp={0x44, 0x10, 0x9c, 0x0, 0x2, [0xffff, 0x4, 0x9]}, @end, @ra={0x94, 0x4, 0x40}, @lsrr={0x83, 0xb, 0x4e, [@dev={0xac, 0x14, 0x14, 0x25}, @remote]}, @ssrr={0x89, 0x2b, 0x41, [@local, @private=0xa010101, @initdev={0xac, 0x1e, 0x0, 0x0}, @remote, @private=0xa010100, @rand_addr=0x64010100, @dev={0xac, 0x14, 0x14, 0x29}, @empty, @initdev={0xac, 0x1e, 0x1, 0x0}, @remote]}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x6}}, @ip_retopts={{0x64, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x4c, 0x29, 0x3, 0x6, [{@multicast2, 0xe72}, {@remote, 0xff}, {@remote, 0x100}, {@rand_addr=0x64010101, 0x40}, {@empty, 0x2}, {@dev={0xac, 0x14, 0x14, 0x2b}, 0xfffffeff}, {@rand_addr=0x64010101, 0x5}, {@multicast2, 0x5}, {@loopback, 0x1}]}, @generic={0x89, 0x2}, @ra={0x94, 0x4, 0x1}]}}}], 0x2b0}}, {{&(0x7f00000053c0)={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, &(0x7f0000008840)=[{&(0x7f0000005400)="cd1bea06473072c9ef2e8c7b81240b7c2da0b9e20c833fd73de0bd09d3f51509ff62ed91332f86340ec333a5a0b851be6511c778b075ff8159bc00e3ea4d6c372fbae7d516771d83374e959fdd7bd24e2798bd842e5f72cd8c51505b429703db744c433934c5b32c855f3cfc68b4cc2de577cc3ebaddb1bd1a94beae6243dc43703e578dd0f13f14b239a5203d6a41366b84bd5cba19135cd266faff73b33ee9466bc8144276bacc358622fdceadbc4ca5362a6d698591cbcd3ae2a53d3fa5accd56e2d727a31ec7157262a8041b8d027bb03f6573653b1d8229800a8013540826444cff4372301653bd2eaac88c54614d7c8da6733b79280e1895d418a6", 0xfe}, {&(0x7f0000005500)="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", 0x1000}, {&(0x7f0000006500)="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", 0x1000}, {&(0x7f0000007500)="d35d0daac68cfdfcb72c081a2ff792b199835f56ec89e379447c8d3e8a7a7190682899dd07e407fdb7375fdc27886a55ba79987f4acc8cb9a670783f57cb7c4cf1ebfe2c75e07a0df64ad4e48f87d251", 0x50}, {&(0x7f0000007580)="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", 0xfb}, {&(0x7f0000007680)="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", 0x1000}, {&(0x7f0000008680)="b231af48e1dfc3d55e0bb1a34b19a27d4e8c272ec256888708d58a4dad007a00d5c12375d182803cb7470b7d89a8abe43482b2063aeff28ee01183f995cb156f86e6239cdad82265b716099a4d627024eed2138965c2f2776a48f86df356ed1d69acd0a6a51066658f36350c6a14b40e1957f5dfde97890898bcb7d9c1943ba44ed848536e6d01eca167d162340b7d52a5ac471f", 0x94}, {&(0x7f0000008740)="4138b77355b433f4edcec5c2622b172f00d61e8fd78f7f3b8524f7e0334bc85da23339fc9aa55a651f54635226fc7359cc883f", 0x33}, {&(0x7f0000008780)="6ee2f9e7711151087a6a93fbcb27e233af3bda8ff0a6a9620cccb3c70c8f600923216eb44c8191ec3ef4a08077ebab2e00369853013ea23de55579539793d8844b334d9954839ab8fdb5bf975092c0319648b53ea46ec98e334bafd3fe600eff793c0300142e4660143578af223650cdeefd9723f9c46c5120423b6b87ce1611a6c23fa108181003c6e4c0668665f49bc46895c70ac37f08fbc680", 0x9b}], 0x9, &(0x7f0000008a80)=[@ip_ttl={{0x14}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x3}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x6}}, @ip_ttl={{0x14, 0x0, 0x2, 0x401}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r8, @initdev={0xac, 0x1e, 0x0, 0x0}, @dev={0xac, 0x14, 0x14, 0x1b}}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x3}}, @ip_retopts={{0x58, 0x0, 0x7, {[@ssrr={0x89, 0x7, 0x3, [@private=0xa010100]}, @timestamp_prespec={0x44, 0x1c, 0x2e, 0x3, 0xc, [{@loopback, 0x5}, {@multicast2, 0x4}, {@broadcast, 0x3fbe}]}, @rr={0x7, 0x1f, 0xc0, [@dev={0xac, 0x14, 0x14, 0x3e}, @dev={0xac, 0x14, 0x14, 0x30}, @empty, @remote, @local, @broadcast, @local]}, @noop, @ra={0x94, 0x4}]}}}, @ip_ttl={{0x14, 0x0, 0x2, 0xcb93}}, @ip_ttl={{0x14, 0x0, 0x2, 0x81}}], 0x120}}, {{0x0, 0x0, &(0x7f0000009c40)=[{&(0x7f0000008bc0)="54253cdd8d2287d5a6bdfbb35308f549613fc32dbed5104982b7c82053e974efc196265823c2f3aa9d3307a10ff587c735374654b4270c12e9005a70", 0x3c}, {&(0x7f0000008c00)="d4", 0x1}, {&(0x7f0000008c40)="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", 0x1000}], 0x3, &(0x7f0000009c80)=[@ip_ttl={{0x14, 0x0, 0x2, 0x1}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x20}}, @ip_ttl={{0x14}}, @ip_retopts={{0x60, 0x0, 0x7, {[@ssrr={0x89, 0xf, 0x57, [@rand_addr=0x64010102, @rand_addr=0x64010102, @loopback]}, @timestamp_prespec={0x44, 0x24, 0x32, 0x3, 0x5, [{@empty, 0x1d2}, {@multicast1, 0x5}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0xfffffffa}, {@empty, 0xb41}]}, @timestamp={0x44, 0x1c, 0x89, 0x0, 0x2, [0x80000000, 0x0, 0x9, 0x9, 0x6, 0x81]}]}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x20}}], 0xc0}}, {{&(0x7f0000009d40)={0x2, 0x4e20, @multicast1}, 0x10, &(0x7f000000adc0)=[{&(0x7f0000009d80)="b91b0b6aa9aa1800", 0x8}, {&(0x7f0000009dc0)="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", 0x1000}], 0x2, &(0x7f000000ae00)=[@ip_tos_int={{0x14, 0x0, 0x1, 0xffffffff}}], 0x18}}, {{&(0x7f000000ae40)={0x2, 0x4e21, @broadcast}, 0x10, &(0x7f000000af80)=[{&(0x7f000000ae80)="c872dce3a836fcdd16763d3308d116d9a44802850bd432b6db4aeea380e231ff76495a3e8a08eb7cdc597b4662a72093c7e5a4176c7e", 0x36}, {&(0x7f000000aec0)="c251cde1a08c1d96770fc4edcc21c55aff6d823054dd8627f6a2bf6327d5f6466b09d0545c473f59795812373e81243c80ff32e16d86f96a932d922cce7b7a001a428ae7054e9319a21ef7f48085f1beb0a1b0a83a146a4d3da786f78912400e04cc63fd9ea88f1239e761cb19c51b7f22ee571654a060d77d40b5aeb351d0bafd4f5aab2f4c99eafab0c4875157ceeaa965a1f5f409a9743c090a5ab9c8694f8b81a1e9312637ada24b3ef9d8ae1c8fd238ddad729a5a927a0207375cac", 0xbe}], 0x2, &(0x7f000000afc0)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x3ff}}, @ip_ttl={{0x14, 0x0, 0x2, 0x1}}], 0x30}}, {{&(0x7f000000b000)={0x2, 0x4e23, @rand_addr=0x64010100}, 0x10, &(0x7f000000c2c0)=[{&(0x7f000000b040)="ed62f785dc9ffab774449eaa45b570aad83b2908fba4499f054481edc1ac4cdc48fd50265a5d8aaf33010021d9f634c2a2a17219faaab2b75404e73930bb855e924bb2f8d48593a81e91abb4c6ecb9af86e2fbef4c493e0eae45180dc31dcd4311b4238801d931e254f168fdbe4413a92a0b054d146b6d0c4dfa2b2c8a8d5ed916b6e228282d92ae16ae9f32455282447f22198f453fcfc55ee8eb793e13ce2a55b9ad0896c1f1ba0f3d33ff4491ddfdd1cdc6276f46251cfadd6dc5c56bc31688", 0xc1}, {&(0x7f000000b140)="a14342f4570313cf69cf2c52c96f9045ef63da9f8fa25c12277779e9e965fcc8c7ae334f8b89c5881b33e112e699cdd9c34cc5ec9ac9c7e53c2f180da3290c5a323ec28b59311577372ca2f33521967579b386ae4b8472717690eccd84037237f1aa59912413c6731e72b2b11a84484bc62d2aa31ba9409bf9936678f86b144efca3e0ae946a7b256d388c9b373794b57edf5ac65ef9dc995746cfeaaefc2b552ed751298a8a9e945326c5eed6d899c89f6d58aeee13b4b9cba0e5a0c7c082141202388ed1a8fa98afbbe23c603dac85e78b5468a45c19a8039aafca83d99c72a17c7d50e99b68ebac1f805523c04ddb9bc38f6c340f57758a2b962c90eb6fe51f63c6ab0eb88e0e756ea5d880d658446098cd54356508e033666dd4e1dba977a6bb7da0ba0ec44b693ecc1a49c0e33c7d7661841f458714e3c7622dabd0937e9e4b9d1dbb85722d86322421b7176616648cf88af5a8bc9719215dc92ae3c4e1b3728b35cadb57ab4e23038627167d743e29070692b9a47d5a14b81ce069c4f50bb1e7b9ae7cd4f67b52d0674915a2fc4ca4fccd68d9a7eb2367fa7afd2fbd71547896ce0afda3214fc8f0a725d70427fa7876566d0c7760409f020deb27fef4252a1d8bafee348eb00062874239da7dbfc4b98c93b9e22a54341974881336810a7a3473f95011df95bc4935ac7ec9e8bce08b2c9502a82c087a63910946484eb5cda6e45d9d0d16b99dd5c037953984518c7014a539e5189cd448bc8e62fe8071f346e302d4984d33b6abedf7fb6beeb67580dc88a688035f386921d3f7c97afe6e3070c25344cba5c1c433fb71f802c4c36797fa294a38984a48ad3c53f2075aa6814f8e0978266645732738bb28b4458e121bd727ee7e22c80cecec23df45227278928f5742c0b03c269eb5ae438741d09e828275621126946074915670d53b0e3056ff7e51df18c65b2f9c93a43624db27e2537c6e1ab23c9575ab980ef6d254099b69347f96d3f2501d923473c5214fce3835f08a2d2117795af35687d7209f724df60edf4f63e0cf50ac1dc9b5606440936dd6ea682664a7f731d8d4f8c00d0916b73496fb52cd683a6aa30fe7bb0d7b94f71157d8b69e3e9c80b9aa4b86891b42bca0d294d37e11a8fa3be8e50cc55ceb3f1b7d9be7e2802ec6936e0d6b34c66a77f0923523df8d8ce121d2643e8eda65801ac8cef73ced541f6b5617668b6e76508838c0a73e23c883949753a027fbb6b496eaab8dd41a5503e233ce6fc22ecd299c7357bdeee355add0605cbb84f698d8166c2587126ad26f482ce1d2deed5a07f5a2e9434ab5178bf76dd462339925ffbc156a01768f8612607558a9b010f2beaa27bd3eb6c3bd8b280c4d20d95a9c550eb1daaa8b0e318656297e7708087cb50ae60580f27ec2709553d47b1d6dda279efa02b65d5bcd7f698e1d2df7334a9010f83a31170ccdcf36ffcf70366477222e94d69a54db546169973412d9992b832ca007d9182681d55b37690f4015aefc9eca26c8ecf39abc31bcf35f4039553c50fb125831182dad907c2aedf6615c6c201c9baf867196d3296f8732e47238028d30826cccfc24ea58efa8a4d79f14af36a0d495effbb12b82150947e70afe8b4ce41d6238c211516ed0e944f09fb673b2a0d2902610b74d764b5fcbecf5b8eb1ce212e64b466544684bf1a53a76e883522e3b348cf7f26b7dffc77be383272f77e27cb0759dc8423b15bae6bbcbe819ac2949864aa2afe16b6e2fbf986ce9f497ce6116d12ac4dfcade6a4f168b8bf2171b0c99e0661019e06a8fe3ac736d58787e12c9128df76124a0b2f955da87c6ff2bab76c78cb765de2dd12379d2ceaba2c467c8eb716d88d52fb884e011ce1b0d5ac11e527319d75d325809818e0cbddbed2d07983d9fb785e61d57a0d3a62c26b92277ff28490581883c38f70d1890021c6f6818c0db39e2112b95ad79694a5966e621ab687dde95a37631bf195cb481cb7353a698f5ed136721cea3d34a1a08e8cc00e26689a4bf7c3b1e0b5b17a706e7c3b21db3f1d81fdb89eda65176d2b3ebda4ed4a065d09b7fb17d13b0c770bb12d57a57547b8702d09fee779a37be19236f51cacba0aa750a857d1488f5858d04e73869a0508041c729b4b630450060bd557380a4990c0cabb1493d71928195005f574ff8f20786b5ccc27cd2722a6ee37f885999a058d67c49630a479932edbd6961398418e0722c4dab7d1627dc5d7c6ff3d71df8c4b254a6c18c5dc6d80213dab49d15e3af2b32ae75775cb5aab7dea48b6265bd0946a214158bea64b72460eb3984ccf8800550f8739c6e2f4725d8b6c3446d2245d11724042ed9fc95ea613ffe482c3ed815feb3b6466e16fb7fa8946046405426a906c76107f80f9b161a40fd180f131921ea69327f67c737c4a1974a24b4871b48a60e6e60de5404023658a64af88abdc04324891c2860fd1190a8c4750980fd9d0b1787f9762584a23785a813db1c0f7b5f4f761dcbfca82560940e4820edc7cba19316aa6f1c62e272a4a1b9e6e80158fe51ebbf25f5e5afd135eb4f42636f074e31af46a301ea0dea93f52621dbdb6e9162042ef361455c3743b404e965834ea1ece618670abfabbe93411d9bfdc3a21da3bd4c1850def40eadbb1bad2ec419ba155ae9e5b52e29caa7b7185ac6e1a9f89c69ef13b063e2cfd7b2c63b31d7add67472456a1ad20b8da1a235b2f5f774899b0516fdf40aefab7f917162049b0b6d083545522cf1e9adaf2c9de6f8d90cc65e6735ae24355538923f26621595a15d22603f97f8ca53330aaf0affee6a2d733bbbe7ca28ad6ae957040fc7d71f613674e4a379dde2c885e34e5c6af69465bedaba5a44912d6c6e37680e9d80dc8bb77d5ad13472028fe912b2c239f90da2548e39672041d04dbcc078411fb683810a7b659c8696b1f7844b8c3fcaca6640a73da8497d621b0d7c3c5dc0c6cc50e5f30f778d2478ee4a436fad55546aa74b7856a2165d676a7d013214e5b7a8096f5366e12edf99e5df5366fcb40db5b57ae57d912c5c0f2411a9520150b8b39d5df35ca6b088469e204c301036de1ca303fb82f1886d47774e7b8078bf2e76a84b1b4b2862ddd5f61dca601da655112fcdb9e37f92fafde3d08d3811925af03e7c20dcea51996549954072160b1ee31ae69ad1bfcf6fde1ea20af74e1c2d45bf8151786a95e460120eaae7a0314da0ed1e15edba52b9745c8a5de52a8fb1919f9b2d20e2b369e0a748ac6c507722b7a2c6f4e9fdc2986c37a327333666495441b4b1c3ef17bb244406a6630a70ccdc77c6a693988dfc84a8419f49c095c0c86772582e361e6f01055293244f39ddd548af34692c4289cc9e4edf52b7ce431b3548de8e001233bf49dd21a3ecfacdb80007c03f260724c448b6143eb53f177dbc04ab95c3352d461c0ea49e79222c94212ec0f78a9a11cea2d5630034fa9c626a45efe19a58922df336e2bd9e14bcf218c5efd89840b2bbca05ca867bcad51a2be9e313cc65472826ad7845506c593b99371889cbfe02fd47186cf338513df591f15a0c1729e941eaac43ad2d001224b9491d568f6789ee50be8e3c590235e9ab5b264a320c7eab5d0939898310888a9d66fa945690d89f35e0daec92b28cb85800e9552995bb62c06aadd63d3655b482b5ef6caab940698f2e5eab72d248ec3eae3a8a36116ade4d2d25eea62b8b552d254c13887baf9c6e7489fb33edbab961ff2d8f3a60b58c5c87619114f1c750be8ad717f52053030d069d99e40bb1513a0a8225dbac9ed5bccd01a07e7f097ebe634153df40984854994a025f3fef7c79153d3785af120019e6441156886543ade39b92f8f8bffdaaf468f6a255bdc6616c2bd00778da989b1d6bc73a887f8b941166753f28746b39d0007996091ff6998c93bf3a5444a11d93497d29176ee0f88c734c9584716090662dbc6c5c76ba70d49545b96c3d800c1a1eabe3af1364b7643ea6dc2d0a627ceb414b1cde01c606be42e5e6f0f521347652f0f7b096a79ff3d1a8249874d905ca62fcf36a7c1436d32d5a028f1a52783916fedcc073350a539cf5ddf086c769aa134f7e57bc2bf15a462fc7f25b57e51ae0d97256a45c8055e92a51d3cdec3083ba98f85e4608046f4dc72fb144980ab469a80ab1e82817e19e1ab2d83146175c16c2363e4771f0169278724e429d9ae7be9a3c3c15372bae7e6a7a0f7cb14ef838fcdf99a39a8c8c719ba42bb809dacb9755f0700ebece21ab51d82b3c234eaf5b210751063c8f3fa629aa6d6f917ade6e799cc29d41255a841e594b23e67681947d78c679d926e86d0ea427b164977223cbd1294e8f7f5fad2d866c280786d7a09a76b8c93e4e9b780b0b24553110f43192b775199afe1f480ee3e9ed3d3aa1698b4235a62798faffe8d20eda5f8649788ffc068f355e5429bcc18b7e6a1106756f0011aa1e90319ecf025c9be4d0a234976006e15a91ebef9cbf9f919137bf07728cff0efd5c6aab12bf0c368d57dd5af8cf4d13c8bdf4dcf8806f1ad4c6685fdc7b529d27d6526bd42c1db77f743c4abdedc29475973c2a1bf321ebb01124e2f188f6f67636583db9ca309bd838b0894deda6ea622564a367bcf82fc51078647c60a2c148c9504687fe7600f9f05050d9a011cfc4a0d092866a42b6c32ac5e1ceb98c3e1756639209ce6c4b3ccdbb92ea06dd0a27bcc17b660764255c59ff69c6208eefaffbab30b4a56004c324f29fdb23f6445d50b410b83480908f01116ec79cd76bb32791de8263288a0ad1831f93a2b1169fb30c46946d436f6ac5b305e4eb73c1ff0af399e329fe0c8b8530b2581e14766283cfd87bfc0cbe17d012ee507561cde818d4d1d58cb5c1c60889b0ff2222a7aef02d12cfab34e63b58b9d94e634b62499beb4fde879bc2920ddc663c9dee88a87a734748c4b3e42129878cc914aaed85d0dd6cf10d4e79d1cbf1fe55482c5377cc20838f8c981dcb5bf34982ac33afefd1732bd2180191397a7a216f2e49cad92a676bf96030bd175507138718e882bfdb324804d5ace050aae8601d0acfc36ac5d4cd0c184a1d9a3506b77284aa7896b32d5d2091bf6e0027f1555a372e4dbdd0a6fc09dfe28453738013a62c2933d39cf6debb25a3110b6e708a0a893918910dacb038ce860f008c650198591c8a3c87211bebbc1fa806dde97ed60d3902415fb821204f5105936226ca2811e853c4fdfcdae49f523dcf0c01a5a6c58ffccb0761e3b5bf79f2fc677114f334c94a3fa8ef16e4dd85936c84d049d654f281c19dc5a810690605d399834c674d480d19d919424aa46097b5c45e1feccff6047f71bf792b919ee0b090d3638a545729afe17732439cc32574a9b6eb18d0bffb6de4ad6cac4133d558a1da569cc2cb70a12c953b981718af3153a0c40049ad5e19fc054d3c26c15df1758cdae9140145fac2038e983db422564bbf54a4196e0c9efa57951919c0857e788c6eb5fcf977160e172dfb7fe0db74a3c459b4b7fcedd3a42f7d48fedb663cd14f3e4496c7506ef49fb67ea41ac3dcbb1f500875644446fd0387224fe17b020647b09e65fde9fdec8f6cc68153152a860101ee1f5545a3790db40e6430e13ee07ac8417e3142245de5e346dd4984c4808705b7a44a68fe4cee8483284cf0591f8ab5344915f28bb437a8d10f76918b044bdb6b7cc4ab91e8b2943e56637867c7b2ae944e9cde1c53439506e15364e83a41d286adfc051addf347dd7783fe7d2e83044f6433099758338bf4", 0x1000}, {&(0x7f000000c140)="e2350816f48b4a74eb1474de004bfb39d9b9e069d9aa36322ef768f75b8a9f9229e273e123156878121a46921a305a7f7e49944100d8c85ede11262aad1baafafff999fb9cffc6d2a17d7a118e2b3cf7317cb74b729d3abcc906ed3352f5de2c1024316d49135a311643c2accfc8c2b5f8e37392d4b3eefaf7745b2319e2bee1a3f35ba1e8ccb2bbbaa3e9984ca905a689aa9aa82e175229e19a58c8dab1763b50af6b85517a96c350d00d1eb2cded491129821f5fd32e86f01f67d941a2d152ce439e61c2", 0xc5}, {&(0x7f000000c240)="5143d658f823150af3b1ce74ed53cf89a88dc3963490943284696c5974234b68e57d36f85480d34fcc5a4f35064ff73bad0af4d824630aef834e77595842e5f4a75d0043f5fa4dd75f668170643d99634e0456be8360", 0x56}], 0x4, &(0x7f000000c440)=[@ip_retopts={{0x100, 0x0, 0x7, {[@noop, @lsrr={0x83, 0x27, 0xf0, [@initdev={0xac, 0x1e, 0x1, 0x0}, @remote, @remote, @remote, @private=0xa010102, @remote, @multicast2, @loopback, @local]}, @timestamp_prespec={0x44, 0x44, 0x96, 0x3, 0x9, [{@private=0xa010100, 0x2}, {@private=0xa010102, 0x401}, {@private=0xa010100, 0x7ff}, {@dev={0xac, 0x14, 0x14, 0x25}, 0x6}, {@dev={0xac, 0x14, 0x14, 0x39}, 0x3}, {@dev={0xac, 0x14, 0x14, 0x2a}, 0x80000001}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0xffff}, {@multicast1, 0x4}]}, @rr={0x7, 0xb, 0xa8, [@rand_addr=0x64010102, @remote]}, @ssrr={0x89, 0x13, 0xa, [@private=0xa010102, @multicast1, @rand_addr=0x64010101, @dev={0xac, 0x14, 0x14, 0x1a}]}, @timestamp={0x44, 0x14, 0x72, 0x0, 0xc, [0xffffffc1, 0x80000000, 0x6, 0x9]}, @cipso={0x86, 0x25, 0x3, [{0x5, 0xf, "6b8bd8dbaa41edec28e82a4b00"}, {0x6, 0x5, "afe66c"}, {0x2, 0xb, "7775dc5e538b64cfcc"}]}, @timestamp_prespec={0x44, 0x2c, 0xb2, 0x3, 0xb, [{@private=0xa010102, 0x8}, {@private=0xa010100, 0x4}, {@multicast2, 0xffffffff}, {@dev={0xac, 0x14, 0x14, 0xf}, 0x1}, {@private=0xa010100, 0x1}]}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r9, @broadcast, @rand_addr=0x64010102}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r10, @dev={0xac, 0x14, 0x14, 0x1d}, @dev={0xac, 0x14, 0x14, 0x7f}}}}], 0x140}}], 0x9, 0x4080) 17:52:00 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0}, 0x5000000}], 0x2, 0x0) 17:52:00 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f00000000f9fdffff01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:52:00 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f00000000fdfdffff01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:52:00 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0}, 0x6000000}], 0x2, 0x0) 17:52:00 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x4}, 0x1c) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000280)={'sit0\x00'}) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000000)={@rand_addr=' \x01\x00', 0x2, 0x1, 0xff, 0x7, 0xfffd, 0x6}, 0x20) 17:52:00 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0}, 0x7000000}], 0x2, 0x0) 17:52:00 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000007fffffff01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:52:01 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0x0, 0xd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:52:01 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = eventfd2(0x6, 0x0) write$eventfd(r1, &(0x7f0000000000)=0xfffffffffffffff9, 0x8) io_setup(0x2, &(0x7f00000015c0)=0x0) r3 = eventfd(0x0) r4 = eventfd(0x0) r5 = eventfd2(0x0, 0x0) io_submit(r2, 0x2, &(0x7f0000000200)=[&(0x7f0000001240)={0x0, 0x0, 0x0, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x0, 0x3, r4}, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r4, &(0x7f0000000000)="fd60861a3d478fc3dc", 0x9, 0x0, 0x0, 0x3, r5}]) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r7, &(0x7f00000bd000), 0x318, 0x0) ppoll(&(0x7f00000001c0)=[{r7}], 0x1, 0x0, 0x0, 0x0) dup2(r7, r6) r8 = syz_open_dev$vcsa(&(0x7f0000000040), 0x9, 0x40000) recvmsg$unix(0xffffffffffffffff, &(0x7f00000015c0)={&(0x7f00000003c0), 0x6e, &(0x7f0000001540)=[{&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/171, 0xab}, {&(0x7f0000001500)=""/32, 0x20}], 0x3, &(0x7f0000001580)=[@rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x20}, 0x1) r10 = socket$nl_generic(0x10, 0x3, 0x10) r11 = dup2(0xffffffffffffffff, r1) io_submit(r2, 0x5, &(0x7f0000001880)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x401, r7, &(0x7f00000000c0)="aa1ce04019c352a61d4979e0bcfe320d3bb74dbeb94627c8ce283c6697831c57d5e9dede9442c34d83d9c4b185b5cdee05b946b301e04ca07d5507ff269df77b4d2646e629b0acc7327d5e2619e6", 0x4e, 0x1, 0x0, 0x1, r8}, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x3, 0x5ee, r1, &(0x7f0000000180)="061c1045dcb65774166b44b2f84630d2fbd97642241dded4073fdadcf8df87c548d89638a1f9d007ddeaed5965990f67db8188f65da8d4cb313fb8c2867a6f1d4d035bf97ddbb4d5de2f785513d05b949d75e6be58c4deb7a1c323096a0bf5f94aab00e35685d44488699e36355b59d837723678f561318594e04a352a3a8c549cd738d9808b36b5ae11973c6c954963f86d86734c3b22138245eec91623fd2ff2f1af64cba92bd47d2d05b64f92b6007975f317aa99e2e0181dded66f1af3c4fe3107ae78d3b908e39585", 0xcb, 0x3}, &(0x7f0000001600)={0x0, 0x0, 0x0, 0x5, 0x55a1, r1, &(0x7f00000002c0)="01aa9db2fcaf333416ba66f602978e0c791a8e7746ca855b34627867a20860513316a260ad0be11f63944063c6fbf8c5d883252142be4c3c7f810d203b659edbdcc173d5886fb75c946aee23dc7886c6f85f45fc774005f1c93ebd44f113c9d478c96d8c81c606979b080b0e69a94b6847a91fdbf5262c8657fea0bd24322bd59c6e2189ff7d1edbe134161ee482bbf791fd6711eca579facbb424af3a92c159f1c619c1e09f87607302d4932775fffdc1f63b228b1ad46c60eb0f1709b46cd5c44377a5cb7560e8ac858d34f6efdc2de4186228", 0xd4, 0x8000000, 0x0, 0x1, r9}, &(0x7f0000001700)={0x0, 0x0, 0x0, 0x0, 0x6, r1, &(0x7f0000001640)="90da4375f7643d40bbb31c44da672047befacb65a8d5dfcd6fa22ffe48ae63c9a7943492cc2ac7bdc1ed14df4a124f72681da70d0f5464916bca062e39d81fe33abd50ca2ce08c2df455bbf6cc8e3c55844a5b469601ba5e9c6219cbe55a5a38939dd74c7452607f24d4edfd618ed9f1d7cf9d6eab74dc75c4630d08cd7bf5e6d1d813577dda05", 0x87, 0x8, 0x0, 0x2}, &(0x7f0000001840)={0x0, 0x0, 0x0, 0x0, 0x3ebf, r10, &(0x7f0000001800), 0x0, 0x100000001, 0x0, 0x6, r11}]) read$eventfd(r1, &(0x7f0000000080), 0x8) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x4}, 0x1c) 17:52:01 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffff801, 0x0, @perf_bp={&(0x7f0000000000), 0xdc09}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x80, 0x20, 0x5, 0x8, 0x0, 0x0, 0xffff, 0x1010, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1ff, 0x2, @perf_bp={&(0x7f0000000080), 0x1}, 0x401a8, 0x3, 0x9, 0x8, 0x7fffffff, 0x2, 0x2, 0x0, 0x7, 0x0, 0x3}, 0x0, 0x10, 0xffffffffffffffff, 0x1) r1 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) fcntl$getown(0xffffffffffffffff, 0x9) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) ppoll(&(0x7f00000001c0)=[{r3}], 0x1, 0x0, 0x0, 0x0) dup2(r3, r2) r4 = dup2(r3, r0) r5 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r5, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) ioctl$EVIOCGSW(r5, 0x8040451b, &(0x7f0000001540)) openat(r4, &(0x7f00000000c0)='./file0\x00', 0x200800, 0x100) r6 = syz_open_dev$tty20(0xc, 0x4, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) ppoll(&(0x7f0000001480)=[{r6, 0x200}, {0xffffffffffffffff, 0xc255}, {r7, 0x208}, {0xffffffffffffffff, 0xa280}, {r1, 0x20}, {0xffffffffffffffff, 0x142}, {r0, 0x40}], 0x7, &(0x7f00000014c0)={0x0, 0x3938700}, &(0x7f0000001500)={[0x583]}, 0x8) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000280)='./file0\x00', 0xffffffffffffffd5, 0xa, &(0x7f00000009c0)=[{&(0x7f00000002c0)="c39b12cdf982d01fd9ff9f7cd31b3248347b53d815d62996700f00bdf93ecb972ff5a0a24f97c00c725f821a907c3fcefa49e3fc3c8f74f1c38fc06cd0b1f90f53acef9b66e84f90791f4d850f169ea396e4fadf0e21b4007be3d10910d54a8628241c9aa0e66886e8c7", 0x6a, 0x8}, {&(0x7f0000000340)="b6c865fbf22306e7857765d7df5b48f603c394da9e589f399a7a798bcc01c4515cad76336399133264e8d9fdf63a3b61eb248222ceaa29593594f747db7db696ce4b33d62bb202f56b6295df87e309216c727d98ffa2092814f9771b52af58e3929a004ed6a8a7930ff2db15353d12473dedf3e062b3fcb870fa500195a1e778558612583c241282488d2c38254e9099ae435c6e8f5e9217e4115ea675eb119dcb57625231adbedf763e5af78fb1c60cbedd51fd24e725ed5a1247ef27e09d61fa408ac3277ff47c0217dcd0c5cb861f24becc0fdfc527d3d02ba8fd2f", 0xdd, 0x4}, {&(0x7f0000000440)="e0985e528e8cde2b13f23baf813b10077a6540b55f71b8ff2ac845d5d0161f9017e19e817f830edee1efc8980f9de046613fc908ef198db0a7f019bbe4cf5389563fe11bae", 0x45, 0x3}, {&(0x7f00000004c0)="f27123a423457541b0deae0a6215714c2766f6a0e6ffb36ba8a780439683396e52503d119e3abcc8b7098493fc9ee78a33788b815d4f4f5c348089a9439542082dbd004fe9676085729f0e381799c72fb7f507c6ac31e3b86e74f2f1dff7a9d481c27df9bc0010dcf18d58813855fde9ee74aac682b0e2abb527eeb18f7d7c18d5760d018c1f63b581f664630164f8820a28d7ebad568b16e02a6f17f68cd7d7e597d1e7a8c0c965423fbafeb4f089241abafac3ab4149ae17db8777c79a357d660100b715ff725ef20a60f95d5b26b7025a50e63010d54fb61c6af6ca", 0xdd, 0xe80c}, {&(0x7f00000005c0)="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", 0xfe}, {&(0x7f00000006c0)="6722f27b00368c3545a15615e06ada55a3cf0ed1481bba35e126d385715a19b18b0a77cddfc516d43738478d475fe65a284e6d80e8d9f9a998d920cacbb9194b99bd0eac88521ebea8ee67fe96953bb8f78d708e17fdad70feae125bcecc895309ff79baa151a968bb1936ad29fb06ab0ae5d910d94815a95e3e4aa41c55ff1ae39f22184adbfed5234133c0cda95252a904dfc85ec637e36888ac86c31a687f4ccca9e2e7ed6afab8e80d772ed586d5a3f18eccb225ad4b0bb92512b69423336843632b77c3b46b82627d7003230bfb62b186efdbf1ac", 0xd7, 0x6f1e}, {&(0x7f0000001540)="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", 0x1000, 0x7}, {&(0x7f00000007c0)="2946cde7362d40d13ad9d7d5e663dcecb5211e9363a30f42505b38b11c430f2bbcb682fd0006a440c8eb58cb538cd9b3c17958cab9581decb1250d94ad073b3d6df7fd27613e5c6353035432055d4ab68857cb770ce5d345c855333a8a558fb2c54223776cbe0fc2e2315b3e12605840a04a21bc200694fb99fdaf8b800f8063ded02a0e8c9c7fc80944f0e2be4c35eeba67956128fa0b33f8cefdffa4af64121f5717fc9d5c31d927d9c7ea96", 0xad, 0x2}, {&(0x7f0000000880)="b6ba39bbd91a0ded517dbf3ae82af092a0e3ea61f85386ea4d90edb1aaa1ff3fed72e8a842bd161ce22638bd1005dafd8564e69318bbd3c687319ecb468ba4d62634749251f82df8a18a5bdc63e38cca16b66631b3a9dd74fc17d83266cd5e29222006136664aeb6f8a1fdd2ad4d800076251cf9267a95e6c84a216009acf9e5f48373333c86c072c08f1dea7f747c1cfe090b887c4cd15b051047592b51162f6d1fcea0ad3fa4237ebeec92", 0xac, 0x1}, {&(0x7f0000000940)="ee77cff28cc2b0d67891cd3aa4d622186a56f7376c979fad0b67eb026a49d9de9df4c00ffbb33e807d7291687b5ef70db4ec3920e41f4a491fe8c0bd5a51a73edb576f035f1ea4551d923e23e51669502a0b9fb44bcd2a3ff3323aeca3e87d2093dadb37315e19dcd413f679", 0x6c}], 0x604c0, &(0x7f0000000ac0)={[{@norecovery}, {@grpid}, {@nobh}], [{@func={'func', 0x3d, 'CREDS_CHECK'}}]}) 17:52:01 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x300}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:52:01 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0}, 0x8000000}], 0x2, 0x0) 17:52:01 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f0000000085ffffff01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:52:01 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0}, 0xf000000}], 0x2, 0x0) 17:52:01 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000008cffffff01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:52:01 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0}, 0x10000000}], 0x2, 0x0) 17:52:01 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f0000000097ffffff01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:52:01 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0}, 0x10000120}], 0x2, 0x0) 17:52:01 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0}, 0x10080000}], 0x2, 0x0) 17:52:01 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0x0, 0xe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:52:02 executing program 4: sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x404c000, &(0x7f0000000000)={0xa, 0x4e23, 0x1, @private1, 0x4}, 0x1c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) ppoll(&(0x7f00000001c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) r2 = dup2(r1, r0) mmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x1000004, 0x13, r1, 0xa750c000) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000040), &(0x7f0000000080)=0x14) 17:52:02 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffff801, 0x0, @perf_bp={&(0x7f0000000000), 0xdc09}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = fork() r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'veth1_to_bridge\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r2, 0x89f7, &(0x7f0000000140)={'sit0\x00', &(0x7f00000000c0)={'syztnl2\x00', r3, 0x16, 0xbc, 0x80, 0x6, 0x8, @dev={0xfe, 0x80, '\x00', 0x38}, @empty, 0x20, 0x20, 0x9, 0x4}}) r5 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0xc4000, 0x0) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000180)={0x14, r6, 0x1, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r5, &(0x7f0000000380)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB='d\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="000225bd7000ffdbdf250500000050000180080003000100000008000100", @ANYRES32=r3, @ANYBLOB="08000100", @ANYRES32=r3, @ANYBLOB="08000100", @ANYRES32=r3, @ANYBLOB="08000100", @ANYRES32=r4, @ANYBLOB="140002006272696467655fb2736c6176655f3000000800012d062fe586adf0b6d14a31a5afb1c8faf3d2b63c49f5599662caa97f7264aace25bf69274d53335fc548c8a54af3637a4ebb5a2f921c40b1bd781d20dee1884a062bb0bc5ef28b3319265cf3a4dcae83664ac416bb86c9ec1a73ddae3073840d61d9f460c92ac8be899397b9bba8e8a68a32cef6b50f9fe5372e26a3285b2f04017eaadae22c3b49fa2c308a47299efc8ea2c7ef4937a8b4880e480cd9adbbef78", @ANYRES32=r3, @ANYBLOB="0800030000000000"], 0x64}, 0x1, 0x0, 0x0, 0x4}, 0x250c8e04860779a5) perf_event_open(&(0x7f0000000280)={0x4, 0x80, 0x9, 0x2, 0x40, 0x6, 0x0, 0x1, 0x10, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f00000000c0), 0x9}, 0x2e80, 0x80000000, 0x7f, 0x0, 0x3, 0xb60d, 0x0, 0x0, 0xff, 0x0, 0xe0}, 0x0, 0x9, r5, 0x2) perf_event_open(&(0x7f0000000200)={0x0, 0x80, 0x20, 0x5, 0x8, 0x0, 0x0, 0xffff, 0x1010, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1ff, 0x2, @perf_bp={&(0x7f0000000080), 0x1}, 0x401a8, 0x3, 0x9, 0x8, 0x7fffffff, 0x2, 0x2, 0x0, 0x7, 0x0, 0x3}, r1, 0x10, 0xffffffffffffffff, 0x1) r7 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r7, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r8 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r8, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) ioctl$EVIOCGSW(r8, 0x8040451b, &(0x7f0000001540)) r9 = syz_open_dev$tty20(0xc, 0x4, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) ppoll(&(0x7f0000001480)=[{r9, 0x200}, {0xffffffffffffffff, 0xc255}, {r10, 0x208}, {0xffffffffffffffff, 0xa280}, {r7, 0x20}, {0xffffffffffffffff, 0x142}, {r0, 0x40}], 0x7, &(0x7f00000014c0)={0x0, 0x3938700}, &(0x7f0000001500)={[0x583]}, 0x8) 17:52:02 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f00000000daffffff01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:52:02 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:52:02 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0}, 0x20010010}], 0x2, 0x0) 17:52:02 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x300}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:52:02 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f00000000e2ffffff01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:52:02 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f00000000f4ffffff01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:52:02 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0}, 0x28000000}], 0x2, 0x0) 17:52:02 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f00000000f5ffffff01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:52:02 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0}, 0x29000000}], 0x2, 0x0) 17:52:02 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f00000000f6ffffff01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:52:02 executing program 4: pipe(&(0x7f0000000000)={0xffffffffffffffff}) sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000280)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000240)={&(0x7f0000000600)={0x1ac, 0x0, 0x200, 0x70bd26, 0x25dfdbfb, {}, [@TIPC_NLA_LINK={0x4c, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0x1c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}]}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x400}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x15}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}]}]}, @TIPC_NLA_BEARER={0xa8, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_PROP={0x1c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}]}, @TIPC_NLA_BEARER_NAME={0x17, 0x1, @l2={'eth', 0x3a, 'batadv_slave_1\x00'}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x7f}, @TIPC_NLA_BEARER_NAME={0xd, 0x1, @l2={'ib', 0x3a, 'tunl0\x00'}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x5}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x5}, @TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e21, @multicast2}}, {0x14, 0x2, @in={0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}}}}]}, @TIPC_NLA_NET={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ADDR={0x8}]}, @TIPC_NLA_NET={0x30, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x2}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0xebb}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x4}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x7}]}, @TIPC_NLA_SOCK={0x34, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_CON={0x1c, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_FLAG={0x8, 0x1, 0x8}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x80000000}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x7}]}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x200}, @TIPC_NLA_SOCK_CON={0x4}]}, @TIPC_NLA_NET={0x34, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x8001}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x2}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x7}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x7}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x10000}]}]}, 0x1ac}, 0x1, 0x0, 0x0, 0x800}, 0x4000844) r1 = socket$inet6_udp(0xa, 0x2, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x4}, 0x1c) 17:52:02 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0}, 0x3f000000}], 0x2, 0x0) 17:52:02 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f00000000fbffffff01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:52:02 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x300}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:52:02 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:52:02 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffff801, 0x0, @perf_bp={&(0x7f0000000000), 0xdc09}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = fork() perf_event_open(&(0x7f0000000200)={0x0, 0x80, 0x20, 0x5, 0x8, 0x0, 0x0, 0xffff, 0x1010, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1ff, 0x2, @perf_bp={&(0x7f0000000080), 0x1}, 0x401a8, 0x3, 0x9, 0x8, 0x7fffffff, 0x2, 0x2, 0x0, 0x7, 0x0, 0x3}, r1, 0x10, 0xffffffffffffffff, 0x1) r2 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r2, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r3 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r3, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) ioctl$EVIOCGSW(r3, 0x8040451b, &(0x7f0000001540)) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000000)={'veth1_to_bridge\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r4, 0x89f7, &(0x7f0000000140)={'sit0\x00', &(0x7f00000000c0)={'syztnl2\x00', r5, 0x16, 0xbc, 0x80, 0x6, 0x8, @dev={0xfe, 0x80, '\x00', 0x38}, @empty, 0x20, 0x20, 0x9, 0x4}}) r7 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0xc4000, 0x0) r8 = syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000180)={0x14, r8, 0x1, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r7, &(0x7f0000000380)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000200)={0x64, r8, 0x200, 0x70bd25, 0x25dfdbff, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x50, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}]}, 0x64}, 0x1, 0x0, 0x0, 0x4}, 0x250c8e04860779a5) r9 = syz_open_dev$tty20(0xc, 0x4, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) ppoll(&(0x7f0000001480)=[{r9, 0x200}, {0xffffffffffffffff, 0xc255}, {r10, 0x208}, {0xffffffffffffffff, 0xa280}, {r2, 0x20}, {0xffffffffffffffff, 0x142}, {r0, 0x40}], 0x7, &(0x7f00000014c0)={0x0, 0x3938700}, &(0x7f0000001500)={[0x583]}, 0x8) 17:52:03 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0}, 0x40000000}], 0x2, 0x0) 17:52:03 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x4}, 0x1c) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'dummy0\x00', 0x0}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) ppoll(&(0x7f00000001c0)=[{r3}], 0x1, 0x0, 0x0, 0x0) dup2(r3, r2) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'erspan0\x00'}) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x440a40, 0x0) ioctl$sock_inet6_SIOCADDRT(r4, 0x890b, &(0x7f00000000c0)={@mcast2, @mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x7ff, 0x9a2, 0x9, 0xa39a277091634c60, 0x80, 0x800208, r1}) 17:52:03 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f00000000fdffffff01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:52:03 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0}, 0x60000000}], 0x2, 0x0) 17:52:03 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0}, 0xa0050000}], 0x2, 0x0) 17:52:03 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f00000000feffffff01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:52:03 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000200000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:52:03 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0}, 0xc8050000}], 0x2, 0x0) 17:52:03 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0}, 0xe0ffffff}], 0x2, 0x0) 17:52:03 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x8, 0x0, 0x0, 0x4, 0x0, 0x64020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffff801, 0x0, @perf_bp={&(0x7f0000000000), 0xdc09}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = fork() perf_event_open(&(0x7f0000000200)={0x3, 0x80, 0x20, 0x5, 0x8, 0x0, 0x0, 0xffff, 0x1010, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1ff, 0x2, @perf_bp={&(0x7f0000000080), 0x1}, 0x401a8, 0x3, 0x9, 0x8, 0x7ffffffd, 0x2, 0x2, 0x0, 0x7, 0x0, 0x3}, r1, 0x10, 0xffffffffffffffff, 0x8) r2 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r2, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r3 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r3, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) ioctl$EVIOCGSW(r3, 0x8040451b, &(0x7f0000001540)) r4 = syz_open_dev$tty20(0xc, 0x4, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) ppoll(&(0x7f0000001480)=[{r4, 0x200}, {0xffffffffffffffff, 0xc255}, {r5, 0x208}, {0xffffffffffffffff, 0xa280}, {r2, 0x20}, {0xffffffffffffffff, 0x142}, {r0, 0x40}], 0x7, &(0x7f00000014c0)={0x0, 0x3938700}, &(0x7f0000001500)={[0x583]}, 0x8) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r7, &(0x7f00000bd000), 0x318, 0x0) ppoll(&(0x7f00000001c0)=[{r7}], 0x1, 0x0, 0x0, 0x0) dup2(r7, r6) ioctl$FS_IOC_SETFLAGS(r6, 0x40086602, &(0x7f00000000c0)=0x80000) 17:52:03 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x300}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:52:03 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000800000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:52:03 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0}, 0xeffdffff}], 0x2, 0x0) 17:52:03 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x4}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000180)=@hopopts={0x87, 0x0, '\x00', [@pad1, @enc_lim={0x4, 0x1, 0xfe}]}, 0x10) r1 = socket$inet6(0xa, 0x80803, 0x5) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@multicast1, @in6=@private2, 0x0, 0x0, 0x4, 0x1ff, 0xa}, {0x0, 0x0, 0x7, 0x0, 0x0, 0x6}, {}, 0x0, 0x6e6bb4, 0x1, 0x0, 0x2}, {{@in=@local, 0x2000000, 0x2b}, 0x0, @in6=@private1, 0x0, 0x2}}, 0xe8) connect$inet6(r1, &(0x7f00000000c0), 0x1c) r2 = socket$inet6_udp(0xa, 0x2, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000280)={'sit0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'veth1_to_bridge\x00', 0x0}) sendto$inet6(0xffffffffffffffff, &(0x7f0000006a00)="2e21827e477f9461c94ba9904c", 0xd, 0x10, &(0x7f0000006a40)={0xa, 0x4e24, 0x3f, @private0, 0xffff}, 0x1c) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r2, 0x89f7, &(0x7f0000000140)={'sit0\x00', &(0x7f00000000c0)={'syztnl2\x00', r5, 0x16, 0xbc, 0x80, 0x6, 0x8, @dev={0xfe, 0x80, '\x00', 0x38}, @empty, 0x20, 0x20, 0x9, 0x4}}) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f0000000040)={@mcast1, @local, @private2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa2420200, r4}) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r1, 0x89fb, &(0x7f0000000140)={'sit0\x00', &(0x7f0000000080)={'ip6tnl0\x00', r4, 0x0, 0x7f, 0xad, 0x3, 0x70, @private0, @dev={0xfe, 0x80, '\x00', 0x29}, 0x7800, 0x7800, 0x80000001, 0x6}}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'sit0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'veth1_to_bridge\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, &(0x7f0000000140)={'sit0\x00', &(0x7f00000000c0)={'syztnl2\x00', r8, 0x16, 0xbc, 0x80, 0x6, 0x8, @dev={0xfe, 0x80, '\x00', 0x38}, @empty, 0x20, 0x20, 0x9, 0x4}}) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000040)={@mcast1, @local, @private2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa2420200, r7}) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(0xffffffffffffffff, 0x89fb, &(0x7f0000000140)={'sit0\x00', &(0x7f0000000080)={'ip6tnl0\x00', r7, 0x0, 0x7f, 0xad, 0x3, 0x70, @private0, @dev={0xfe, 0x80, '\x00', 0x29}, 0x7800, 0x7800, 0x80000001, 0x6}}) sendmmsg$inet6(r1, &(0x7f0000006800)=[{{&(0x7f00000001c0)={0xa, 0x4e20, 0x0, @empty, 0xb4f}, 0x1c, &(0x7f0000000200)=[{&(0x7f00000002c0)="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", 0xfb}, {&(0x7f00000003c0)="183b40c181b5349680f779f9497671bbb9d1c3442e346debf8a67bd640082cdcbc918a9a150fb4b5f198b6bd7b86c25bcf1de0d6122a282f0be461c3005763dd4d5ea67a8fcac997f2c9fb7cec189cbd9af83cd01dc92f125ba5243182bb2a484b3c4f836caa5c49fb47d0f5a54df899b0c94967994b1cd516f9bd2cadc2c2df66f1734be81d24f6fede723f627aa1cbffb6e2fc4c38ec88e26cb90ee759814f45b5829113f42d2119808653fc4788eed508c66bd999f7011b7b97ec39d360735c11", 0xc2}], 0x2}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000240)="2233b47a3abad4f7d5c3", 0xa}, {&(0x7f00000005c0)="1f0e360eee22a103153dffd61404e81012243988cfa25195f7d70a2127ba744a821c28f2c46dd5d4f2fd96ac2109df5f9b685cecd74917548bcf09026488c4e7c495f137ba8679e22018e513711eaa0a5df223cd5cdc3b679e05bd533e28b022be450749ed6aa11010cf7426fab925efeefb289e9adc0274944fb5f6a869cbf6c579a6b1be4a17717254b8cdd3fba38469c2ad06f72ff9a8e537829d625afce420e2d89089bb107a3a649b8e9dfc54c67ddb096e0b9a64f6c4fdec966d8f778dc46e7b00a580a06c1b618097d037", 0xce}, {&(0x7f00000006c0)="4d79a087759a5a75445cf92fdebf69d5bd566d34b4ccd8b07974bb6b3983058af35c65f41e3f0ed26cdbed18c891dc51861cf465f538d6957dea0e5cd7a8652b031ea5cf0f043158cef01b4efbe95b8d97470a4c9ae27f2b8ce4e12c457be0ad3cdbc00893ef349a0f2fa4ca5afb113821725860cc6d5a8119752c91385f4ff94b7ea8534d87e9becdadf9f85f985bdad228376f11c424cb688f988bfe18dcde4561b2acd1c4f944019a0a42f06f2ee942c511e74e6aca37ad8bf6b72a1eff8c457020ab07c1892c2b257b11012f116f626829dc37382584a1c90c37776ab099117b8f4d0441d3d5", 0xe8}, {&(0x7f00000007c0)="64af277df688c06a320bf2c8d4115b9310fd5a4025b637777c91993d29b559bd68ee00c7b344f29dd20a31c4a2c080ab7c9c881cb2d0052762da02c4716043bd2205859fdaa0ec1991a2e001ed395d4f3901e6b5d350648f34c86fd9a29434cd0ba80f95ee0d70d7b4b66986819d8372ac62f0167ca718ce5d48e16b", 0x7c}], 0x4, &(0x7f0000000880)=[@dstopts={{0x118, 0x29, 0x37, {0x89, 0x1f, '\x00', [@generic={0x8, 0xa8, "f621535fdbb39a304243a60dda07282e78ef394096067f5d30596ccbf4519d27bea3c2fee170ab80135bf8dac0a6bbfcd58ab65200499af80737252081a5b6f6dbadbc1421500b97462f9d5afea3f69940b0ef7f7c12e2947e7d2ba624eae2a1113f9799bb0c8d03932fc505179ed62b42f50735e89a29f6a05a68f9ee1552a24a307c358a9f16781e275b47348087178a0803fcdbf31fb9cb67f5c194020b91e1832db80c726a89"}, @pad1, @padn={0x1, 0x2, [0x0, 0x0]}, @calipso={0x7, 0x40, {0x3, 0xe, 0xb2, 0x5, [0x946, 0x1, 0x7fffffff, 0x7, 0x1d60b6aa, 0xff6, 0x682]}}, @enc_lim={0x4, 0x1, 0x7f}, @padn={0x1, 0x6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x3c, 0x0, '\x00', [@ra={0x5, 0x2, 0x100}]}}}, @dontfrag={{0x14}}, @hopopts={{0x50, 0x29, 0x36, {0x21, 0x6, '\x00', [@generic={0x2, 0x32, "827cd5297bcf26a96b17d9f1bde73cfd43c71ea793bc3fd248e1b7b6fccee0f7d7d3c740b80fb63fc6258078170f33882c0a"}, @enc_lim={0x4, 0x1, 0x7}]}}}, @hopopts={{0x1048, 0x29, 0x36, {0x87, 0x205, '\x00', [@jumbo={0xc2, 0x4, 0x10001}, @hao={0xc9, 0x10, @dev={0xfe, 0x80, '\x00', 0x30}}, @generic={0x1f, 0x1000, "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"}, @enc_lim={0x4, 0x1, 0x1}, @pad1, @jumbo={0xc2, 0x4, 0x40}, @pad1]}}}], 0x11e8}}, {{&(0x7f0000001a80)={0xa, 0x4e20, 0x10000, @loopback, 0x401}, 0x1c, &(0x7f0000001d80)=[{&(0x7f0000001ac0)="c27e8585b1d4deda69e2ab075afbd55c9bb971d115744d0073be83ebd2bf156a396d677bb7a2fcf82d054b56553cfada70e734f8ea549b62", 0x38}, {&(0x7f0000001b00)="e36c0da3600b987f7532b24068c2ec1f99163a2fab2b59150ab5eb", 0x1b}, {&(0x7f0000001b40)="116bbd8e84cc887f6736673c837ef29b7a44a6ef01383802e4e9541c4713bfe9f7f545b7ebf77c3ced5208fbf3d69c86849eacf6c2d59a21b45dbbe2b7fd01c8237ed17d3eb56528b8a3a372f005f55b7fc35f760d9ff7fe4fee36e173b1bb1b866d3799d91687fb6370637f1ffbcdbd0af66abbcc7f126e166b5205874e9e99e8d63286819bfad5f8e20b97ced0c5a4f8b428997595d6c6e954ad6a2883e84204df6a0ff26f205d6cffc99d0204dbf1d8", 0xb1}, {&(0x7f0000001c00)="d3ad48fefe0118da883232d7081b2fb307aaaf1a6551c251c31cc50fa5dddb9ad7dcfa0f278a51ae9538dbe230d38d21ee0a143fbb892e52ab1caa9284fa2f778961b884266081bea769dfd80d72c64cadb452c245049444869f788220b7daf57796ce283478e3c8c58bf2d129c77e322492149c1af8e96f0811fa0dfb56391c2076703477191fc407af33e37ee3da4e50ac2a7e2ee03e12aba1", 0x9a}, {&(0x7f0000001cc0)="04c1f37951022cf853fb8f1403e663d56494465a9085b0d514a65dd2f3e12ec670361b254a7a39a7fdb175e0fb937b621c4164d092e4178fe11c4b242eb62cfaf0f105e697c8b60097c38715a8e0090360b28d3f7a3c70666fb9a67d4c533f72a3b2f70a036ac795c477e7dec80bd59b399de889edd50aea30f3661d353e8b990ebd0e8e9f81e230de5977c9add78a05bfe2ea50ef95024ff9", 0x99}], 0x5, &(0x7f0000001e00)=[@pktinfo={{0x24, 0x29, 0x32, {@loopback, r7}}}, @tclass={{0x14}}, @hopopts_2292={{0x1c0, 0x29, 0x36, {0x3a, 0x34, '\x00', [@generic={0x62, 0xe4, "8eea9a87ff8c0513d688e4b59a69d6cac1518e49a3f357f89bd2c4101e97873580fdcb8840442c5a4df853b1fa4c1a156d368f635a51e66e7dd886459346d320dc97042dd9ea523049430c41ec752d43f4a11f62b31045524ac4e1709715d525e6c34af57cc42c6b0b3ddbe3cfd7bb778874ddd7ca3da97c279573ffdbab6368bdc87958ee5e6092dd24cfc2dab7b491fb74c2212794b1a564cead3c427ec25504690848cc52cebd19119df067bb4e638e3026ca4409b3ad32d3260d3afc735a0237e1ac0aa27fef1589442d7e582516901ffea8543cffa78f320f31f7954cdf8db9875f"}, @padn={0x1, 0x9, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @generic={0x8, 0xab, "0ae8469c195173e56a08c69c46ff8c1d5d061ffc230ae996d9b5dd643c99f5046ac8af6efbd75ba7345bbcf870bf88458e1c4825b2592c3fc80f30a84972e25d68af74b155ffe1a1d58aae2be487a98d0e67300fe7c8daf74e62f8ebbb5ca1bfb7c4bbe996985e3b60b15495ca95ac276dedd3d54f7624399f4d3a7313049fef5b20bc1e43b969813c1c87b9c5a66a1f58abe1ab8833e7f029e9b159c43850cb643dcff008896cb4713568"}, @ra={0x5, 0x2, 0x4}]}}}, @hoplimit={{0x14, 0x29, 0x34, 0xa6}}, @dstopts_2292={{0x30, 0x29, 0x4, {0x87, 0x2, '\x00', [@hao={0xc9, 0x10, @loopback}]}}}, @dontfrag={{0x14, 0x29, 0x3e, 0xffffffff}}, @flowinfo={{0x14, 0x29, 0xb, 0x1f}}, @hoplimit={{0x14, 0x29, 0x34, 0x3f}}, @dstopts_2292={{0x20, 0x29, 0x4, {0x8, 0x1, '\x00', [@ra={0x5, 0x2, 0x3}, @ra]}}}], 0x2b0}}, {{&(0x7f00000020c0)={0xa, 0x4e24, 0x1f, @private0={0xfc, 0x0, '\x00', 0x1}, 0x942}, 0x1c, &(0x7f00000021c0)=[{&(0x7f0000002100)="7b18fbd7d2e1ca11143ad7053ce17b8a003dae2b17568cc8cb13aef649b6908f2a73c86af51f200fadc284021562b7a17c60061547113722a72cf2e32c20107c481d570232ada8de64ca89d5969a2cd7d15d215ab37d5f343751efa5d821f3ef22780d62119c52a6841d98eb417488dc7a802f15fd37af2463981a179198e80d382323367691a0baeacbfaadae976a7f0d76a0b7396e18183aeb8e39d798668adf0acb969f851967f536635606a2", 0xae}], 0x1, &(0x7f0000002200)=[@flowinfo={{0x14, 0x29, 0xb, 0x5}}, @dstopts={{0x180, 0x29, 0x37, {0x32, 0x2c, '\x00', [@hao={0xc9, 0x10, @ipv4={'\x00', '\xff\xff', @multicast1}}, @generic={0x8, 0xdd, "a4d317120116c4377fd5dc3454c1a1b0f0db96d6bd4032334ad217106f0c5b4d9131ed37b87d432a47634bd7568b630abc4bbb02816fb21c35405242150724a6647aec5566d7934b6b7fb6263570fa38df7fe0b9ea144eb00d77aa9f7159c4a9771e507538cb19d358f120900caf3f0d5517c001bcf1eab0ad589c61269ef0a9069e51cc889ed87f46c961eb794ac12fd8aff3dd5c3673d65e7a7e60d27a823f21e7c95ab6863089177d772ac00b4e7edfc5cd46fd6cf89b02c5bd32455d627e90d8e327c241317f1b818be5eb42f6b9cb6ccf375dc24e07b703ae1f6a"}, @calipso={0x7, 0x48, {0x3, 0x10, 0x7f, 0x7, [0xfffffffffffff7a8, 0xa8f, 0x0, 0x4, 0x2, 0x4345, 0x1000, 0x5]}}, @enc_lim={0x4, 0x1, 0x7}, @enc_lim={0x4, 0x1, 0x6}, @enc_lim={0x4, 0x1, 0x72}, @calipso={0x7, 0x18, {0x2, 0x4, 0x3, 0x5, [0x0, 0x7c89]}}, @pad1]}}}, @rthdr_2292={{0x28, 0x29, 0x39, {0x2c, 0x2, 0x2, 0x7, 0x0, [@private0]}}}, @hoplimit_2292={{0x14, 0x29, 0x8, 0x2}}, @tclass={{0x14, 0x29, 0x43, 0xd60c}}, @rthdr_2292={{0x38, 0x29, 0x39, {0x0, 0x4, 0x2, 0x0, 0x0, [@empty, @loopback]}}}, @pktinfo={{0x24, 0x29, 0x32, {@private1={0xfc, 0x1, '\x00', 0x1}, r6}}}, @dstopts_2292={{0x88, 0x29, 0x4, {0x2c, 0xd, '\x00', [@padn={0x1, 0x2, [0x0, 0x0]}, @jumbo={0xc2, 0x4, 0x3}, @jumbo={0xc2, 0x4, 0xfffffffd}, @hao={0xc9, 0x10, @private1={0xfc, 0x1, '\x00', 0x1}}, @calipso={0x7, 0x10, {0x0, 0x2, 0x4, 0x0, [0x0]}}, @padn={0x1, 0x4, [0x0, 0x0, 0x0, 0x0]}, @calipso={0x7, 0x10, {0x2, 0x2, 0x4, 0x6, [0x8]}}, @padn={0x1, 0xa, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @hao={0xc9, 0x10, @remote}]}}}], 0x2d8}}, {{&(0x7f0000002500)={0xa, 0x4e20, 0xa2ac, @private2={0xfc, 0x2, '\x00', 0x1}, 0x2}, 0x1c, &(0x7f0000003900)=[{&(0x7f0000002540)="cd983fb3389037b2c9700a8ef9b2bcc5ef50f6c79d4b60ea491c8282bc4b2a1f32a3f3d5a69e19c8520b59d89ca02e393563d1b89de711f60e361ab5bb6e46554b49104c45a14b3c10ffdfa13764b3aa227925a8749526f938bb1cc748b35e845b4d115c110da1f9f36f2e19b1b1f4b979e729e37e3988dca81634caef068e9224382685fd6ed8be9705b2530c3ce15d07aef1a7743c97482029d6702ca7406c1e182ee2ade6e28285703144d1b4b0c33e7ce897d6e9a79745293029032eb144bdb53e8c684a0519089471127f468add0d28c3e39721e85096b13e7a336e5a110b2cc2418da210bed01838092d834ff97f7036", 0xf3}, {&(0x7f0000002640)="d80bf225a67189a700ded63899147284c049bd176c0c9a2bfc7fd3936685b1a488d3b58e2e3cd457143a56c7331d89df7de005caa7686dff41e4ea9f732a3269ed207f56ba78431aa00f4e19406d892109f977d8b975102b1e47a9be0d18a77dea8c30a1c1e23899bae988587e88fb26bb1f4544e7c6387e1b07cb825d45f5cce90b9b919db52fb0faca515aeda96a953ef360be4d88a94f1b734c6adb4925f015", 0xa1}, {&(0x7f0000002700)="b01048fd61f66d97e574dac15882d9345b66dfd45ebb65692825bf6f597bd46acc2197da3ebd564a3de1ed7f48ebb4ffa8295c49c1b97d0cfa3020fc9aa780844b2290d291ed12b31c8fc8c20cd0d4c4c9de96f828f8539873d190c4bc0139eeb47cbfb8e24c005d5c0bd746d889907db77c5e24", 0x74}, {&(0x7f0000002780)="ed691800b835639b3e8a02576ae30d82b56e9683508de276ce9bfda63b5ba3abcacc3755c869ccb6237ee1f637a602278ba2dd8f66fd9849900de6f6e2cff1df09d53efe49c6a4ed59b3d923111eece0e87146a8df30b3fd3a30bb95f55eaa397f1f1bd35c10043bc7c6a412639d4dabbe5703e40e943c17f46a39565dea302e22138a907c8c4d297b7409f7f0a467bc5cb720ea712c26836915e874fca7846f9240590a00ba913df6fba31a3e58b90877c53a3360684cea02837dd28b94b8a4802dbc1b765cf102e8c9972f", 0xcc}, {&(0x7f0000002880)="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", 0x1000}, {&(0x7f0000003880)="6f097432053fe6363dce837bda33e05d7eb593783b16768b5f698aea541908cf76b99a1e9ba12fce00ddac193a60f8a77ac4b30ae7b38bd37b4ba4a20d97da389bfceaecd2ee723518bda7635f56ab9577d8c1ebdc749bc1f7f3a083bc6784ddb143f05352645159a180", 0x6a}], 0x6}}, {{&(0x7f0000003980)={0xa, 0x4e24, 0xd873, @mcast2, 0x8}, 0x1c, &(0x7f0000004d80)=[{&(0x7f00000039c0)="46910e2f670f909281db793b7e6736c09645e26f0b200a39122ba8ed55d8ec0fcd8dac2f31cc2b5a3b78de3befbf074ea4caf3c86434087407c47df98a5568e906ee33fc015d3e4e58658aedeca270", 0x4f}, {&(0x7f0000003a40)="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", 0x1000}, {&(0x7f0000004a40)="892baebd177b753329b63af6c89d71f7e9a8455f1bf8c5351d08e445a3019ee50018b90eec5f35ebe85f30634c82e0c08cad9b9d919174283967753c52683286e9060cf8e680f0cf6d4d1886ec8f8a03b53a6b254a15ef9cad79875b19a7c1664152ff85499a617b4e17b260c9a49b71cb375885566e71dd6debc7456a4976a47df4b27fb4616040d4bda963bbfeaa4137265c081af4a045d3445f6a64757f479cf5e0cf8fc19ea2ff69b114789fc3f508c70203e7b2932ea9ac22598fa185e5ab46971dd1a2c4a86cb60d2ddcc4778568741b00dea0946a01fd33f02e618ce06b", 0xe1}, {&(0x7f0000004b40)="c1f05783f43ef25061eb387f72cc542ce1e9a7540136b90f8407404633ad506cb816c9c95c8698d6acba5d953c94385c4e00b63cef3557b9dd7f5d1abcffb2be4410c246b9e52fb84cd38d81a64e2e", 0x4f}, {&(0x7f0000004bc0)="b24b9d624e26c7aa4b5873801615643e05c4b21de9bec2be56f7eba5faebdb7327f46b04aa418e6631b47f7fda382ab8785070f6607f3ebf33735ede726f8f1e8d4e7eb5bdf7d14af1b91a32564b337997d7760a5f8382a9c5a7dae56aedc85abd8382201f19bbe2d6e767b5dca0861661d1b2b360f00656d9d5683ff95cf8974321453f23163291f176e466598a09a3d4ada548f8029e762c958e1a5518091e1841c48fd3b53ced01c77c7c440b5fb5f5a6c637d9ec134b43512febd950ddbf0c88e9310d6fd3def637baabf58af17a07756321c635129c4f2960fad2493af11b48cca96afabcbe049ac56ea79555", 0xef}, {&(0x7f0000004cc0)="9dd381b3cb2a96fb67713304f4472e0640cf51a17dbea2630ab895f8862d1e15278d5e3f108564edb2c69a1b3751dc9d3148973a08529fe0239962126651a651aba5fb72deff5e1b5dc4dff531f0ed9658543c0480dca4338c18ed5fcec40975aeaf180a79b10a7e66b6cfe7dda8a1d13eec47b2ecb42fafaee6de506db8292ad19aa60ba945e58c21d3db26b676b20f4a3a0f7a97c7bc1b2868c542f65a139239f89fedbbce03bd", 0xa8}], 0x6}}, {{&(0x7f0000004e00)={0xa, 0x4e20, 0x2, @private1, 0xfff}, 0x1c, &(0x7f0000004f80)=[{&(0x7f0000004e40)="855eff00fbc9ea25a23d629292e04610ba69127b620bf19b46860f97d3ffffbcafdd3d85a9b122857a55d69782fb6ff718a4ecfe9987fed9d747bf34436d0fe06e8635eada69a6d0c3af14580b0176a9c1f5f54cca23443220b28db53d15305fe476e12d811f4be19de24750cc989b02335232011b3924ca1e43f566e7dc745cf6b1121d8d9587035fd9f23b1a1a1a10832306f436a77b870c88d80e5e4a82bae19d4f8110a7d8fcd5e0b5c50a7eff7dcb3425e36c53ee28aa097043ac1a54a8d2b9c395ad952f7bdc3472dafa650bfc0b06df2ec62306ab", 0xd8}, {&(0x7f0000004f40)="cb3a1af99bd8546084a89247f6ef7037ad871def04891e299052f74cf8f0100c11bcf58ef52e626336ede00d1d87ae718acf97eeca790c7561", 0x39}], 0x2, &(0x7f0000004fc0)=[@rthdr_2292={{0x58, 0x29, 0x39, {0x73, 0x8, 0x2, 0x3, 0x0, [@local, @private2={0xfc, 0x2, '\x00', 0x1}, @ipv4={'\x00', '\xff\xff', @multicast1}, @private0={0xfc, 0x0, '\x00', 0x1}]}}}, @rthdr_2292={{0x38, 0x29, 0x39, {0x67, 0x4, 0x1, 0x9, 0x0, [@loopback, @private0]}}}, @hoplimit={{0x14, 0x29, 0x34, 0x101}}, @tclass={{0x14, 0x29, 0x43, 0x9}}, @tclass={{0x14, 0x29, 0x43, 0x7}}, @rthdr_2292={{0x48, 0x29, 0x39, {0x2d, 0x6, 0x0, 0xfa, 0x0, [@private2, @private0={0xfc, 0x0, '\x00', 0x1}, @local]}}}, @tclass={{0x14, 0x29, 0x43, 0x5}}, @dstopts_2292={{0x20, 0x29, 0x4, {0xd4, 0x1, '\x00', [@pad1, @padn={0x1, 0x3, [0x0, 0x0, 0x0]}]}}}, @flowinfo={{0x14, 0x29, 0xb, 0x7f}}], 0x170}}, {{&(0x7f0000005140)={0xa, 0x4e22, 0x3, @empty, 0xa9}, 0x1c, &(0x7f0000006580)=[{&(0x7f0000005180)="1023d0b4b6ba390b6ae7593a2aedbb34d0f6572aeaf13df6cdc41f7842af392adeffc632e7faa7196afa56415f016922422bedd3bfeb66c6ca6191e494aaddc43bc06adc6c469c1b8d61be7bb32931f35716f06ac9f12f8228711be8", 0x5c}, {&(0x7f0000005200)="6f4f579064e582630d14e7d6a0e9026d471bbebbf551093e330153cbbb877ed32fe7acb852afcd8a8b21f03fcb0a6143fc63f9ea9770b2ebce38f47bc643bc1e698d38f04ca8b80c1a170cc6509bd8b18b6483ebb47103275c999ac56abb67ed470191e924ab12376cddd548c0bad5830f4467108db9a22736fbe46cfb2cb8cb830f8aad2b4d430ac434583ea9977fb73f8490a2c8e88e94954c8ce219d119833631b24fbe79edca05a03ba468", 0xad}, {&(0x7f00000052c0)="1a44ed982caa67cd5698ff6e5c9903dff74eea1067ad0df8312d743fa785cb874888298181148549282911d2531640b62e2dc02b6a9ff3114a331e50ba8f9d1b2171551513ae260931c922903958e89b0ceebc22ec76d0d0", 0x58}, {&(0x7f0000005340)="78c7a1d9ff78aa6a502b3c3ae3e7b6a62fcd8f5a3a1acf39aebf7f7032cf86f99fc3ac978ae5ebdc3bad801131c07802fe5d53b8d2cecbfbe8b4117c284d9fe671c7dceb505ad1895830b85c", 0x4c}, {&(0x7f00000053c0)="bf57dc0214f1b2991ce844fb2a84388fe893e1f2d434f07512a6ae34ccd53bac3bec1a4fce0a440b0452647887df52c79b86ebb803b2232d4b77fc25ecf80b99e9ac914c8b103b2c7c51c8b2bf7f7e3831cdf430819819b05e45bd0ae631184f871e332c95cb521bf138b41df688481dc3687613c407682ed0775e7c26782d2ba3eb0cd00f1102bbf12c99337c50b7bf6245098ffca5d0e2e906c503a37913cad1bad61d43fa2b44410acbcee7317418225cba27131d6b02", 0xb8}, {&(0x7f0000005480)="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", 0x1000}, {&(0x7f0000006480)="a119744eac91d9165ae92f2ba865d5cf8730d37ffb9008ac079e36272811c04d128160e30d02f73295ba6269b650926f906f767d65bf1eec209ddbac7a579f201e0eb5fe30fa2444d5c805feb591442f32bb488f925d1c0b26b9cba9215eb5469d20046dd4668e53cfaf05ae5447901e0bdd370788c15f7f8e966eb53954b79241c41e9392167659bcb3ee79bbdebc81661bcf5580865afedc8f6319b94c2076846c337f5eb77982ff6b378b6142cedb25ff4f466e05e6e1f6ecbbe3a8207ed8afca6eeeff5b18ee89a9f32ccc9c448081e7a56e840393028575afa88f11edc4a38f9823248707e45a5f9869b68bea8c640b0fd5", 0xf4}], 0x7, &(0x7f0000006600)=[@dstopts={{0x20, 0x29, 0x37, {0x2c, 0x0, '\x00', [@padn={0x1, 0x5, [0x0, 0x0, 0x0, 0x0, 0x0]}]}}}, @dstopts={{0x1c0, 0x29, 0x37, {0x73, 0x34, '\x00', [@generic={0x8, 0x9c, "38b55382b355047e6fbe4493dbbd9b1a1cb02910cdcea810b9e120e93c52f22e1ebca384b35892be6da81714ac97c887085b08d4fca93584387a69156eed352f40ccad1726f7d337102f222c242ac08f65573d816cd9a48067be04396d1e330b56c064d9c860e847ab7dbe5a64df56ff2a14bfd39aa2b525b72273ad2a6369a4e2dcbfddc2728f1158b16741d3b13ee3086295d73c23f446aeecde66"}, @jumbo={0xc2, 0x4, 0x4}, @enc_lim={0x4, 0x1, 0x4}, @generic={0x4, 0xf7, "ca1c66bae1530a88c7e7476adf1f8627e35fc883a56102ef95925e0f4ec2a3f691eadf728c4e3960bce8d6370f47f81ea9d2db394c82dd2ce7a976c96e3cc6bb13c9cdacdd263bc2e44c4ec5ab8482bf6006fbbc5773dbf105f82f5752f05a6315597958b9d10164cedddb62e677686f5afbc3a5ce5f4406a5d2b10eb9c0b98ce2cc5c595e2a30ee0b95137789a891dabcb89ee9ce1e678254cb65770a8b15127e34f724e2e52166d289ad4d6a185158cd90955eec871001686aad2d6e5d3a60962ff3596842c5bcd562df7a413821c31b2fe86ebb8436500061d312d7c04f59a4ba08c501eb74dbf26db4562e7a6c40884383133b1ede"}, @enc_lim={0x4, 0x1, 0x5}]}}}, @hoplimit_2292={{0x14, 0x29, 0x8, 0x81}}], 0x1f8}}], 0x8, 0x4008850) 17:52:03 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0}, 0xf5ffffff}], 0x2, 0x0) 17:52:03 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0x0, 0x12}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:52:03 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000002000000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:52:03 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x300}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:52:03 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0}, 0xfc000000}], 0x2, 0x0) 17:52:03 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000017100000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:52:04 executing program 4: r0 = msgget(0x1, 0x1) msgsnd(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="02000000000000002d08aeb3d30eb742dcdc31271d73f9ffffffffffffff740e4ed2f97fd13da849d7c4fadb347dac865e8f475d26cc02a7d152f72545b7f755bb84cd5d9d22e587e340f0f7f339f68aff680f11fc09f1d3bbd84efa35af567fded4bcb85ac4cce86b76082b225dab9fc0521c7eaa4626e97e30a116c61383ec61991c05120f3257d06d87ba6ebee731ca3573586c7be1aba893c8e0e12a46e3c694cae7f643b6d0a38793235ee0741601917422fe58f341a019f84dd7035e513fbd9594206a8bc258233ba55d4af8b6f42259fba5fc37522a13cb63ee1fc0ee00"/235], 0x18, 0x800) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = msgget$private(0x0, 0x404) msgrcv(r2, &(0x7f0000000080)={0x0, ""/178}, 0xba, 0x2, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x4048084, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x40}, 0x1c) 17:52:04 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffff801, 0x0, @perf_bp={&(0x7f0000000000), 0xdc09}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = fork() perf_event_open(&(0x7f0000000200)={0x0, 0x80, 0x20, 0x5, 0x8, 0x0, 0x0, 0xffff, 0x1010, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1ff, 0x2, @perf_bp={&(0x7f0000000080), 0x1}, 0x401a8, 0x3, 0x9, 0x8, 0x7fffffff, 0x2, 0x2, 0x0, 0x7, 0x0, 0x3}, r1, 0x10, 0xffffffffffffffff, 0x1) r2 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r2, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r3 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r3, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0), 0x54003, 0x0) ioctl$EVIOCGKEYCODE(r4, 0x80084504, &(0x7f0000000140)=""/53) ioctl$EVIOCGSW(r3, 0x8040451b, &(0x7f0000001540)) r5 = syz_open_dev$tty20(0xc, 0x4, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) ppoll(&(0x7f0000001480)=[{r5, 0x200}, {0xffffffffffffffff, 0xc255}, {r6, 0x208}, {0xffffffffffffffff, 0xa280}, {r2, 0x20}, {0xffffffffffffffff, 0x142}, {r0, 0x40}], 0x7, &(0x7f00000014c0)={0x0, 0x3938700}, &(0x7f0000001500)={[0x583]}, 0x8) 17:52:04 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f00000000000002ac00000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:52:04 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0}, 0xfe800000}], 0x2, 0x0) 17:52:04 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0x0, 0x27}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:52:04 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x300}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:52:04 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000002000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:52:04 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0}, 0xfe80ffff}], 0x2, 0x0) 17:52:04 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x300}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:52:04 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0}, 0xfec0ffff}], 0x2, 0x0) 17:52:04 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000003000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:52:04 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0x0, 0x48}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:52:04 executing program 4: ioctl$KDMKTONE(0xffffffffffffffff, 0x4b30, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x4}, 0x1c) 17:52:04 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0}, 0xff000000}], 0x2, 0x0) 17:52:04 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000004000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:52:04 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0x0, 0x4c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:52:04 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000005000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:52:04 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'veth1_to_bridge\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r1, 0x89f7, &(0x7f0000000140)={'sit0\x00', &(0x7f00000000c0)={'syztnl2\x00', r2, 0x16, 0xbc, 0x80, 0x6, 0x8, @dev={0xfe, 0x80, '\x00', 0x38}, @empty, 0x20, 0x20, 0x9, 0x4}}) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0xc4000, 0x0) r5 = syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000180)={0x14, r5, 0x1, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r4, &(0x7f0000000380)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="60008100", @ANYRES16=r5, @ANYBLOB="000225bd7000ffdbdf250500000050000180080003000100000008000100", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=r3, @ANYBLOB="140002006272696467655f736c6176655f30000008000100", @ANYRES32=r2, @ANYBLOB="0800030000000000"], 0x64}, 0x1, 0x0, 0x0, 0x4}, 0x250c8e04860779a5) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NL80211_CMD_DEAUTHENTICATE(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)={0x14, r7, 0xfeb, 0x0, 0x0, {{0x6b}, {@void, @void}}}, 0x14}}, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000040)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_DEL_PMKSA(r4, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x44, r7, 0x200, 0x70bd29, 0x25dfdbff, {{}, {@val={0x8, 0x3, r8}, @val={0xc, 0x99, {0x5, 0x5d}}}}, [@NL80211_ATTR_PMK_REAUTH_THRESHOLD={0x5, 0x120, 0x53}, @NL80211_ATTR_PMK={0x14, 0xfe, "0cf99cb156e96be7859a6134e885eda0"}]}, 0x44}, 0x1, 0x0, 0x0, 0x4040}, 0x80) r9 = socket$inet6_udp(0xa, 0x2, 0x0) sendto$inet6(r9, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x4}, 0x1c) 17:52:05 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0}, 0xffff0000}], 0x2, 0x0) 17:52:05 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x300}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:52:05 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000006000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:52:05 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0}, 0xffff80fe}], 0x2, 0x0) 17:52:05 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000007000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:52:05 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0}, 0xffffc0fe}], 0x2, 0x0) 17:52:05 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0x0, 0x68}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:52:05 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @rand_addr=' \x01\x00', 0x4}, 0x1c) 17:52:05 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0}, 0xfffffdef}], 0x2, 0x0) 17:52:06 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000008000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:52:06 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0}, 0xffffff7f}], 0x2, 0x0) 17:52:06 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000009000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:52:06 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x4}, 0x1c) recvfrom$inet6(r0, &(0x7f0000000000)=""/51, 0x33, 0x1, 0x0, 0x0) 17:52:06 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x300}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:52:06 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0}, 0xffffffe0}], 0x2, 0x0) 17:52:06 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f00000000000a000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:52:06 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0}, 0xfffffff5}], 0x2, 0x0) 17:52:06 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f00000000000b000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:52:06 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0x0, 0x6c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:52:06 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0}}], 0x3, 0x0) 17:52:06 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f00000000000c000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:52:06 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0}}], 0x4, 0x0) 17:52:06 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f00000000000d000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:52:06 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x300}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:52:07 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffedd, 0x0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @remote, 0x7f}, 0x1c) 17:52:07 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0}}], 0x5, 0x0) 17:52:07 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f00000000000e000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:52:07 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x300}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:52:07 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0x0, 0x74}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:52:07 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0}}], 0x6, 0x0) 17:52:07 executing program 4: keyctl$join(0x1, &(0x7f0000000000)={'syz', 0x1}) r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback, 0x4}, 0x1c) 17:52:07 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f00000000000f000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:52:07 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0}}], 0x7, 0x0) 17:52:07 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x4}, 0x1c) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000280)={'sit0\x00', 0x0}) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000000)={@ipv4={'\x00', '\xff\xff', @broadcast}, 0x22e9, 0x2, 0xff, 0x8, 0x1, 0x14a5}, &(0x7f0000000040)=0x20) ioctl$sock_ipv6_tunnel_SIOCGETPRL(0xffffffffffffffff, 0x89f4, &(0x7f0000000140)={'syztnl1\x00', &(0x7f00000000c0)={'ip6_vti0\x00', r2, 0x29, 0x1, 0x0, 0x80, 0x2b, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @dev={0xfe, 0x80, '\x00', 0x2b}, 0x7820, 0x8, 0x48, 0x52}}) 17:52:07 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0}}], 0x8, 0x0) 17:52:07 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000010000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:52:07 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'veth1_to_bridge\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r1, 0x89f7, &(0x7f0000000140)={'sit0\x00', &(0x7f00000000c0)={'syztnl2\x00', r2, 0x16, 0xbc, 0x80, 0x6, 0x8, @dev={0xfe, 0x80, '\x00', 0x38}, @empty, 0x20, 0x20, 0x9, 0x4}}) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0xc4000, 0x0) r5 = syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000180)={0x14, r5, 0x1, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r4, &(0x7f0000000380)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000200)={0x64, r5, 0x200, 0x70bd25, 0x25dfdbff, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x50, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}]}, 0x64}, 0x1, 0x0, 0x0, 0x4}, 0x250c8e04860779a5) accept$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) ioctl$sock_inet6_SIOCADDRT(r4, 0x890b, &(0x7f00000001c0)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @remote, @loopback, 0x2, 0x4, 0x1c, 0x0, 0x0, 0x4000080, r6}) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000000040)={'ip6_vti0\x00', &(0x7f00000000c0)={'ip6tnl0\x00', 0x0, 0x4, 0xff, 0x39, 0x80c8, 0x1, @dev={0xfe, 0x80, '\x00', 0x1c}, @loopback, 0x80, 0x10, 0x800080, 0x9}}) sendto$inet6(r0, 0x0, 0x0, 0x4081, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, 0x4}, 0x1c) ioctl$sock_SIOCGIFVLAN_GET_VLAN_INGRESS_PRIORITY_CMD(r0, 0x8982, &(0x7f0000000000)) r7 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000280)={'sit0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'veth1_to_bridge\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, &(0x7f0000000140)={'sit0\x00', &(0x7f00000000c0)={'syztnl2\x00', r9, 0x16, 0xbc, 0x80, 0x6, 0x8, @dev={0xfe, 0x80, '\x00', 0x38}, @empty, 0x20, 0x20, 0x9, 0x4}}) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000040)={@mcast1, @local, @private2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa2420200, r8}) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(0xffffffffffffffff, 0x89fb, &(0x7f0000000140)={'sit0\x00', &(0x7f0000000080)={'ip6tnl0\x00', r8, 0x0, 0x7f, 0xad, 0x3, 0x70, @private0, @dev={0xfe, 0x80, '\x00', 0x29}, 0x7800, 0x7800, 0x80000001, 0x6}}) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(0xffffffffffffffff, 0x89fb, &(0x7f0000000280)={'sit0\x00', &(0x7f00000003c0)={'ip6tnl0\x00', r6, 0x2f, 0x3, 0x3f, 0x3, 0x0, @mcast2, @mcast2, 0x10, 0x7800, 0x100, 0x4}}) 17:52:07 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0}}], 0xa, 0x0) 17:52:07 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000011000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:52:07 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x300}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:52:07 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0x0, 0x7a}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:52:07 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000012000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:52:07 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0}}], 0xe, 0x0) 17:52:07 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4e23, 0x8001, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x8}, 0x1c) 17:52:07 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0}}], 0x11, 0x0) 17:52:07 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0}}], 0x21, 0x0) 17:52:07 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000022000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:52:07 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x300}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:52:07 executing program 4: r0 = msgget(0x2, 0xc0) msgctl$IPC_STAT(r0, 0x2, &(0x7f0000000000)=""/119) r1 = msgget$private(0x0, 0x0) msgsnd(r1, &(0x7f0000000000)={0x2}, 0x2000, 0x0) msgctl$IPC_SET(r1, 0x1, &(0x7f0000000100)={{0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0xffffffffffffffff}) msgrcv(r1, &(0x7f00000000c0)={0x0, ""/212}, 0xdc, 0x2, 0x1000) r2 = socket$inet6_udp(0xa, 0x2, 0x0) r3 = msgget$private(0x0, 0x0) msgsnd(r3, &(0x7f0000000000)={0x2}, 0x2000, 0x0) r4 = getegid() msgctl$MSG_STAT(r0, 0xb, &(0x7f0000000280)=""/185) msgctl$IPC_STAT(r3, 0x2, &(0x7f0000000340)=""/108) setresgid(r4, 0x0, 0x0) msgctl$IPC_SET(r1, 0x1, &(0x7f0000000100)={{0xffffffffffffffff, 0xee01, 0x0, 0xffffffffffffffff, r4}, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x2100, 0x0, 0x0, 0xffffffffffffffff}) msgrcv(r1, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0xac, 0x3, 0x1000) msgsnd(r3, &(0x7f00000001c0)=ANY=[@ANYBLOB="03000000000000004bb54f1e00d6aa8a57daf74d92bc3efc910825d7f287468ee4782b9cb4c248a3f1cb6a972f16eb9ec4896e4de30f2e766eea8dd717e0123f7a7a320d7bcac54ea1f547d7cd25a7882129f08c000441dfda00100017cf96959b80bd10fd1c0e3023ff3db1e1a99b1fe0765c693017f5a8be2441745f7b0d6bf65c906c0d8f2fbbc3d8b0436030deab5669d214efe229af15de73f5a536a50e5cc7c33ef487cb201184501b14de261985775f7bc9a506a500"], 0xb9, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4e23, 0x2000, @private1, 0x4}, 0x1c) 17:52:07 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0}}], 0x2b, 0x0) 17:52:07 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000025000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:52:07 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x300}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:52:07 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0x0, 0xa6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:52:07 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0}}], 0x2c, 0x0) 17:52:07 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f00000000002e000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:52:07 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x300}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:52:07 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0}}], 0x33, 0x0) 17:52:07 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x300}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:52:07 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000032000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:52:08 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0}}], 0x3a, 0x0) 17:52:08 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4}, 0x1c) 17:52:08 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000048000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:52:08 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x300}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:52:08 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0x0, 0x12f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:52:08 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0}}], 0x3b, 0x0) 17:52:08 executing program 4: r0 = syz_open_dev$ptys(0xc, 0x3, 0x0) fcntl$F_SET_FILE_RW_HINT(r0, 0x40e, &(0x7f0000000000)=0x3) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'veth1_to_bridge\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r2, 0x89f7, &(0x7f0000000140)={'sit0\x00', &(0x7f00000000c0)={'syztnl2\x00', r3, 0x16, 0xbc, 0x80, 0x6, 0x8, @dev={0xfe, 0x80, '\x00', 0x38}, @empty, 0x20, 0x20, 0x9, 0x4}}) r5 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0xc4000, 0x0) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000180)={0x14, r6, 0x1, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) read(r2, &(0x7f0000000400)=""/191, 0xbf) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r5, &(0x7f0000000380)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000200)={0x64, r6, 0x200, 0x70bd25, 0x25dfdbff, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x50, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}]}, 0x64}, 0x1, 0x0, 0x0, 0x4}, 0x250c8e04860779a5) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x2400, 0x6) sendmsg$NL80211_CMD_GET_REG(r5, &(0x7f00000003c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000280)={0x24, 0x0, 0x20, 0x70bd26, 0x25dfdbfc, {}, [@NL80211_ATTR_USER_REG_HINT_TYPE={0x8, 0x9a, 0x1}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x30}]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x4}, 0x1c) 17:52:08 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x300}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:52:08 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f00000000004c000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:52:08 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0}}], 0x3c, 0x0) 17:52:08 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x300}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:52:08 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0}}], 0xbb, 0x0) 17:52:08 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f00000000004e000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:52:08 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x300}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:52:08 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0}}], 0x1a000, 0x0) 17:52:08 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f00000000004f000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:52:09 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0x0, 0x300}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:52:09 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000050000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:52:09 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x4}, 0x1c) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000000)={'ip6_vti0\x00', 0x0, 0x29, 0x40, 0x7, 0x5, 0x4, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @loopback, 0x8000, 0x8080, 0x65e, 0xfaab}}) 17:52:09 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x300}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:52:09 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0}}], 0xffffff87, 0x0) 17:52:09 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000051000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:52:09 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0x0, 0x3dc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:52:09 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x300}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:52:09 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0}}], 0xfffffffd, 0x0) 17:52:09 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000058000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:52:09 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0}}], 0x2, 0x2) 17:52:09 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000060000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:52:09 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x300}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:52:09 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0}}], 0x2, 0x3) 17:52:09 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000061000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:52:09 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0x0, 0x500}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:52:09 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @mcast1, 0x5}, 0x1c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) ioctl$sock_inet6_SIOCDIFADDR(r2, 0x8936, &(0x7f00000022c0)={@local, 0x3d}) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000002380)=ANY=[@ANYBLOB="14000000", @ANYRES16=r3, @ANYBLOB="01000000000000c73c00000003000000"], 0x14}}, 0x0) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000002480)={0x101c, r3, 0x200, 0x70bd25, 0x25dfdbff, {}, [@ETHTOOL_A_LINKMODES_OURS={0x1008, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x1004, 0x5, "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"}]}]}, 0x101c}, 0x1, 0x0, 0x0, 0x4}, 0x250c8e04860779a5) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000000)={'veth1_to_bridge\x00', 0x0}) r6 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0xc4000, 0x0) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="14000000", @ANYRES16=r7, @ANYBLOB='\x00'/14], 0x14}}, 0x0) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r6, &(0x7f0000000380)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000200)={0x64, r7, 0x200, 0x70bd25, 0x25dfdbff, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x50, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}]}, 0x64}, 0x1, 0x0, 0x0, 0x4}, 0x250c8e04860779a5) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000002400)={&(0x7f0000002300)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000023c0)={&(0x7f0000002440)=ANY=[@ANYBLOB="14000000", @ANYRES16=r3, @ANYBLOB="000126bd700068dd5b1e9d0a258ba0fddbdf2504000000"], 0x14}, 0x1, 0x0, 0x0, 0xc4}, 0x4040) ppoll(&(0x7f00000001c0)=[{r2}], 0x1, 0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000002240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002280)=0x14) dup2(r2, r1) writev(r1, &(0x7f0000002200)=[{&(0x7f0000000040)="c22188e189cc9999ba3a7e397b8e85dfbf77494dbef412f480121949e121fb4d03de4e6f118e113ad6128a076f6d57689598e29f0f3b878ffa0b238878dc16b6c5a7a81911a9f84fbb29d397ea7e2df6c29d7efcb0557395745e67d1e06866998af613cd05e45e2ddb37ca01223c58344879aeea2484c5eb2660a396ab5de320d1a0bd3c043c3d6a44f42e6d471aaf3db2fc5cfbf723ac6807223ca18264cefc0c6d145673e2c25ab76b6914ef70cbe2eb1aad3c891f1583e895b487db43b88e23e8573c528e60c8b4702cb24e5330688f6545b02263bfd49cb1287efb4ad3893b895beae6080b86a99f8540a5e71200d6c55aefe41168d7a4959331c44f4fb040c5d695b60a551d9f7f95f1b42b712a9f4466be2e62231651710e5f6da5b9f50b004b3a8871290c5cc4f53b5377c9c4056d6dcce70b3d2bf2f8e7238d584a86c66661faf90b338b0e942b6acd1296354ea48db2af519b7957fcc0d4ed53ab5a0947f98f9e819b6a423de309b32a1057c4fc9d961dc90ded90f31a864dcfde98bafb7d4b74d10c071a3371ddc6cc4df462904146012eabffd67d38962a9123257b7dddbdfb9ebf42716f6b65ca2cdef0a6d343d5d09156a2a807df8cee6ad1b6ad95d8190b06583aefe26dcb0cbbc0b6a5c1424e4a5b590f58d37bef9b7eb1c2c56dcd90874f2706c722ea2ea21035a187776d9cdec81deb8d2e37938cb416b18921c7fb400f242633f7cdc58b333322469e2c60e0cbd0d8900afd74db66725576aacbb25d75b738e652cb55a255de47cf3512c781dea8888709eab0a39f9712f6f73173c3bc2b638fba11df198e839e6474faa499ec84431ab6b9a3e2caf15956d786177e49eb55b4d6353c6272336bd25294b883b0761c7d5c87c52aaf771436136caf252f04e3ff1bfb89f3a53774319d9a8d86fb6107133dbbe9b9dd83139c0aaa52effa7e6729aa1422155887e6c2fa7a8e126f3433a0d9414cce31c569e6b9a148b92fbe31da720802c9479f1a2f5c7ffd9ed1f17f9b92781829efdb915662fe468a87c69e038740c3094abc63be2169c4b433b72f2904c36c93700d410e9ccee07fa023d557f7432604579602cb375e511b55930cbbe87ea80944c2560a9eda7eee41938548bcbd4bc80bcf01bbbb5aed161c4a54e90fd0c79f76de19d02a20f9cf8d6552280d4a9097b6a06ed751e715842c93d0f922ecd52f693fc4643a09b0aeef0a24c2b0a76dcf53f5909dbd95b479a25f3dc7c336a3e21b673e6b1d8d1d2aadbcd2e07297db3cf4737d81a3df54ba625af6dce73e88e23d2bfedb92979398ba87709b3ea789fb5013d1b72abc5aa48b73d663ea7f0276c0b2902dbc8a180faeda767184e2f576df888a66844fbe12c71c4f25f4f856d1a8df5915aca7f3cfaad90bb20c6f3fe576e33e2298a9ff7536869d1c3c1d6a542c6f38e19cde65627375299e946a8e987260b41552719f71d543cbdc37843191d50d4497a4506a57739082ee29b38b63c9fa68174ded24da4850ec58c4ab58c97ace946f884ce13c3e231276d43d73d8d41766913dc7fec1ed79f3815fa0d745ae672a909e4d2725a852c7c8c7e87809628b8663909aea7b7fc89a2ebf2583d441a96b3a6970f22a31db46909218d8f8c06236747ee40efcd33644dccb233b7ad4066a75b316a310e6c6e9b1edc6581765dc9072d53731801cfda22655e28953eda969a83d413ba390e127ad9927e174a92b84e3c2750dc986ca57d3f8490da4eef4bf9dd33475ed16ab1c6a217decfb091c11f6af392eef30b1ec496ef6291d68897f48cceb98f9f49db047315e33c2dc1232335b2af1d497a61602e0e038bf5edb476db69b2bce30071d3ee5394e7930ef3da017a1ef3b49f32b156742dd7a3f5b51ca159377aca0e754739888b5a386de8cb6d84c0115f46d4c163a40d1e4e51626025f1d469fe4c2d0ebc485a42edcb13361eeef687cb9b50eaf4770f2bcccb896243e0f892b0f041157eb0aee8ea34364279556870e7585c5556159b74ed7da33609477b49c62265e51275cbbf11b42debb5cc89bcfa3b7c00c9dc3f5c2562a40ca7b85e5218a40c053cec3b1dd487d47273df1bbde02cda8ebe33c09fddce897a270e09fbb8559abca6bd48601186b75637c27efd7480c8703a8a95f2a2707f7a38e42d2e877a04d2af1f8f27a303941a905268f246dca009ac633d5f3756d40eebd743aa0ae0d189ae5d5571848e842ccbd75adf2eb7f2c11373c0af6598904ea480b70991455a63785a727545d7d7dea741509ae333d04909103dde213bebf28953eaf748a1d0ce180c8d94344992c7874fe8f1be2b09f076ff6167a3c2049d7b25946dc0c3ba43763d2d3bbb734d0e31163ead27cfb5dd60344d4685c38b2ed747793c53287fc9993d4318c663d6b70289239a11555a8bdf2fea16a5945d37c0883ee44216b7f88f515cc584ddc8dd165650164ea246f7f785197f387b4b8b097301cecb9495d3a03bb35ca60135c15877fdc73f1c93577eda64e5a0783e0287a1f37d59e32be75ca01c0c506b779cddac0c2eee61ac7a20c7b4cdf249ae27eeb41c91f0595779ac1a8a87f1efa500364cb3dc06b05e111e4f27a450c078515003263c39d08e94e8f233814136a80b42376fba14b019e152eafc590ddddc64ad50c0ffd4be38535efc4c6b9f445f21b538612461ba120ecc2b988371f8c07e2139fcdbf2200ef8540be6f476a79c16079a1948fcf38510c7a404c131608ffe677890f8bbad06ff65eb8e75a46e9ee8a39758c88327f9d36d965b817a38c40cb8e6e311e63e6406c43972d7d1b8ca6c26c7000a7f9301bc7f8e7d29810e401cbe1ef901069fc7c5b8a66e03b36ebdc4e071f3f91727e9fbe94bb0a0ca49374f18d3b1b3e994f1b5dd4a9986a9de53e3df115efdb8d5f3f5b38bfc317ef4782f552c0e24d2fa66d9566be59945d6bc11f70a61fccecad805bd7cba58467b69cc1e30386c21916d04ce56af393b1826a023def0aabd0250b92f7ef4d5f1c0b0d0ff6f55f7342992b8f0d2029f5ca1f87cc7064317dc84c7d4c69c4b73b273534af8f8d26c154333b05c21ad2d01f6258c557c092b93e4f1226c14bb4c8d16f64096bea3ba9e4756fd6b3a194aa9194f373fb803842c8be6100f93b9afb19051283c8e9e917a63e601effb2a9fdb1cf04b5ca1d8914ce02eeb0635a11699e6464581bb34d0de39e677e99cba389cce1c7122ecbc10d0cc6d27f9f5ece3d74e8d950c59be471186e173293c647704a10039c84c6dc3194410d0d5b7613f2af706247c1e05911460de73471041711f37c19e75a5325cd719f26e5e7fdb2e049151c594f8c93d8164ae884170c950598c4cc2440c077778c4f8ebef234c5fb1692abe42274c5a9dd8e9ad594b8b4541796d8e8d0b9e4458d093c380b59ff4d8fac9d730d3a84361240e63ff41143d6357838997acc4d91c635441ff73c60ded8a57858f7ba842fc1289da149f960c83251238780668b86aa838a9e867832728857dec8800b7e83254ef351c4bff58f400b20650adb3005b8c62b23d888eac989b9b2185498dcac15bd872f6ed3a17be360c5defab0431c4535aae2bfe6dfba92cbc73e9c3d567bdd7bbc303787b91426627312c6522317f0b6a5f1984bdeebfd8adb910ab5e54017d5ae51a488f32f7f5633ceb8c188534161d4df1c449d28f5f447fad6eb648ec9eefab04cc739e8cc256323788f1e0556b5097d3f211839990cb5595f5cff10c7a7ac63678b9e62e155cf9df9115052081dead29557cfa39b998b2ba8b20614ebfa9fa2f664ee5cb951cc0e192c0771e3939bbd0a9a96ab8dd2391c9c018f66a89781298aebd0116043a8b54802665455cdba959197597cd44061197ddfd9ce20d61398beaf6efc9210234f2db18846d0a39a5c157cfb1cc475bbaff2319c8538f4cced3daa590a2be17e0ad9e7511bfc27e4497b239c72ea476a30c835592792b50c5e845491704e853fc2bfd47f1f393f7bb66cd282d31a39e63cfcb069c95651d5a5a4414890ba0140a6af94cab342058512abb6f29294e3af4e8205cf6cf1a9e06eabc0cd6909bd0776c698f870559b6d9a0f1b05add1a57629be5d0036746ee79c448792624a9ca939203c8d9352d5b408d97a7d4ed3439d907d5322975ff0525cd7ad69c320b481e67fce8078b411e087a0a8443772d5ab1c9aad051dbbcc17b2ca9fa02e6f59f67add13791cb53755745d4fe6e6a30c27ca2a0dab44e3efa34e4e45eb7112ac2831d3622467d85c0f1ef1befdfea92f83318ab1e79a86b7e38f6e59533195fd0e367c40c363bb7d14c42a9d8931afa43a76c55d1613439ac92d43dbeccfc40ecfea9754bc04ab1c5392d6b6c719c82d4dbfcd3d58a56e2d9040766261c3df3b9ff1172db522908174ad2d8e0ad2496c1a943e8b41df71ca35f4e54c31d6f359c1a9fec52214a19b8ba0548a7a5f35d0fba4b31d13d6eb12cca521c9302c1045b83c7be274f0ed1a5f7fe722728fed252eb3ef057ca56901265991ccaafda40612565206a763f834cf6ea074d65eb768af57d2e35d4966aec22d4fd991115dd6f923abb9b35bd2c44956d4e2d9393b25b356d6dc2441c3629abc00fcb2c73c73a921dc7a60b461cdc239a61ee9860b9ed8d1e4da77106277ff0583df1bb74f763e9d5d9122cb2e2275ed2a0404e003ce1aab370ba76cfa3ca69faffaafea74585983782bb16ce1fd305ac59d58c00f25274dca7122dcdbbeb4114145b3592aeb7d7a7056842848098aa6bd727f26399beb9122b4b2ed175d6fb258879836b3c776f37c90a73d075514b01881bf1c1d5d898adf58edb4caadf90ff5e6fac9e47493bb78333d4d1667c93877a49d4a65f781b5ece5abca42c3bf03c130b32c912dccdd48bab9bfabef13d20f835f3ee15455945c2172980dd9a27a2e6ddedf1bbfde76f0cb54b2e5d449d248548763b7d3ffb880acf027caba618edd674423d6e45ed39264707717786a73377e4a860bda032675fe11c0a4b3299ae60fe10a3b8c84589f64522b2243ff9faec8178d8dfa92d94a62afde9845d53f8dcb337339fa48f7bfb1285ca34fb104ee96e152f69c228490246f945b844c7ea0b00e6b6d3856fbafefd9fa39eadda6d03f435c89ad1d072c58f10be02c98f8ff10a3142348d167d2e6176d6a2b21994fe1b948daee3d3b5093a3ead8d083578b0450832aed4821de9b5c98d11d3fd0c5bd00c2f7323361f8d1d9ab7ba7a83f9bd8677c8504e899e2a2073c4bb770ed92cb02fc99acc20a6989992b8ae0e4f91f415a5297a2fd53597e361334987af705a8cc14b01763929303a240c5b1796b9b788097a86f107b9af59ddd41293a49b150f7324905984ed90e09da783dd1fc40e17bee8c1d30562c1c620af47422c90fbd6e9872ebe4573bfcaeb9dae5704e7940d97464861e3e92fdbe81a3e19ca92167046f98ed501fd4e4f2ebbf3e0bb200a15e1ec69fbefefff1d9d1621ebdf29d8937190945093bd527003b7238f06086ebf792d2c74a7a994f231f2d5519c3fd03f1a6e23df40973795211aa11cbd194fecb2da03471b66702ff84e7082a49f4e4c560a9523a139301773857862f811578172aae74ada4b77cfa22b4054d65b11afea11771960b4e94901f99bb69c9752a01b6c3109f3e9a10c7a0819e90fc7bde5e77b0212ddcab463200c12da76fdd0072b18844d2dcc6d051b8a78eeaf00f38c2e68e2a24fc6046bfdfa0012dfb79647d895f15e2e10893cdb5c98c10e180a01f5c42e1b2", 0x1000}, {&(0x7f0000001040)="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", 0x1000}, {&(0x7f0000002040)="be76a4ef72b05d181f6e4b118dd411f0997d36fbce65a6c0ffc57fef7d66ea2f57050368db78fe3ac6ce92c829c10c7b5ffcd23c49e8539ebe34bb37fa47853521c90f01cbc188138a06bb49674b700508c686d118d65b07af84dd1d3841245aea7bd9ee2c88a9322a19cd4e9b718bbd52222462ac35a4f8d303fc42449dad85fc3620f8c1af3e9bb6b2dceac43d394b5e6a6f28ce6eb7cdbcb6acc263a8bc9af5d9b04bce7231f249a5d285b8b3d27925da82744101b6", 0xb7}, {&(0x7f0000002100)="80221edff7d18bc3dcd4437bab9001024ca9a3abab085c29de1b62c0e8a7d519a66dd87b79f3a62bc4b13693a652a4fd54fdee0da0dd9a9dab5f52849ef87de3413cc1587ddf3455adb52257764b2a252ffb5a5f0b536258eeefc56ecfa6bc6bd386022cbcf1fcb258bf0019091aee45461dff63ea375ba60882612ee790a790f342a6d2e7af9b5947fd0a40c20eaedca6edddc2e4584b027ca03cdd9ecfad31e13b19501853eb30a8e02188438000f440e1ab413aa25014727f39475c3b8f9fdb544486b2e43440956dd630b354069de522bec689a8b149b4e4d93ca032", 0xde}], 0x4) 17:52:09 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x300}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:52:09 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0}}], 0x2, 0x4) 17:52:09 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000062000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:52:09 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x300}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:52:09 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0}}], 0x2, 0x5) 17:52:10 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x300}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:52:10 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0}}], 0x2, 0x6) 17:52:10 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000063000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:52:10 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0x0, 0x600}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:52:10 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x300}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:52:10 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000064000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:52:10 executing program 4: rt_sigaction(0x2d, &(0x7f0000000240)={&(0x7f00000001c0)="c481c954c9c42241dec840f1c481895c2766420fed7f00660f3801662d65660f71d6000f38044100c4437d09b3000810ff7d36d9f7", 0x80000002, &(0x7f0000000200)="66fbc4a19d72d70041df35c423000047ff30c4027959c12646ddecc44188140b2e3e65fd660f3a0e02aac421b55c54874e", {[0x101]}}, &(0x7f0000000480)={&(0x7f00000003c0)="8f2a2012c4be7813a1c4c11659770d440f0f8b00e0ffff9466410f1b690045ac3ef241ab2626660f3830c4c4a129d9b5f39900002666450f612500008020c4a198c2905b0000000e", 0x0, &(0x7f0000000440)="c42255adc0321bc4e3f9dfbe00000021740f12aa58000000c402f91c4d3267440fa0c401791700410f830b000000640f72d659c4e17951e7"}, 0x8, &(0x7f00000005c0)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000280)={'sit0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'veth1_to_bridge\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r1, 0x89f7, &(0x7f0000000140)={'sit0\x00', &(0x7f00000000c0)={'syztnl2\x00', r4, 0x16, 0xbc, 0x80, 0x6, 0x8, @dev={0xfe, 0x80, '\x00', 0x38}, @empty, 0x20, 0x20, 0x9, 0x4}}) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000040)={@mcast1, @local, @private2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa2420200, r3}) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000002c0)={{{@in=@empty, @in6=@mcast1, 0x4e21, 0xfffe, 0x4e21, 0x6, 0xa, 0x80, 0x20, 0x88, 0x0, 0xffffffffffffffff}, {0xffffffffffffffff, 0x7ff, 0x5, 0x3, 0x0, 0x9, 0x4, 0x7}, {0x7, 0x1cfe, 0x6, 0x48bdbe3a}, 0xf6, 0x6e6bb6, 0x3, 0x0, 0x3, 0x1}, {{@in6=@empty, 0x4d5, 0xff}, 0xa, @in=@broadcast, 0x0, 0x4, 0x3, 0x2, 0x8aae, 0x6, 0x20000002}}, 0xe8) sendto$inet6(r0, 0x0, 0x0, 0x42, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @rand_addr=' \x01\x00', 0x4}, 0x1c) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000040)={@mcast1, @local, @private2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa2420200}) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(0xffffffffffffffff, 0x89fb, &(0x7f0000000140)={'sit0\x00', &(0x7f0000000080)={'ip6tnl0\x00', 0x0, 0x0, 0x7f, 0xad, 0x3, 0x70, @private0, @dev={0xfe, 0x80, '\x00', 0x29}, 0x7800, 0x7800, 0x80000001, 0x6}}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000680)={'syztnl2\x00', &(0x7f0000000600)={'syztnl0\x00', 0x0, 0x1, 0x7, 0x8000, 0x4bc2, {{0x14, 0x4, 0x1, 0x3e, 0x50, 0x67, 0x0, 0x59, 0x4, 0x0, @rand_addr=0x64010102, @initdev={0xac, 0x1e, 0x1, 0x0}, {[@ra={0x94, 0x4, 0x1}, @ra={0x94, 0x4, 0x1}, @ra={0x94, 0x4, 0x1}, @timestamp_prespec={0x44, 0xc, 0xda, 0x3, 0x6, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0xfff}]}, @lsrr={0x83, 0x13, 0xe9, [@broadcast, @local, @dev={0xac, 0x14, 0x14, 0x1e}, @broadcast]}, @ssrr={0x89, 0x7, 0xd5, [@local]}, @timestamp={0x44, 0x8, 0xc4, 0x0, 0x8, [0x3d8]}]}}}}}) r5 = socket$inet6_udp(0xa, 0x2, 0x0) r6 = socket$inet6(0xa, 0x80803, 0x5) setsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@multicast1, @in6=@private2, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in=@local, 0x0, 0x2b}, 0x0, @in6=@private1}}, 0xe8) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_IPV6_IPSEC_POLICY(r6, 0x29, 0x22, &(0x7f00000000c0)={{{@in6=@loopback, @in=@dev}}, {{@in6=@mcast2}, 0x0, @in=@loopback}}, &(0x7f0000000040)=0xe8) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000280)={'sit0\x00'}) setsockopt$inet6_udp_encap(r5, 0x11, 0x64, &(0x7f0000000000)=0x2, 0x4) 17:52:10 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0}}], 0x2, 0x7) 17:52:10 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x27, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x300}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:52:10 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000065000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:52:10 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0x0, 0x700}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:52:10 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x300}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:52:10 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'veth1_to_bridge\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r0, 0x89f7, &(0x7f0000000140)={'sit0\x00', &(0x7f00000000c0)={'syztnl2\x00', r1, 0x16, 0xbc, 0x80, 0x6, 0x8, @dev={0xfe, 0x80, '\x00', 0x38}, @empty, 0x20, 0x20, 0x9, 0x4}}) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0xc4000, 0x0) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000180)={0x14, r3, 0x1, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) getpeername$packet(r2, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r2, &(0x7f0000000380)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)={0x64, r3, 0x200, 0x70bd25, 0x25dfdbff, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x50, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_NAME={0x0, 0x2, 'ip6gre0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}]}, 0x64}, 0x1, 0x0, 0x0, 0x4}, 0x250c8e04860779a5) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r2, 0xc080661a, &(0x7f0000000000)={@id={0x2, 0x0, @c}}) r5 = socket$inet6_udp(0xa, 0x2, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x4}, 0x1c) 17:52:10 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000068000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:52:10 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x300}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:52:10 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0}}], 0x2, 0x8) 17:52:10 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0}}], 0x2, 0xf) 17:52:10 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f00000000006c000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:52:10 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x300}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:52:11 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0}}], 0x2, 0x10) 17:52:11 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000074000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:52:11 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x300}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:52:11 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0x0, 0x900}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:52:11 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x4}, 0x1c) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x2b, &(0x7f0000000180)=0x101, 0x4) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'sit0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'veth1_to_bridge\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r1, 0x89f7, &(0x7f0000000140)={'sit0\x00', &(0x7f00000000c0)={'syztnl2\x00', r3, 0x16, 0xbc, 0x80, 0x6, 0x8, @dev={0xfe, 0x80, '\x00', 0x38}, @empty, 0x20, 0x20, 0x9, 0x4}}) recvfrom$inet6(r0, &(0x7f00000002c0)=""/197, 0xc5, 0x40, &(0x7f00000001c0)={0xa, 0x4e23, 0x1, @private1, 0x9}, 0x1c) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000040)={@mcast1, @local, @private2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa2420200, r2}) recvfrom$inet6(r1, &(0x7f0000000000)=""/29, 0x1d, 0x40, &(0x7f0000000040)={0xa, 0x4e20, 0x7f, @private0, 0x3}, 0x1c) 17:52:11 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f00000000007a000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:52:11 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x74, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x300}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:52:11 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0}}], 0x2, 0x28) 17:52:11 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f00000000007e000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:52:11 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x300}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:52:11 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x4004014, &(0x7f0000000080)={0xa, 0x4e23, 0x1f, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x4}, 0x1c) r1 = socket$inet6(0xa, 0x80803, 0x5) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@multicast1, @in6=@private2, 0x0, 0x0, 0x4, 0x1ff, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local, 0x0, 0x2b}, 0x0, @in6=@private1}}, 0xe8) connect$inet6(r1, &(0x7f00000000c0), 0x1c) r2 = socket$inet6_udp(0xa, 0x2, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000280)={'sit0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'veth1_to_bridge\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r2, 0x89f7, &(0x7f0000000140)={'sit0\x00', &(0x7f00000000c0)={'syztnl2\x00', r5, 0x16, 0xbc, 0x80, 0x6, 0x8, @dev={0xfe, 0x80, '\x00', 0x38}, @empty, 0x20, 0x20, 0x9, 0x4}}) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f0000000040)={@mcast1, @local, @private2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa2420200, r4}) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r1, 0x89fb, &(0x7f0000000140)={'sit0\x00', &(0x7f0000000080)={'ip6tnl0\x00', r4, 0x0, 0x7f, 0xad, 0x3, 0x70, @private0, @dev={0xfe, 0x80, '\x00', 0x29}, 0x7800, 0x7800, 0x80000001, 0x6}}) sendto$inet6(r1, &(0x7f00000000c0)="8df2bfabac940d2d0791871458cca4c44797c3296ed21db9669e2ff576de97320ac55d4136f3ea82cb57082dc99c4aff8830e42ed1f11e4794d3fda466f232129fe869b9b0ae70bdd762d1aa7aaeadac23c96b535161c7975c89188c77dfdc02acf4e93dd5603ad4ad1270868c6fadb65b078917adf8259244170667cb21bfbf289ab91159acc300fd3d8cbeb59e8fad8dc3d886241b9a0cc1f5ad1698ff2ab8645c52f55cd7d9668d0d09060a78a37d641757eb22450bcb5198c2f732", 0xbd, 0x4, 0x0, 0x0) 17:52:11 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x12f, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x300}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:52:11 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0}}], 0x2, 0x29) 17:52:11 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f00000000009c000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:52:11 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0}}], 0x2, 0x60) 17:52:11 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0x0, 0xa00}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:52:11 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f0000000000b8000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:52:11 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x29e, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x300}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:52:11 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0}}], 0x2, 0xfc) 17:52:11 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) r0 = syz_open_dev$vcsu(&(0x7f0000000000), 0x694f, 0x200400) sendto$inet6(r0, 0x0, 0x0, 0x4891, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @local, 0x7}, 0x1c) 17:52:11 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x300}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:52:11 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0}}], 0x2, 0x300) 17:52:11 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f0000000000b9000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:52:11 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.log\x00', 0x200, 0x101) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r1, 0x89f3, &(0x7f0000000040)={'ip6tnl0\x00', &(0x7f00000000c0)={'syztnl2\x00', 0x0, 0x2f, 0x81, 0x9, 0x3dff, 0x4a, @ipv4={'\x00', '\xff\xff', @local}, @loopback, 0x7, 0x8, 0x4c6, 0x7ffffffe}}) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x4}, 0x1c) 17:52:11 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x300}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:52:11 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0}}], 0x2, 0x500) 17:52:11 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f0000000000bc000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:52:11 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0x0, 0xb00}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:52:11 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffff801, 0x0, @perf_bp={&(0x7f0000000000), 0xdc09}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = fork() perf_event_open(&(0x7f0000000200)={0x0, 0x80, 0x20, 0x5, 0x8, 0x0, 0x0, 0xffff, 0x1010, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1ff, 0x2, @perf_bp={&(0x7f0000000080), 0x1}, 0x401a8, 0x3, 0x9, 0x8, 0x7fffffff, 0x2, 0x2, 0x0, 0x7, 0x0, 0x3}, r1, 0x10, 0xffffffffffffffff, 0x1) r2 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r2, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r3 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r3, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) ioctl$EVIOCGSW(r3, 0x8040451b, &(0x7f0000001540)) r4 = syz_open_dev$tty20(0xc, 0x4, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) ppoll(&(0x7f0000001480)=[{r4, 0x200}, {0xffffffffffffffff, 0xc255}, {r5, 0x208}, {0xffffffffffffffff, 0xa280, 0x483}, {r2, 0x20}, {0xffffffffffffffff, 0x142}, {r0, 0x40}], 0x7, &(0x7f00000014c0)={0x0, 0x3938700}, &(0x7f0000001500)={[0x583]}, 0x8) 17:52:11 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x300}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:52:11 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0}}], 0x2, 0x5a0) 17:52:11 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f0000000000fe000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:52:11 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x300}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:52:11 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0}}], 0x2, 0x5c8) 17:52:11 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000084010001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:52:11 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x900, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x300}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:52:11 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0}}], 0x2, 0x600) 17:52:11 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000086010001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:52:11 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa00, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x300}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:52:11 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0x0, 0xc00}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:52:12 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffff801, 0x0, @perf_bp={&(0x7f0000000000), 0xdc09}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = fork() perf_event_open(&(0x7f0000000200)={0x0, 0x80, 0x20, 0x5, 0x8, 0x0, 0x0, 0xffff, 0x1010, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1ff, 0x2, @perf_bp={&(0x7f0000000080), 0x1}, 0x401a8, 0x3, 0x9, 0x8, 0x7fffffff, 0x2, 0x2, 0x0, 0x7, 0x0, 0x3}, r1, 0x10, 0xffffffffffffffff, 0x1) r2 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r2, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r3 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r3, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) ioctl$EVIOCGSW(r3, 0x8040451b, &(0x7f0000001540)) r4 = syz_open_dev$tty20(0xc, 0x4, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) ppoll(&(0x7f0000001480)=[{r4, 0x200}, {0xffffffffffffffff, 0xc255, 0x8304}, {r5, 0x208}, {0xffffffffffffffff, 0xa280}, {r2, 0x20}, {0xffffffffffffffff, 0x142}, {r0, 0x40}], 0x7, &(0x7f00000014c0)={0x0, 0x3938700}, &(0x7f0000001500)={[0x583]}, 0x8) 17:52:12 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0}}], 0x2, 0x700) 17:52:12 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000089010001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:52:12 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb00, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x300}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:52:12 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0}}], 0x2, 0x810) 17:52:12 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f00000000008a010001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:52:12 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc00, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x300}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:52:12 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0}}], 0x2, 0xf00) 17:52:12 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000004020001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:52:12 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd00, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x300}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:52:12 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0x0, 0xd00}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:52:12 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0}}], 0x2, 0x1008) 17:52:12 executing program 4 (fault-call:1 fault-nth:0): openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x300}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:52:12 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe00, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x300}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:52:12 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000068020001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:52:12 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0}}], 0x2, 0x2800) 17:52:12 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0x0, 0xe00}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:52:12 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f0000000000bc020001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 2671.097527][ T3465] FAULT_INJECTION: forcing a failure. [ 2671.097527][ T3465] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2671.110677][ T3465] CPU: 0 PID: 3465 Comm: syz-executor.4 Tainted: G W 5.14.0-rc5-syzkaller #0 [ 2671.120745][ T3465] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2671.130803][ T3465] Call Trace: [ 2671.134082][ T3465] dump_stack_lvl+0xb7/0x103 [ 2671.138746][ T3465] dump_stack+0x11/0x1a [ 2671.142902][ T3465] should_fail+0x23c/0x250 [ 2671.147321][ T3465] should_fail_usercopy+0x16/0x20 [ 2671.152417][ T3465] _copy_from_user+0x1c/0xd0 [ 2671.157010][ T3465] perf_copy_attr+0x156/0x650 [ 2671.161700][ T3465] __se_sys_perf_event_open+0xb6/0x27f0 [ 2671.167251][ T3465] ? vfs_write+0x50c/0x770 [ 2671.171670][ T3465] __x64_sys_perf_event_open+0x63/0x70 [ 2671.177312][ T3465] do_syscall_64+0x3d/0x90 [ 2671.181739][ T3465] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2671.187639][ T3465] RIP: 0033:0x4665e9 [ 2671.191527][ T3465] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2671.211223][ T3465] RSP: 002b:00007f94d1277188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2671.219716][ T3465] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665e9 [ 2671.227790][ T3465] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000180 [ 2671.235769][ T3465] RBP: 00007f94d12771d0 R08: 0000000000000000 R09: 0000000000000000 17:52:12 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0}}], 0x2, 0x2900) 17:52:12 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f0000000000f0020001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:52:12 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1100, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x300}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2671.243738][ T3465] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 2671.251744][ T3465] R13: 00007ffd30f9a9ef R14: 00007f94d1277300 R15: 0000000000022000 17:52:12 executing program 4 (fault-call:1 fault-nth:1): openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x300}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:52:13 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0}}], 0x2, 0x3f00) 17:52:13 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1200, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x300}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:52:13 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f0000000000fe020001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 2671.383206][ T3486] FAULT_INJECTION: forcing a failure. [ 2671.383206][ T3486] name failslab, interval 1, probability 0, space 0, times 0 [ 2671.395928][ T3486] CPU: 0 PID: 3486 Comm: syz-executor.4 Tainted: G W 5.14.0-rc5-syzkaller #0 [ 2671.405998][ T3486] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2671.416118][ T3486] Call Trace: [ 2671.419392][ T3486] dump_stack_lvl+0xb7/0x103 [ 2671.424040][ T3486] dump_stack+0x11/0x1a [ 2671.428317][ T3486] should_fail+0x23c/0x250 17:52:13 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0}}], 0x2, 0x4000) [ 2671.432732][ T3486] __should_failslab+0x81/0x90 [ 2671.437579][ T3486] should_failslab+0x5/0x20 [ 2671.442087][ T3486] kmem_cache_alloc_node+0x58/0x2b0 [ 2671.447290][ T3486] ? cred_has_capability+0x1af/0x210 [ 2671.452578][ T3486] ? perf_event_alloc+0x160/0x1790 [ 2671.457684][ T3486] perf_event_alloc+0x160/0x1790 [ 2671.462707][ T3486] __se_sys_perf_event_open+0x5c7/0x27f0 [ 2671.468340][ T3486] ? vfs_write+0x50c/0x770 [ 2671.472755][ T3486] __x64_sys_perf_event_open+0x63/0x70 [ 2671.478253][ T3486] do_syscall_64+0x3d/0x90 [ 2671.482693][ T3486] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2671.488589][ T3486] RIP: 0033:0x4665e9 [ 2671.492477][ T3486] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2671.512106][ T3486] RSP: 002b:00007f94d1277188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2671.520512][ T3486] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665e9 17:52:13 executing program 4 (fault-call:1 fault-nth:2): openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x300}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:52:13 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0}}], 0x2, 0x6000) [ 2671.528478][ T3486] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000180 [ 2671.536470][ T3486] RBP: 00007f94d12771d0 R08: 0000000000000000 R09: 0000000000000000 [ 2671.544440][ T3486] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 2671.552502][ T3486] R13: 00007ffd30f9a9ef R14: 00007f94d1277300 R15: 0000000000022000 [ 2671.630247][ T3501] FAULT_INJECTION: forcing a failure. [ 2671.630247][ T3501] name failslab, interval 1, probability 0, space 0, times 0 [ 2671.642993][ T3501] CPU: 0 PID: 3501 Comm: syz-executor.4 Tainted: G W 5.14.0-rc5-syzkaller #0 [ 2671.653089][ T3501] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2671.663137][ T3501] Call Trace: [ 2671.666406][ T3501] dump_stack_lvl+0xb7/0x103 [ 2671.671031][ T3501] dump_stack+0x11/0x1a [ 2671.675176][ T3501] should_fail+0x23c/0x250 [ 2671.679617][ T3501] ? perf_uprobe_init+0x45/0x140 [ 2671.684579][ T3501] __should_failslab+0x81/0x90 [ 2671.689337][ T3501] should_failslab+0x5/0x20 [ 2671.693923][ T3501] __kmalloc_track_caller+0x64/0x340 [ 2671.699271][ T3501] ? strnlen_user+0x137/0x1c0 [ 2671.703971][ T3501] strndup_user+0x73/0x120 [ 2671.708403][ T3501] perf_uprobe_init+0x45/0x140 [ 2671.713170][ T3501] perf_uprobe_event_init+0xde/0x140 [ 2671.718577][ T3501] perf_try_init_event+0x21a/0x400 [ 2671.723691][ T3501] perf_event_alloc+0xa60/0x1790 [ 2671.728633][ T3501] __se_sys_perf_event_open+0x5c7/0x27f0 [ 2671.734264][ T3501] ? vfs_write+0x50c/0x770 [ 2671.738684][ T3501] __x64_sys_perf_event_open+0x63/0x70 [ 2671.744185][ T3501] do_syscall_64+0x3d/0x90 [ 2671.748730][ T3501] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2671.754632][ T3501] RIP: 0033:0x4665e9 [ 2671.758520][ T3501] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 17:52:13 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0x0, 0x1100}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:52:13 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f0000000000ff020001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:52:13 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x300}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:52:13 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0}}], 0x2, 0x80fe) 17:52:13 executing program 4 (fault-call:1 fault-nth:3): openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x300}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2671.778126][ T3501] RSP: 002b:00007f94d1277188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2671.786539][ T3501] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665e9 [ 2671.794511][ T3501] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000180 [ 2671.802479][ T3501] RBP: 00007f94d12771d0 R08: 0000000000000000 R09: 0000000000000000 [ 2671.810523][ T3501] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 2671.818494][ T3501] R13: 00007ffd30f9a9ef R14: 00007f94d1277300 R15: 0000000000022000 [ 2671.884179][ T3514] FAULT_INJECTION: forcing a failure. [ 2671.884179][ T3514] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2671.897321][ T3514] CPU: 0 PID: 3514 Comm: syz-executor.4 Tainted: G W 5.14.0-rc5-syzkaller #0 [ 2671.907398][ T3514] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2671.917450][ T3514] Call Trace: [ 2671.920723][ T3514] dump_stack_lvl+0xb7/0x103 [ 2671.925322][ T3514] dump_stack+0x11/0x1a [ 2671.929479][ T3514] should_fail+0x23c/0x250 [ 2671.933905][ T3514] should_fail_usercopy+0x16/0x20 [ 2671.938932][ T3514] _copy_from_user+0x1c/0xd0 [ 2671.943519][ T3514] strndup_user+0xb0/0x120 [ 2671.947933][ T3514] perf_uprobe_init+0x45/0x140 [ 2671.952703][ T3514] perf_uprobe_event_init+0xde/0x140 [ 2671.958067][ T3514] perf_try_init_event+0x21a/0x400 [ 2671.963259][ T3514] perf_event_alloc+0xa60/0x1790 [ 2671.968200][ T3514] __se_sys_perf_event_open+0x5c7/0x27f0 [ 2671.973881][ T3514] ? vfs_write+0x50c/0x770 [ 2671.978302][ T3514] __x64_sys_perf_event_open+0x63/0x70 [ 2671.983773][ T3514] do_syscall_64+0x3d/0x90 [ 2671.988195][ T3514] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2671.994090][ T3514] RIP: 0033:0x4665e9 [ 2671.997978][ T3514] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2672.017581][ T3514] RSP: 002b:00007f94d1277188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2672.025989][ T3514] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665e9 17:52:13 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000030001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:52:13 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0}}], 0x2, 0xa005) 17:52:13 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2700, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x300}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2672.033964][ T3514] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000180 [ 2672.041931][ T3514] RBP: 00007f94d12771d0 R08: 0000000000000000 R09: 0000000000000000 [ 2672.049905][ T3514] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 2672.057991][ T3514] R13: 00007ffd30f9a9ef R14: 00007f94d1277300 R15: 0000000000022000 17:52:13 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0}}], 0x2, 0xc805) 17:52:13 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f01, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x300}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:52:13 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000012030001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:52:13 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0}}], 0x2, 0xfc00) 17:52:13 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0x0, 0x1200}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:52:13 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0}}], 0x2, 0xfe80) 17:52:13 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f00000000001a030001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:52:13 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x300}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:52:14 executing program 4 (fault-call:1 fault-nth:4): openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x300}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:52:14 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0}}], 0x2, 0xff00) 17:52:14 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4800, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x300}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:52:14 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000026030001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:52:14 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:52:14 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c00, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x300}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2672.514679][ T3552] FAULT_INJECTION: forcing a failure. [ 2672.514679][ T3552] name failslab, interval 1, probability 0, space 0, times 0 [ 2672.527368][ T3552] CPU: 0 PID: 3552 Comm: syz-executor.4 Tainted: G W 5.14.0-rc5-syzkaller #0 [ 2672.537432][ T3552] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2672.547492][ T3552] Call Trace: [ 2672.550773][ T3552] dump_stack_lvl+0xb7/0x103 [ 2672.555437][ T3552] dump_stack+0x11/0x1a [ 2672.559590][ T3552] should_fail+0x23c/0x250 [ 2672.564016][ T3552] ? getname_kernel+0x37/0x1d0 [ 2672.568779][ T3552] __should_failslab+0x81/0x90 [ 2672.573538][ T3552] should_failslab+0x5/0x20 [ 2672.578036][ T3552] kmem_cache_alloc+0x46/0x2e0 [ 2672.582811][ T3552] ? should_fail+0xd6/0x250 [ 2672.587341][ T3552] getname_kernel+0x37/0x1d0 [ 2672.591984][ T3552] kern_path+0x19/0x40 [ 2672.596054][ T3552] create_local_trace_uprobe+0x3f/0x3c0 [ 2672.601635][ T3552] perf_uprobe_init+0xbe/0x140 [ 2672.606443][ T3552] perf_uprobe_event_init+0xde/0x140 17:52:14 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x300}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2672.611737][ T3552] perf_try_init_event+0x21a/0x400 [ 2672.616909][ T3552] perf_event_alloc+0xa60/0x1790 [ 2672.621849][ T3552] __se_sys_perf_event_open+0x5c7/0x27f0 [ 2672.627564][ T3552] ? vfs_write+0x50c/0x770 [ 2672.631976][ T3552] __x64_sys_perf_event_open+0x63/0x70 [ 2672.637437][ T3552] do_syscall_64+0x3d/0x90 [ 2672.641888][ T3552] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2672.647784][ T3552] RIP: 0033:0x4665e9 17:52:14 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0}}], 0x2, 0x40000) 17:52:14 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000046030001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 2672.651786][ T3552] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2672.671530][ T3552] RSP: 002b:00007f94d1277188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2672.680063][ T3552] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665e9 [ 2672.688065][ T3552] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000180 [ 2672.696063][ T3552] RBP: 00007f94d12771d0 R08: 0000000000000000 R09: 0000000000000000 [ 2672.704028][ T3552] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 17:52:14 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c00, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x300}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:52:14 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0}}], 0x2, 0x100000) [ 2672.712125][ T3552] R13: 00007ffd30f9a9ef R14: 00007f94d1277300 R15: 0000000000022000 17:52:14 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000047030001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:52:14 executing program 4 (fault-call:1 fault-nth:5): openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x300}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:52:14 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0}}], 0x2, 0x1000000) [ 2672.815545][ T3577] FAULT_INJECTION: forcing a failure. [ 2672.815545][ T3577] name failslab, interval 1, probability 0, space 0, times 0 [ 2672.828249][ T3577] CPU: 0 PID: 3577 Comm: syz-executor.4 Tainted: G W 5.14.0-rc5-syzkaller #0 [ 2672.838346][ T3577] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2672.848399][ T3577] Call Trace: [ 2672.851753][ T3577] dump_stack_lvl+0xb7/0x103 [ 2672.856347][ T3577] dump_stack+0x11/0x1a [ 2672.860496][ T3577] should_fail+0x23c/0x250 17:52:14 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7400, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x300}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:52:14 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f0000000000ae030001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 2672.864926][ T3577] __should_failslab+0x81/0x90 [ 2672.869690][ T3577] ? proc_self_get_link+0x90/0x100 [ 2672.874874][ T3577] should_failslab+0x5/0x20 [ 2672.879372][ T3577] kmem_cache_alloc_trace+0x49/0x310 [ 2672.884794][ T3577] proc_self_get_link+0x90/0x100 [ 2672.889737][ T3577] ? proc_setup_self+0x1d0/0x1d0 [ 2672.894694][ T3577] step_into+0x9d7/0xee0 [ 2672.898967][ T3577] walk_component+0x190/0x350 [ 2672.903645][ T3577] link_path_walk+0x4ae/0x770 [ 2672.908328][ T3577] path_lookupat+0x8b/0x3d0 [ 2672.912869][ T3577] filename_lookup+0x118/0x3b0 [ 2672.917642][ T3577] ? kmem_cache_alloc+0x1fb/0x2e0 [ 2672.922679][ T3577] ? getname_kernel+0x37/0x1d0 [ 2672.927512][ T3577] kern_path+0x2e/0x40 [ 2672.931579][ T3577] create_local_trace_uprobe+0x3f/0x3c0 [ 2672.937183][ T3577] perf_uprobe_init+0xbe/0x140 [ 2672.941961][ T3577] perf_uprobe_event_init+0xde/0x140 [ 2672.947287][ T3577] perf_try_init_event+0x21a/0x400 [ 2672.952397][ T3577] perf_event_alloc+0xa60/0x1790 [ 2672.957341][ T3577] __se_sys_perf_event_open+0x5c7/0x27f0 [ 2672.962995][ T3577] ? vfs_write+0x50c/0x770 [ 2672.967410][ T3577] __x64_sys_perf_event_open+0x63/0x70 [ 2672.972915][ T3577] do_syscall_64+0x3d/0x90 [ 2672.977333][ T3577] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2672.983264][ T3577] RIP: 0033:0x4665e9 [ 2672.987153][ T3577] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2673.006762][ T3577] RSP: 002b:00007f94d1277188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a 17:52:14 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0x0, 0x2700}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:52:14 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7a00, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x300}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:52:14 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0}}], 0x2, 0x2000000) [ 2673.015255][ T3577] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665e9 [ 2673.023229][ T3577] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000180 [ 2673.031200][ T3577] RBP: 00007f94d12771d0 R08: 0000000000000000 R09: 0000000000000000 [ 2673.039166][ T3577] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 2673.047135][ T3577] R13: 00007ffd30f9a9ef R14: 00007f94d1277300 R15: 0000000000022000 17:52:14 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f0000000000af030001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:52:14 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9e02, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x300}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:52:14 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0}}], 0x2, 0x3000000) 17:52:14 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f0000000000b0030001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:52:14 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff07, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x300}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:52:14 executing program 4 (fault-call:1 fault-nth:6): openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x300}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:52:14 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0}}], 0x2, 0x4000000) 17:52:14 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f0000000000b1030001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:52:14 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x300}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2673.263863][ T3614] FAULT_INJECTION: forcing a failure. [ 2673.263863][ T3614] name failslab, interval 1, probability 0, space 0, times 0 [ 2673.276531][ T3614] CPU: 0 PID: 3614 Comm: syz-executor.4 Tainted: G W 5.14.0-rc5-syzkaller #0 [ 2673.286599][ T3614] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2673.296658][ T3614] Call Trace: [ 2673.299940][ T3614] dump_stack_lvl+0xb7/0x103 [ 2673.304533][ T3614] dump_stack+0x11/0x1a [ 2673.308694][ T3614] should_fail+0x23c/0x250 [ 2673.313117][ T3614] __should_failslab+0x81/0x90 [ 2673.317891][ T3614] ? create_local_trace_uprobe+0xa9/0x3c0 [ 2673.323652][ T3614] should_failslab+0x5/0x20 [ 2673.328167][ T3614] kmem_cache_alloc_trace+0x49/0x310 [ 2673.333467][ T3614] create_local_trace_uprobe+0xa9/0x3c0 [ 2673.339072][ T3614] perf_uprobe_init+0xbe/0x140 [ 2673.343848][ T3614] perf_uprobe_event_init+0xde/0x140 [ 2673.349222][ T3614] perf_try_init_event+0x21a/0x400 [ 2673.354336][ T3614] perf_event_alloc+0xa60/0x1790 [ 2673.359279][ T3614] __se_sys_perf_event_open+0x5c7/0x27f0 [ 2673.364976][ T3614] ? vfs_write+0x50c/0x770 [ 2673.369458][ T3614] __x64_sys_perf_event_open+0x63/0x70 [ 2673.374922][ T3614] do_syscall_64+0x3d/0x90 [ 2673.379424][ T3614] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2673.385332][ T3614] RIP: 0033:0x4665e9 [ 2673.389223][ T3614] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2673.408830][ T3614] RSP: 002b:00007f94d1277188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2673.417296][ T3614] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665e9 [ 2673.425264][ T3614] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000180 [ 2673.433234][ T3614] RBP: 00007f94d12771d0 R08: 0000000000000000 R09: 0000000000000000 [ 2673.441212][ T3614] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 2673.449193][ T3614] R13: 00007ffd30f9a9ef R14: 00007f94d1277300 R15: 0000000000022000 [ 2673.457232][ T3614] trace_uprobe: Failed to allocate trace_uprobe.(-12) 17:52:15 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0x0, 0x2f01}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:52:15 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0}}], 0x2, 0x5000000) 17:52:15 executing program 4 (fault-call:1 fault-nth:7): openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x300}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:52:15 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f0000000000c1030001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:52:15 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x300}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2673.617224][ T3629] FAULT_INJECTION: forcing a failure. [ 2673.617224][ T3629] name failslab, interval 1, probability 0, space 0, times 0 [ 2673.629855][ T3629] CPU: 1 PID: 3629 Comm: syz-executor.4 Tainted: G W 5.14.0-rc5-syzkaller #0 [ 2673.640025][ T3629] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2673.650075][ T3629] Call Trace: [ 2673.653353][ T3629] dump_stack_lvl+0xb7/0x103 [ 2673.658022][ T3629] dump_stack+0x11/0x1a [ 2673.662182][ T3629] should_fail+0x23c/0x250 [ 2673.666600][ T3629] ? kzalloc+0x16/0x20 [ 2673.670823][ T3629] __should_failslab+0x81/0x90 [ 2673.675592][ T3629] should_failslab+0x5/0x20 [ 2673.680096][ T3629] __kmalloc+0x66/0x340 [ 2673.684250][ T3629] ? should_fail+0xd6/0x250 [ 2673.688825][ T3629] kzalloc+0x16/0x20 [ 2673.692722][ T3629] trace_probe_init+0x41/0x250 [ 2673.697549][ T3629] create_local_trace_uprobe+0xd1/0x3c0 [ 2673.703100][ T3629] perf_uprobe_init+0xbe/0x140 [ 2673.708015][ T3629] perf_uprobe_event_init+0xde/0x140 17:52:15 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x300}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:52:15 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0}}], 0x2, 0x6000000) [ 2673.713302][ T3629] perf_try_init_event+0x21a/0x400 [ 2673.718416][ T3629] perf_event_alloc+0xa60/0x1790 [ 2673.723347][ T3629] __se_sys_perf_event_open+0x5c7/0x27f0 [ 2673.729088][ T3629] ? vfs_write+0x50c/0x770 [ 2673.733502][ T3629] __x64_sys_perf_event_open+0x63/0x70 [ 2673.738960][ T3629] do_syscall_64+0x3d/0x90 [ 2673.743379][ T3629] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2673.749280][ T3629] RIP: 0033:0x4665e9 [ 2673.753166][ T3629] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2673.772993][ T3629] RSP: 002b:00007f94d1277188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2673.781402][ T3629] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665e9 [ 2673.789376][ T3629] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000180 [ 2673.797347][ T3629] RBP: 00007f94d12771d0 R08: 0000000000000000 R09: 0000000000000000 [ 2673.805316][ T3629] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 17:52:15 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400001, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x300}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:52:15 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f0000000000d6030001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:52:15 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0x0, 0x3f00}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2673.813283][ T3629] R13: 00007ffd30f9a9ef R14: 00007f94d1277300 R15: 0000000000022000 [ 2673.821315][ T3629] trace_uprobe: Failed to allocate trace_uprobe.(-12) 17:52:15 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0}}], 0x2, 0x7000000) 17:52:15 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x300}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:52:15 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f0000000000fa030001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:52:15 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0}}], 0x2, 0x8000000) 17:52:15 executing program 4 (fault-call:1 fault-nth:8): openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x300}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:52:15 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1004000, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x300}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:52:15 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0}}], 0x2, 0xf000000) 17:52:15 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f0000000000fe030001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 2674.135042][ T3668] FAULT_INJECTION: forcing a failure. [ 2674.135042][ T3668] name failslab, interval 1, probability 0, space 0, times 0 [ 2674.147769][ T3668] CPU: 1 PID: 3668 Comm: syz-executor.4 Tainted: G W 5.14.0-rc5-syzkaller #0 [ 2674.157831][ T3668] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2674.167887][ T3668] Call Trace: [ 2674.171227][ T3668] dump_stack_lvl+0xb7/0x103 [ 2674.175833][ T3668] dump_stack+0x11/0x1a [ 2674.179990][ T3668] should_fail+0x23c/0x250 17:52:15 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x300}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:52:15 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0}}], 0x2, 0x10000000) 17:52:15 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000002040001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 2674.184418][ T3668] ? trace_probe_init+0x1bd/0x250 [ 2674.189453][ T3668] __should_failslab+0x81/0x90 [ 2674.194218][ T3668] should_failslab+0x5/0x20 [ 2674.198722][ T3668] __kmalloc_track_caller+0x64/0x340 [ 2674.204061][ T3668] ? __kmalloc+0x237/0x340 [ 2674.208649][ T3668] ? kzalloc+0x16/0x20 [ 2674.212758][ T3668] kstrdup+0x31/0x70 [ 2674.216652][ T3668] trace_probe_init+0x1bd/0x250 [ 2674.221507][ T3668] create_local_trace_uprobe+0xd1/0x3c0 [ 2674.227057][ T3668] perf_uprobe_init+0xbe/0x140 17:52:15 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0x0, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2674.231831][ T3668] perf_uprobe_event_init+0xde/0x140 [ 2674.237201][ T3668] perf_try_init_event+0x21a/0x400 [ 2674.242310][ T3668] perf_event_alloc+0xa60/0x1790 [ 2674.247291][ T3668] __se_sys_perf_event_open+0x5c7/0x27f0 [ 2674.252928][ T3668] ? vfs_write+0x50c/0x770 [ 2674.257347][ T3668] __x64_sys_perf_event_open+0x63/0x70 [ 2674.262860][ T3668] do_syscall_64+0x3d/0x90 [ 2674.267280][ T3668] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2674.273186][ T3668] RIP: 0033:0x4665e9 17:52:15 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0}}], 0x2, 0x10000120) [ 2674.277132][ T3668] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2674.296760][ T3668] RSP: 002b:00007f94d1277188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2674.305176][ T3668] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665e9 [ 2674.313247][ T3668] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000180 [ 2674.321209][ T3668] RBP: 00007f94d12771d0 R08: 0000000000000000 R09: 0000000000000000 17:52:15 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0}}], 0x2, 0x10080000) 17:52:15 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2020000, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x300}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:52:15 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000006040001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 2674.329176][ T3668] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 2674.337142][ T3668] R13: 00007ffd30f9a9ef R14: 00007f94d1277300 R15: 0000000000022000 [ 2674.345149][ T3668] trace_uprobe: Failed to allocate trace_uprobe.(-12) 17:52:15 executing program 4 (fault-call:1 fault-nth:9): openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x300}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:52:15 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0}}], 0x2, 0x20010010) 17:52:15 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3000000, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x300}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:52:16 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000050001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:52:16 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0}}], 0x2, 0x28000000) [ 2674.495574][ T3698] FAULT_INJECTION: forcing a failure. [ 2674.495574][ T3698] name failslab, interval 1, probability 0, space 0, times 0 [ 2674.508279][ T3698] CPU: 0 PID: 3698 Comm: syz-executor.4 Tainted: G W 5.14.0-rc5-syzkaller #0 [ 2674.518422][ T3698] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2674.528571][ T3698] Call Trace: [ 2674.531846][ T3698] dump_stack_lvl+0xb7/0x103 [ 2674.536489][ T3698] dump_stack+0x11/0x1a [ 2674.540642][ T3698] should_fail+0x23c/0x250 [ 2674.545061][ T3698] ? trace_probe_init+0x1e1/0x250 [ 2674.550101][ T3698] __should_failslab+0x81/0x90 [ 2674.554867][ T3698] should_failslab+0x5/0x20 [ 2674.559376][ T3698] __kmalloc_track_caller+0x64/0x340 [ 2674.564737][ T3698] ? trace_probe_init+0x1bd/0x250 [ 2674.569810][ T3698] kstrdup+0x31/0x70 [ 2674.573705][ T3698] trace_probe_init+0x1e1/0x250 [ 2674.578564][ T3698] create_local_trace_uprobe+0xd1/0x3c0 [ 2674.584120][ T3698] perf_uprobe_init+0xbe/0x140 [ 2674.589172][ T3698] perf_uprobe_event_init+0xde/0x140 [ 2674.594462][ T3698] perf_try_init_event+0x21a/0x400 [ 2674.599668][ T3698] perf_event_alloc+0xa60/0x1790 [ 2674.604608][ T3698] __se_sys_perf_event_open+0x5c7/0x27f0 [ 2674.610245][ T3698] ? vfs_write+0x50c/0x770 [ 2674.614661][ T3698] __x64_sys_perf_event_open+0x63/0x70 [ 2674.620127][ T3698] do_syscall_64+0x3d/0x90 [ 2674.624547][ T3698] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2674.630482][ T3698] RIP: 0033:0x4665e9 [ 2674.634372][ T3698] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2674.653989][ T3698] RSP: 002b:00007f94d1277188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2674.662414][ T3698] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665e9 [ 2674.670416][ T3698] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000180 [ 2674.678396][ T3698] RBP: 00007f94d12771d0 R08: 0000000000000000 R09: 0000000000000000 [ 2674.686368][ T3698] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 17:52:16 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3010000, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x300}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:52:16 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000060001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 2674.694343][ T3698] R13: 00007ffd30f9a9ef R14: 00007f94d1277300 R15: 0000000000022000 [ 2674.702388][ T3698] trace_uprobe: Failed to allocate trace_uprobe.(-12) 17:52:16 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0x0, 0x4800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:52:16 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0}}], 0x2, 0x29000000) 17:52:16 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000004060001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:52:16 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3070000, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x300}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:52:16 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ffffff, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x300}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:52:16 executing program 4 (fault-call:1 fault-nth:10): openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x300}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:52:16 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0}}], 0x2, 0x3f000000) 17:52:16 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000070001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:52:16 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x300}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:52:16 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0x0, 0x4c00}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2675.115271][ T3733] FAULT_INJECTION: forcing a failure. [ 2675.115271][ T3733] name failslab, interval 1, probability 0, space 0, times 0 [ 2675.127929][ T3733] CPU: 0 PID: 3733 Comm: syz-executor.4 Tainted: G W 5.14.0-rc5-syzkaller #0 [ 2675.138036][ T3733] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2675.148088][ T3733] Call Trace: [ 2675.151365][ T3733] dump_stack_lvl+0xb7/0x103 [ 2675.155966][ T3733] dump_stack+0x11/0x1a [ 2675.160187][ T3733] should_fail+0x23c/0x250 [ 2675.164672][ T3733] ? create_local_trace_uprobe+0x235/0x3c0 [ 2675.170591][ T3733] __should_failslab+0x81/0x90 [ 2675.175444][ T3733] should_failslab+0x5/0x20 [ 2675.179956][ T3733] __kmalloc_track_caller+0x64/0x340 [ 2675.185304][ T3733] ? kstrdup+0x4c/0x70 [ 2675.189403][ T3733] kstrdup+0x31/0x70 [ 2675.193301][ T3733] create_local_trace_uprobe+0x235/0x3c0 [ 2675.198984][ T3733] perf_uprobe_init+0xbe/0x140 [ 2675.203752][ T3733] perf_uprobe_event_init+0xde/0x140 [ 2675.209062][ T3733] perf_try_init_event+0x21a/0x400 [ 2675.214179][ T3733] perf_event_alloc+0xa60/0x1790 [ 2675.219124][ T3733] __se_sys_perf_event_open+0x5c7/0x27f0 [ 2675.224763][ T3733] ? vfs_write+0x50c/0x770 [ 2675.229183][ T3733] __x64_sys_perf_event_open+0x63/0x70 [ 2675.234730][ T3733] do_syscall_64+0x3d/0x90 [ 2675.239173][ T3733] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2675.245068][ T3733] RIP: 0033:0x4665e9 [ 2675.248957][ T3733] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2675.268562][ T3733] RSP: 002b:00007f94d1277188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2675.277077][ T3733] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665e9 [ 2675.285045][ T3733] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000180 [ 2675.293008][ T3733] RBP: 00007f94d12771d0 R08: 0000000000000000 R09: 0000000000000000 [ 2675.300972][ T3733] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 17:52:16 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000090001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:52:16 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0}}], 0x2, 0x40000000) 17:52:16 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0}}], 0x2, 0x60000000) 17:52:16 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f0000000000000a0001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 2675.308959][ T3733] R13: 00007ffd30f9a9ef R14: 00007f94d1277300 R15: 0000000000022000 17:52:16 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0x0, 0x6800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:52:16 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0}}], 0x2, 0xa0050000) 17:52:16 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f0000000000000b0001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:52:17 executing program 4 (fault-call:1 fault-nth:11): openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x300}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:52:17 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0}}], 0x2, 0xc8050000) 17:52:17 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f0000000000000c0001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:52:17 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={&(0x7f0000000000), 0x300}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2675.616193][ T3765] FAULT_INJECTION: forcing a failure. [ 2675.616193][ T3765] name failslab, interval 1, probability 0, space 0, times 0 [ 2675.628893][ T3765] CPU: 0 PID: 3765 Comm: syz-executor.4 Tainted: G W 5.14.0-rc5-syzkaller #0 [ 2675.638956][ T3765] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2675.649012][ T3765] Call Trace: [ 2675.652350][ T3765] dump_stack_lvl+0xb7/0x103 [ 2675.656941][ T3765] dump_stack+0x11/0x1a [ 2675.661126][ T3765] should_fail+0x23c/0x250 [ 2675.665555][ T3765] ? traceprobe_set_print_fmt+0x45/0xa0 [ 2675.671111][ T3765] __should_failslab+0x81/0x90 [ 2675.675875][ T3765] should_failslab+0x5/0x20 [ 2675.680376][ T3765] __kmalloc+0x66/0x340 [ 2675.684541][ T3765] ? __kmalloc_track_caller+0x235/0x340 [ 2675.690096][ T3765] traceprobe_set_print_fmt+0x45/0xa0 [ 2675.695476][ T3765] create_local_trace_uprobe+0x2eb/0x3c0 [ 2675.701117][ T3765] perf_uprobe_init+0xbe/0x140 [ 2675.705906][ T3765] perf_uprobe_event_init+0xde/0x140 [ 2675.711240][ T3765] perf_try_init_event+0x21a/0x400 [ 2675.716359][ T3765] perf_event_alloc+0xa60/0x1790 [ 2675.721301][ T3765] __se_sys_perf_event_open+0x5c7/0x27f0 [ 2675.727020][ T3765] ? vfs_write+0x50c/0x770 [ 2675.731440][ T3765] __x64_sys_perf_event_open+0x63/0x70 [ 2675.736907][ T3765] do_syscall_64+0x3d/0x90 [ 2675.741327][ T3765] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2675.747297][ T3765] RIP: 0033:0x4665e9 [ 2675.751218][ T3765] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2675.770997][ T3765] RSP: 002b:00007f94d1277188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2675.779491][ T3765] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665e9 [ 2675.787521][ T3765] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000180 [ 2675.795495][ T3765] RBP: 00007f94d12771d0 R08: 0000000000000000 R09: 0000000000000000 [ 2675.803470][ T3765] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 17:52:17 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f0000000000000d0001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:52:17 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0x0, 0x6c00}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:52:17 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0}}], 0x2, 0xe0ffffff) 17:52:17 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={&(0x7f0000000000), 0x300}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2675.811443][ T3765] R13: 00007ffd30f9a9ef R14: 00007f94d1277300 R15: 0000000000022000 17:52:17 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f0000000000000e0001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:52:17 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0}}], 0x2, 0xeffdffff) 17:52:17 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f0000000000000f0001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:52:17 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0}}], 0x2, 0xf5ffffff) 17:52:17 executing program 4 (fault-call:1 fault-nth:12): openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x300}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:52:17 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={&(0x7f0000000000), 0x300}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:52:17 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0x0, 0x7400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:52:17 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f0000000000f80f0001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:52:17 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0}}], 0x2, 0xfc000000) 17:52:17 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000020100001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 2676.098444][ T3797] FAULT_INJECTION: forcing a failure. [ 2676.098444][ T3797] name failslab, interval 1, probability 0, space 0, times 0 [ 2676.111155][ T3797] CPU: 0 PID: 3797 Comm: syz-executor.4 Tainted: G W 5.14.0-rc5-syzkaller #0 [ 2676.121219][ T3797] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2676.131388][ T3797] Call Trace: [ 2676.134672][ T3797] dump_stack_lvl+0xb7/0x103 [ 2676.139338][ T3797] dump_stack+0x11/0x1a [ 2676.143497][ T3797] should_fail+0x23c/0x250 17:52:17 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000110001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 2676.147919][ T3797] __should_failslab+0x81/0x90 [ 2676.152684][ T3797] ? __uprobe_register+0xf8/0x8a0 [ 2676.157707][ T3797] should_failslab+0x5/0x20 [ 2676.162245][ T3797] kmem_cache_alloc_trace+0x49/0x310 [ 2676.167567][ T3797] __uprobe_register+0xf8/0x8a0 [ 2676.172415][ T3797] ? _find_next_bit+0x188/0x190 [ 2676.177285][ T3797] uprobe_register_refctr+0x29/0x40 [ 2676.182487][ T3797] probe_event_enable+0x2be/0x7d0 [ 2676.187519][ T3797] ? __uprobe_trace_func+0x430/0x430 [ 2676.192812][ T3797] trace_uprobe_register+0x88/0x410 17:52:17 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000120001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 2676.198084][ T3797] perf_trace_event_init+0x34e/0x790 [ 2676.203428][ T3797] perf_uprobe_init+0xf5/0x140 [ 2676.208199][ T3797] perf_uprobe_event_init+0xde/0x140 [ 2676.213506][ T3797] perf_try_init_event+0x21a/0x400 [ 2676.218646][ T3797] perf_event_alloc+0xa60/0x1790 [ 2676.223582][ T3797] __se_sys_perf_event_open+0x5c7/0x27f0 [ 2676.229219][ T3797] ? vfs_write+0x50c/0x770 [ 2676.233632][ T3797] __x64_sys_perf_event_open+0x63/0x70 [ 2676.239133][ T3797] do_syscall_64+0x3d/0x90 [ 2676.243589][ T3797] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2676.249483][ T3797] RIP: 0033:0x4665e9 [ 2676.253375][ T3797] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2676.272988][ T3797] RSP: 002b:00007f94d1277188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2676.281404][ T3797] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665e9 [ 2676.289382][ T3797] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000180 17:52:17 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000003120001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 2676.297357][ T3797] RBP: 00007f94d12771d0 R08: 0000000000000000 R09: 0000000000000000 [ 2676.305334][ T3797] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2676.313313][ T3797] R13: 00007ffd30f9a9ef R14: 00007f94d1277300 R15: 0000000000022000 17:52:17 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0}}], 0x2, 0xfe800000) 17:52:17 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f0000000000031a0001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:52:17 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0}}], 0x2, 0xfe80ffff) 17:52:18 executing program 4 (fault-call:1 fault-nth:13): openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x300}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2676.587266][ T3826] FAULT_INJECTION: forcing a failure. [ 2676.587266][ T3826] name failslab, interval 1, probability 0, space 0, times 0 [ 2676.599911][ T3826] CPU: 1 PID: 3826 Comm: syz-executor.4 Tainted: G W 5.14.0-rc5-syzkaller #0 [ 2676.609979][ T3826] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2676.620033][ T3826] Call Trace: [ 2676.623313][ T3826] dump_stack_lvl+0xb7/0x103 [ 2676.627944][ T3826] dump_stack+0x11/0x1a [ 2676.632104][ T3826] should_fail+0x23c/0x250 [ 2676.636589][ T3826] __should_failslab+0x81/0x90 [ 2676.641409][ T3826] ? register_for_each_vma+0x372/0x890 [ 2676.646874][ T3826] should_failslab+0x5/0x20 [ 2676.651381][ T3826] kmem_cache_alloc_trace+0x49/0x310 [ 2676.656722][ T3826] register_for_each_vma+0x372/0x890 [ 2676.662009][ T3826] __uprobe_register+0x3f4/0x8a0 [ 2676.666947][ T3826] uprobe_register_refctr+0x29/0x40 [ 2676.672212][ T3826] probe_event_enable+0x2be/0x7d0 [ 2676.677263][ T3826] ? __uprobe_trace_func+0x430/0x430 [ 2676.682551][ T3826] trace_uprobe_register+0x88/0x410 [ 2676.687755][ T3826] perf_trace_event_init+0x34e/0x790 [ 2676.693048][ T3826] perf_uprobe_init+0xf5/0x140 [ 2676.697817][ T3826] perf_uprobe_event_init+0xde/0x140 [ 2676.703130][ T3826] perf_try_init_event+0x21a/0x400 [ 2676.708343][ T3826] perf_event_alloc+0xa60/0x1790 [ 2676.713290][ T3826] __se_sys_perf_event_open+0x5c7/0x27f0 [ 2676.718930][ T3826] ? vfs_write+0x50c/0x770 [ 2676.723349][ T3826] __x64_sys_perf_event_open+0x63/0x70 [ 2676.728874][ T3826] do_syscall_64+0x3d/0x90 [ 2676.733298][ T3826] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2676.739273][ T3826] RIP: 0033:0x4665e9 [ 2676.743198][ T3826] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2676.762844][ T3826] RSP: 002b:00007f94d1277188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2676.771265][ T3826] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665e9 [ 2676.779240][ T3826] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000180 [ 2676.787208][ T3826] RBP: 00007f94d12771d0 R08: 0000000000000000 R09: 0000000000000000 [ 2676.795272][ T3826] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2676.803244][ T3826] R13: 00007ffd30f9a9ef R14: 00007f94d1277300 R15: 0000000000022000 17:52:18 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={&(0x7f0000000000), 0x300}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:52:18 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f0000000000001f0001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:52:18 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0}}], 0x2, 0xfec0ffff) 17:52:18 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0x0, 0x7a00}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:52:18 executing program 4 (fault-call:1 fault-nth:14): openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x300}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2676.918902][ T3833] FAULT_INJECTION: forcing a failure. [ 2676.918902][ T3833] name failslab, interval 1, probability 0, space 0, times 0 [ 2676.931557][ T3833] CPU: 0 PID: 3833 Comm: syz-executor.4 Tainted: G W 5.14.0-rc5-syzkaller #0 [ 2676.941774][ T3833] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2676.951855][ T3833] Call Trace: [ 2676.955197][ T3833] dump_stack_lvl+0xb7/0x103 [ 2676.959798][ T3833] dump_stack+0x11/0x1a [ 2676.963961][ T3833] should_fail+0x23c/0x250 [ 2676.968390][ T3833] __should_failslab+0x81/0x90 [ 2676.973250][ T3833] ? register_for_each_vma+0x372/0x890 [ 2676.978719][ T3833] should_failslab+0x5/0x20 [ 2676.983232][ T3833] kmem_cache_alloc_trace+0x49/0x310 [ 2676.988864][ T3833] ? register_for_each_vma+0x372/0x890 [ 2676.994322][ T3833] ? vma_interval_tree_iter_next+0x24c/0x280 [ 2677.000313][ T3833] register_for_each_vma+0x372/0x890 [ 2677.005596][ T3833] __uprobe_register+0x3f4/0x8a0 [ 2677.010626][ T3833] uprobe_register_refctr+0x29/0x40 [ 2677.015893][ T3833] probe_event_enable+0x2be/0x7d0 [ 2677.020966][ T3833] ? __uprobe_trace_func+0x430/0x430 [ 2677.026438][ T3833] trace_uprobe_register+0x88/0x410 [ 2677.031644][ T3833] perf_trace_event_init+0x34e/0x790 [ 2677.036933][ T3833] perf_uprobe_init+0xf5/0x140 [ 2677.041699][ T3833] perf_uprobe_event_init+0xde/0x140 [ 2677.047031][ T3833] perf_try_init_event+0x21a/0x400 [ 2677.052270][ T3833] perf_event_alloc+0xa60/0x1790 [ 2677.057209][ T3833] __se_sys_perf_event_open+0x5c7/0x27f0 [ 2677.062917][ T3833] ? vfs_write+0x50c/0x770 [ 2677.067383][ T3833] __x64_sys_perf_event_open+0x63/0x70 [ 2677.072880][ T3833] do_syscall_64+0x3d/0x90 [ 2677.077304][ T3833] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2677.083256][ T3833] RIP: 0033:0x4665e9 [ 2677.087145][ T3833] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2677.106832][ T3833] RSP: 002b:00007f94d1277188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2677.115241][ T3833] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665e9 [ 2677.123212][ T3833] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000180 [ 2677.131212][ T3833] RBP: 00007f94d12771d0 R08: 0000000000000000 R09: 0000000000000000 [ 2677.139182][ T3833] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2677.147153][ T3833] R13: 00007ffd30f9a9ef R14: 00007f94d1277300 R15: 0000000000022000 17:52:18 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000200001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:52:18 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0}}], 0x2, 0xff000000) 17:52:18 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0}}], 0x2, 0xffff0000) 17:52:18 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000010200001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:52:18 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0}}], 0x2, 0xffff80fe) 17:52:18 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0}}], 0x2, 0xffffc0fe) 17:52:18 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000220001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:52:19 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000000), 0x300}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:52:19 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0}}], 0x2, 0xfffffdef) 17:52:19 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000250001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:52:19 executing program 4 (fault-call:1 fault-nth:15): openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x300}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:52:19 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0x0, 0xa600}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:52:19 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0}}], 0x2, 0xffffff7f) 17:52:19 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000003260001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 2677.699117][ T3869] FAULT_INJECTION: forcing a failure. [ 2677.699117][ T3869] name failslab, interval 1, probability 0, space 0, times 0 [ 2677.711760][ T3869] CPU: 0 PID: 3869 Comm: syz-executor.4 Tainted: G W 5.14.0-rc5-syzkaller #0 [ 2677.721908][ T3869] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2677.731965][ T3869] Call Trace: [ 2677.735245][ T3869] dump_stack_lvl+0xb7/0x103 [ 2677.739838][ T3869] dump_stack+0x11/0x1a [ 2677.743993][ T3869] should_fail+0x23c/0x250 [ 2677.748417][ T3869] __should_failslab+0x81/0x90 [ 2677.753253][ T3869] ? register_for_each_vma+0x372/0x890 [ 2677.758742][ T3869] should_failslab+0x5/0x20 [ 2677.763246][ T3869] kmem_cache_alloc_trace+0x49/0x310 [ 2677.768623][ T3869] ? register_for_each_vma+0x372/0x890 [ 2677.774081][ T3869] ? vma_interval_tree_iter_next+0x263/0x280 [ 2677.780084][ T3869] register_for_each_vma+0x372/0x890 [ 2677.785378][ T3869] __uprobe_register+0x3f4/0x8a0 [ 2677.790429][ T3869] uprobe_register_refctr+0x29/0x40 [ 2677.795634][ T3869] probe_event_enable+0x2be/0x7d0 [ 2677.800667][ T3869] ? __uprobe_trace_func+0x430/0x430 [ 2677.805967][ T3869] trace_uprobe_register+0x88/0x410 [ 2677.811176][ T3869] perf_trace_event_init+0x34e/0x790 [ 2677.816524][ T3869] perf_uprobe_init+0xf5/0x140 [ 2677.821331][ T3869] perf_uprobe_event_init+0xde/0x140 [ 2677.826651][ T3869] perf_try_init_event+0x21a/0x400 [ 2677.831768][ T3869] perf_event_alloc+0xa60/0x1790 [ 2677.836766][ T3869] __se_sys_perf_event_open+0x5c7/0x27f0 [ 2677.842405][ T3869] ? vfs_write+0x50c/0x770 [ 2677.846826][ T3869] __x64_sys_perf_event_open+0x63/0x70 [ 2677.852287][ T3869] do_syscall_64+0x3d/0x90 [ 2677.856711][ T3869] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2677.862607][ T3869] RIP: 0033:0x4665e9 [ 2677.866562][ T3869] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2677.886174][ T3869] RSP: 002b:00007f94d1277188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a 17:52:19 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f0000000000002e0001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:52:19 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0}}], 0x2, 0xffffffe0) [ 2677.894592][ T3869] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665e9 [ 2677.902574][ T3869] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000180 [ 2677.910549][ T3869] RBP: 00007f94d12771d0 R08: 0000000000000000 R09: 0000000000000000 [ 2677.918586][ T3869] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2677.926562][ T3869] R13: 00007ffd30f9a9ef R14: 00007f94d1277300 R15: 0000000000022000 17:52:19 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0}}], 0x2, 0xfffffff5) 17:52:19 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000320001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:52:19 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0}}], 0x2, 0xffff00000000) 17:52:19 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000000), 0x300}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:52:19 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f0000000000003f0001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:52:19 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0}}], 0x2, 0x4000000000000) 17:52:19 executing program 4 (fault-call:1 fault-nth:16): openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x300}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2678.361812][ T3901] FAULT_INJECTION: forcing a failure. [ 2678.361812][ T3901] name failslab, interval 1, probability 0, space 0, times 0 [ 2678.374523][ T3901] CPU: 0 PID: 3901 Comm: syz-executor.4 Tainted: G W 5.14.0-rc5-syzkaller #0 [ 2678.384595][ T3901] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2678.394677][ T3901] Call Trace: [ 2678.398002][ T3901] dump_stack_lvl+0xb7/0x103 [ 2678.402597][ T3901] dump_stack+0x11/0x1a [ 2678.406826][ T3901] should_fail+0x23c/0x250 [ 2678.411306][ T3901] __should_failslab+0x81/0x90 [ 2678.416102][ T3901] ? register_for_each_vma+0x372/0x890 [ 2678.421570][ T3901] should_failslab+0x5/0x20 [ 2678.426094][ T3901] kmem_cache_alloc_trace+0x49/0x310 [ 2678.431380][ T3901] ? register_for_each_vma+0x372/0x890 [ 2678.436839][ T3901] ? vma_interval_tree_iter_next+0x263/0x280 [ 2678.442824][ T3901] register_for_each_vma+0x372/0x890 [ 2678.448106][ T3901] __uprobe_register+0x3f4/0x8a0 [ 2678.453043][ T3901] uprobe_register_refctr+0x29/0x40 [ 2678.458241][ T3901] probe_event_enable+0x2be/0x7d0 [ 2678.463308][ T3901] ? __uprobe_trace_func+0x430/0x430 [ 2678.468603][ T3901] trace_uprobe_register+0x88/0x410 [ 2678.473880][ T3901] perf_trace_event_init+0x34e/0x790 [ 2678.479171][ T3901] perf_uprobe_init+0xf5/0x140 [ 2678.483939][ T3901] perf_uprobe_event_init+0xde/0x140 [ 2678.489293][ T3901] perf_try_init_event+0x21a/0x400 [ 2678.494461][ T3901] perf_event_alloc+0xa60/0x1790 [ 2678.499396][ T3901] __se_sys_perf_event_open+0x5c7/0x27f0 [ 2678.505031][ T3901] ? vfs_write+0x50c/0x770 [ 2678.509448][ T3901] __x64_sys_perf_event_open+0x63/0x70 [ 2678.514907][ T3901] do_syscall_64+0x3d/0x90 [ 2678.519344][ T3901] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2678.525266][ T3901] RIP: 0033:0x4665e9 [ 2678.529153][ T3901] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2678.548757][ T3901] RSP: 002b:00007f94d1277188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a 17:52:20 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0x0, 0xdc03}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:52:20 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0}}], 0x2, 0x10000000000000) 17:52:20 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000400001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:52:20 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0}}], 0x2, 0x100000000000000) [ 2678.557212][ T3901] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665e9 [ 2678.565186][ T3901] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000180 [ 2678.573159][ T3901] RBP: 00007f94d12771d0 R08: 0000000000000000 R09: 0000000000000000 [ 2678.581131][ T3901] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2678.589115][ T3901] R13: 00007ffd30f9a9ef R14: 00007f94d1277300 R15: 0000000000022000 17:52:20 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000003460001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:52:20 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0}}], 0x2, 0x200000000000000) 17:52:20 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000003470001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:52:20 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0}}], 0x2, 0x300000000000000) 17:52:20 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000000), 0x300}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:52:20 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000480001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:52:20 executing program 4 (fault-call:1 fault-nth:17): openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x300}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:52:20 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0}}], 0x2, 0x400000000000000) 17:52:20 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0x0, 0xff07}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2678.896286][ T3931] FAULT_INJECTION: forcing a failure. [ 2678.896286][ T3931] name failslab, interval 1, probability 0, space 0, times 0 [ 2678.908939][ T3931] CPU: 1 PID: 3931 Comm: syz-executor.4 Tainted: G W 5.14.0-rc5-syzkaller #0 [ 2678.919001][ T3931] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2678.929402][ T3931] Call Trace: [ 2678.932683][ T3931] dump_stack_lvl+0xb7/0x103 [ 2678.937280][ T3931] dump_stack+0x11/0x1a [ 2678.941441][ T3931] should_fail+0x23c/0x250 [ 2678.945963][ T3931] __should_failslab+0x81/0x90 [ 2678.950729][ T3931] ? register_for_each_vma+0x372/0x890 [ 2678.956246][ T3931] should_failslab+0x5/0x20 [ 2678.960746][ T3931] kmem_cache_alloc_trace+0x49/0x310 [ 2678.966038][ T3931] ? register_for_each_vma+0x372/0x890 [ 2678.971576][ T3931] ? vma_interval_tree_iter_next+0x24c/0x280 [ 2678.977640][ T3931] register_for_each_vma+0x372/0x890 [ 2678.982937][ T3931] __uprobe_register+0x3f4/0x8a0 [ 2678.987878][ T3931] uprobe_register_refctr+0x29/0x40 [ 2678.993078][ T3931] probe_event_enable+0x2be/0x7d0 [ 2678.998195][ T3931] ? __uprobe_trace_func+0x430/0x430 [ 2679.003558][ T3931] trace_uprobe_register+0x88/0x410 [ 2679.008765][ T3931] perf_trace_event_init+0x34e/0x790 [ 2679.014055][ T3931] perf_uprobe_init+0xf5/0x140 [ 2679.018821][ T3931] perf_uprobe_event_init+0xde/0x140 [ 2679.024114][ T3931] perf_try_init_event+0x21a/0x400 [ 2679.029239][ T3931] perf_event_alloc+0xa60/0x1790 [ 2679.034258][ T3931] __se_sys_perf_event_open+0x5c7/0x27f0 [ 2679.039898][ T3931] ? vfs_write+0x50c/0x770 [ 2679.044311][ T3931] __x64_sys_perf_event_open+0x63/0x70 [ 2679.049928][ T3931] do_syscall_64+0x3d/0x90 [ 2679.054354][ T3931] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2679.060277][ T3931] RIP: 0033:0x4665e9 [ 2679.064169][ T3931] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2679.083950][ T3931] RSP: 002b:00007f94d1277188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a 17:52:20 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f0000000000004c0001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:52:20 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0}}], 0x2, 0x500000000000000) [ 2679.092364][ T3931] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665e9 [ 2679.100338][ T3931] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000180 [ 2679.108316][ T3931] RBP: 00007f94d12771d0 R08: 0000000000000000 R09: 0000000000000000 [ 2679.116312][ T3931] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2679.124290][ T3931] R13: 00007ffd30f9a9ef R14: 00007f94d1277300 R15: 0000000000022000 17:52:20 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0}}], 0x2, 0x600000000000000) 17:52:20 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f0000000000004e0001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:52:20 executing program 4 (fault-call:1 fault-nth:18): openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x300}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:52:20 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0}}], 0x2, 0x700000000000000) 17:52:20 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f0000000000004f0001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 2679.388492][ T3949] FAULT_INJECTION: forcing a failure. [ 2679.388492][ T3949] name failslab, interval 1, probability 0, space 0, times 0 [ 2679.401144][ T3949] CPU: 1 PID: 3949 Comm: syz-executor.4 Tainted: G W 5.14.0-rc5-syzkaller #0 [ 2679.411267][ T3949] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2679.421388][ T3949] Call Trace: [ 2679.424740][ T3949] dump_stack_lvl+0xb7/0x103 [ 2679.429335][ T3949] dump_stack+0x11/0x1a [ 2679.433522][ T3949] should_fail+0x23c/0x250 [ 2679.437941][ T3949] __should_failslab+0x81/0x90 [ 2679.442702][ T3949] ? register_for_each_vma+0x372/0x890 [ 2679.448218][ T3949] should_failslab+0x5/0x20 [ 2679.452721][ T3949] kmem_cache_alloc_trace+0x49/0x310 [ 2679.458034][ T3949] ? register_for_each_vma+0x372/0x890 [ 2679.463499][ T3949] ? vma_interval_tree_iter_next+0x24c/0x280 [ 2679.469502][ T3949] register_for_each_vma+0x372/0x890 [ 2679.474912][ T3949] __uprobe_register+0x3f4/0x8a0 [ 2679.479853][ T3949] uprobe_register_refctr+0x29/0x40 [ 2679.485062][ T3949] probe_event_enable+0x2be/0x7d0 [ 2679.490116][ T3949] ? __uprobe_trace_func+0x430/0x430 [ 2679.495480][ T3949] trace_uprobe_register+0x88/0x410 [ 2679.500750][ T3949] perf_trace_event_init+0x34e/0x790 [ 2679.506040][ T3949] perf_uprobe_init+0xf5/0x140 [ 2679.510861][ T3949] perf_uprobe_event_init+0xde/0x140 [ 2679.516147][ T3949] perf_try_init_event+0x21a/0x400 [ 2679.521265][ T3949] perf_event_alloc+0xa60/0x1790 [ 2679.526201][ T3949] __se_sys_perf_event_open+0x5c7/0x27f0 [ 2679.531881][ T3949] ? vfs_write+0x50c/0x770 [ 2679.536298][ T3949] __x64_sys_perf_event_open+0x63/0x70 [ 2679.541779][ T3949] do_syscall_64+0x3d/0x90 [ 2679.546198][ T3949] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2679.552105][ T3949] RIP: 0033:0x4665e9 [ 2679.556004][ T3949] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2679.575720][ T3949] RSP: 002b:00007f94d1277188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2679.584159][ T3949] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665e9 [ 2679.592131][ T3949] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000180 [ 2679.600108][ T3949] RBP: 00007f94d12771d0 R08: 0000000000000000 R09: 0000000000000000 [ 2679.608081][ T3949] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2679.616051][ T3949] R13: 00007ffd30f9a9ef R14: 00007f94d1277300 R15: 0000000000022000 17:52:21 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000000), 0x300}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:52:21 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:52:21 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0}}], 0x2, 0x800000000000000) 17:52:21 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000500001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:52:21 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0}}], 0x2, 0xf00000000000000) 17:52:21 executing program 4 (fault-call:1 fault-nth:19): openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x300}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:52:21 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000510001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:52:21 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0}}], 0x2, 0x1000000000000000) 17:52:21 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000580001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:52:21 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0}}], 0x2, 0x1008000000000000) 17:52:21 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000600001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:52:21 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0}}], 0x2, 0x2001001000000000) [ 2679.887356][ T3970] FAULT_INJECTION: forcing a failure. [ 2679.887356][ T3970] name failslab, interval 1, probability 0, space 0, times 0 [ 2679.900034][ T3970] CPU: 1 PID: 3970 Comm: syz-executor.4 Tainted: G W 5.14.0-rc5-syzkaller #0 [ 2679.910106][ T3970] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2679.920160][ T3970] Call Trace: [ 2679.923437][ T3970] dump_stack_lvl+0xb7/0x103 [ 2679.928033][ T3970] dump_stack+0x11/0x1a [ 2679.932217][ T3970] should_fail+0x23c/0x250 [ 2679.936639][ T3970] __should_failslab+0x81/0x90 [ 2679.941522][ T3970] ? register_for_each_vma+0x372/0x890 [ 2679.946979][ T3970] should_failslab+0x5/0x20 [ 2679.951485][ T3970] kmem_cache_alloc_trace+0x49/0x310 [ 2679.956775][ T3970] ? register_for_each_vma+0x372/0x890 [ 2679.962232][ T3970] ? vma_interval_tree_iter_next+0x263/0x280 [ 2679.968219][ T3970] register_for_each_vma+0x372/0x890 [ 2679.973508][ T3970] __uprobe_register+0x3f4/0x8a0 [ 2679.978447][ T3970] uprobe_register_refctr+0x29/0x40 [ 2679.983646][ T3970] probe_event_enable+0x2be/0x7d0 [ 2679.988678][ T3970] ? __uprobe_trace_func+0x430/0x430 [ 2679.993971][ T3970] trace_uprobe_register+0x88/0x410 [ 2679.999179][ T3970] perf_trace_event_init+0x34e/0x790 [ 2680.004522][ T3970] perf_uprobe_init+0xf5/0x140 [ 2680.009317][ T3970] perf_uprobe_event_init+0xde/0x140 [ 2680.014605][ T3970] perf_try_init_event+0x21a/0x400 [ 2680.019721][ T3970] perf_event_alloc+0xa60/0x1790 [ 2680.024713][ T3970] __se_sys_perf_event_open+0x5c7/0x27f0 [ 2680.030343][ T3970] ? vfs_write+0x50c/0x770 [ 2680.034758][ T3970] __x64_sys_perf_event_open+0x63/0x70 [ 2680.040225][ T3970] do_syscall_64+0x3d/0x90 [ 2680.044735][ T3970] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2680.050649][ T3970] RIP: 0033:0x4665e9 [ 2680.054575][ T3970] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2680.074181][ T3970] RSP: 002b:00007f94d1277188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2680.082597][ T3970] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665e9 [ 2680.090571][ T3970] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000180 [ 2680.098538][ T3970] RBP: 00007f94d12771d0 R08: 0000000000000000 R09: 0000000000000000 [ 2680.106506][ T3970] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2680.114474][ T3970] R13: 00007ffd30f9a9ef R14: 00007f94d1277300 R15: 0000000000022000 17:52:21 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, @perf_bp={&(0x7f0000000000), 0x300}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:52:21 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:52:21 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0}}], 0x2, 0x2800000000000000) 17:52:21 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000610001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:52:21 executing program 4 (fault-call:1 fault-nth:20): openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x300}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2680.265475][ T3994] FAULT_INJECTION: forcing a failure. [ 2680.265475][ T3994] name failslab, interval 1, probability 0, space 0, times 0 [ 2680.278101][ T3994] CPU: 1 PID: 3994 Comm: syz-executor.4 Tainted: G W 5.14.0-rc5-syzkaller #0 [ 2680.288188][ T3994] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2680.298260][ T3994] Call Trace: [ 2680.301537][ T3994] dump_stack_lvl+0xb7/0x103 [ 2680.306128][ T3994] dump_stack+0x11/0x1a [ 2680.310283][ T3994] should_fail+0x23c/0x250 [ 2680.314756][ T3994] __should_failslab+0x81/0x90 [ 2680.319610][ T3994] ? register_for_each_vma+0x372/0x890 [ 2680.325067][ T3994] should_failslab+0x5/0x20 [ 2680.329594][ T3994] kmem_cache_alloc_trace+0x49/0x310 [ 2680.334880][ T3994] ? register_for_each_vma+0x372/0x890 [ 2680.340338][ T3994] ? vma_interval_tree_iter_next+0x24c/0x280 [ 2680.346377][ T3994] register_for_each_vma+0x372/0x890 [ 2680.351661][ T3994] __uprobe_register+0x3f4/0x8a0 [ 2680.356642][ T3994] uprobe_register_refctr+0x29/0x40 [ 2680.361843][ T3994] probe_event_enable+0x2be/0x7d0 [ 2680.366868][ T3994] ? __uprobe_trace_func+0x430/0x430 [ 2680.372166][ T3994] trace_uprobe_register+0x88/0x410 [ 2680.377401][ T3994] perf_trace_event_init+0x34e/0x790 [ 2680.382687][ T3994] perf_uprobe_init+0xf5/0x140 [ 2680.387498][ T3994] perf_uprobe_event_init+0xde/0x140 [ 2680.392781][ T3994] perf_try_init_event+0x21a/0x400 [ 2680.397900][ T3994] perf_event_alloc+0xa60/0x1790 [ 2680.402830][ T3994] __se_sys_perf_event_open+0x5c7/0x27f0 [ 2680.408458][ T3994] ? vfs_write+0x50c/0x770 [ 2680.412953][ T3994] __x64_sys_perf_event_open+0x63/0x70 [ 2680.418413][ T3994] do_syscall_64+0x3d/0x90 [ 2680.422837][ T3994] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2680.428736][ T3994] RIP: 0033:0x4665e9 [ 2680.432620][ T3994] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2680.452294][ T3994] RSP: 002b:00007f94d1277188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a 17:52:21 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0}}], 0x2, 0x2900000000000000) 17:52:21 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000620001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 2680.460707][ T3994] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665e9 [ 2680.468687][ T3994] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000180 [ 2680.476652][ T3994] RBP: 00007f94d12771d0 R08: 0000000000000000 R09: 0000000000000000 [ 2680.484651][ T3994] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2680.492695][ T3994] R13: 00007ffd30f9a9ef R14: 00007f94d1277300 R15: 0000000000022000 17:52:21 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000630001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:52:21 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0}}], 0x2, 0x3f00000000000000) 17:52:22 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000640001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:52:22 executing program 4 (fault-call:1 fault-nth:21): openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x300}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:52:22 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0}}], 0x2, 0x4000000000000000) [ 2680.826158][ T4021] FAULT_INJECTION: forcing a failure. [ 2680.826158][ T4021] name failslab, interval 1, probability 0, space 0, times 0 [ 2680.838801][ T4021] CPU: 0 PID: 4021 Comm: syz-executor.4 Tainted: G W 5.14.0-rc5-syzkaller #0 [ 2680.848897][ T4021] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2680.859036][ T4021] Call Trace: [ 2680.862313][ T4021] dump_stack_lvl+0xb7/0x103 [ 2680.866963][ T4021] dump_stack+0x11/0x1a [ 2680.871190][ T4021] should_fail+0x23c/0x250 [ 2680.875785][ T4021] __should_failslab+0x81/0x90 [ 2680.880548][ T4021] ? register_for_each_vma+0x372/0x890 [ 2680.886012][ T4021] should_failslab+0x5/0x20 [ 2680.890512][ T4021] kmem_cache_alloc_trace+0x49/0x310 [ 2680.895811][ T4021] ? register_for_each_vma+0x372/0x890 [ 2680.901269][ T4021] ? vma_interval_tree_iter_next+0x24c/0x280 [ 2680.907257][ T4021] register_for_each_vma+0x372/0x890 [ 2680.912911][ T4021] __uprobe_register+0x3f4/0x8a0 [ 2680.917851][ T4021] uprobe_register_refctr+0x29/0x40 [ 2680.923047][ T4021] probe_event_enable+0x2be/0x7d0 [ 2680.928246][ T4021] ? __uprobe_trace_func+0x430/0x430 [ 2680.933539][ T4021] trace_uprobe_register+0x88/0x410 [ 2680.938741][ T4021] perf_trace_event_init+0x34e/0x790 [ 2680.944032][ T4021] perf_uprobe_init+0xf5/0x140 [ 2680.948806][ T4021] perf_uprobe_event_init+0xde/0x140 [ 2680.954178][ T4021] perf_try_init_event+0x21a/0x400 [ 2680.959296][ T4021] perf_event_alloc+0xa60/0x1790 [ 2680.964238][ T4021] __se_sys_perf_event_open+0x5c7/0x27f0 [ 2680.969873][ T4021] ? vfs_write+0x50c/0x770 [ 2680.974372][ T4021] __x64_sys_perf_event_open+0x63/0x70 [ 2680.979834][ T4021] do_syscall_64+0x3d/0x90 [ 2680.984256][ T4021] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2680.990154][ T4021] RIP: 0033:0x4665e9 [ 2680.994090][ T4021] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2681.013746][ T4021] RSP: 002b:00007f94d1277188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2681.022161][ T4021] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665e9 [ 2681.030132][ T4021] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000180 [ 2681.038106][ T4021] RBP: 00007f94d12771d0 R08: 0000000000000000 R09: 0000000000000000 [ 2681.046081][ T4021] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2681.054054][ T4021] R13: 00007ffd30f9a9ef R14: 00007f94d1277300 R15: 0000000000022000 17:52:22 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x0, @perf_bp={&(0x7f0000000000), 0x300}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:52:22 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:52:22 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0}}], 0x2, 0x6000000000000000) 17:52:22 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000650001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:52:22 executing program 4 (fault-call:1 fault-nth:22): openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x300}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:52:22 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0}}], 0x2, 0x8000000000000000) 17:52:22 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:52:22 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000680001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:52:22 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0}}], 0x2, 0xa005000000000000) 17:52:22 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000002680001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:52:22 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2681.370201][ T4036] FAULT_INJECTION: forcing a failure. [ 2681.370201][ T4036] name failslab, interval 1, probability 0, space 0, times 0 [ 2681.382847][ T4036] CPU: 1 PID: 4036 Comm: syz-executor.4 Tainted: G W 5.14.0-rc5-syzkaller #0 [ 2681.392974][ T4036] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2681.403023][ T4036] Call Trace: [ 2681.406307][ T4036] dump_stack_lvl+0xb7/0x103 [ 2681.410896][ T4036] dump_stack+0x11/0x1a [ 2681.415125][ T4036] should_fail+0x23c/0x250 [ 2681.419555][ T4036] __should_failslab+0x81/0x90 [ 2681.424321][ T4036] ? register_for_each_vma+0x372/0x890 [ 2681.429781][ T4036] should_failslab+0x5/0x20 [ 2681.434364][ T4036] kmem_cache_alloc_trace+0x49/0x310 [ 2681.439688][ T4036] ? register_for_each_vma+0x372/0x890 [ 2681.445144][ T4036] ? vma_interval_tree_iter_next+0x24c/0x280 [ 2681.451200][ T4036] register_for_each_vma+0x372/0x890 [ 2681.456501][ T4036] __uprobe_register+0x3f4/0x8a0 [ 2681.461975][ T4036] uprobe_register_refctr+0x29/0x40 17:52:22 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0}}], 0x2, 0xc805000000000000) [ 2681.467177][ T4036] probe_event_enable+0x2be/0x7d0 [ 2681.472273][ T4036] ? __uprobe_trace_func+0x430/0x430 [ 2681.477624][ T4036] trace_uprobe_register+0x88/0x410 [ 2681.482824][ T4036] perf_trace_event_init+0x34e/0x790 [ 2681.488141][ T4036] perf_uprobe_init+0xf5/0x140 [ 2681.492932][ T4036] perf_uprobe_event_init+0xde/0x140 [ 2681.498252][ T4036] perf_try_init_event+0x21a/0x400 [ 2681.503365][ T4036] perf_event_alloc+0xa60/0x1790 [ 2681.508382][ T4036] __se_sys_perf_event_open+0x5c7/0x27f0 [ 2681.514165][ T4036] ? vfs_write+0x50c/0x770 [ 2681.518582][ T4036] __x64_sys_perf_event_open+0x63/0x70 [ 2681.524043][ T4036] do_syscall_64+0x3d/0x90 [ 2681.528520][ T4036] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2681.534516][ T4036] RIP: 0033:0x4665e9 [ 2681.538431][ T4036] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2681.558096][ T4036] RSP: 002b:00007f94d1277188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a 17:52:22 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, @perf_bp={&(0x7f0000000000), 0x300}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:52:22 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f0000000000006c0001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:52:22 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2681.566507][ T4036] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665e9 [ 2681.574479][ T4036] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000180 [ 2681.582444][ T4036] RBP: 00007f94d12771d0 R08: 0000000000000000 R09: 0000000000000000 [ 2681.590415][ T4036] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2681.598635][ T4036] R13: 00007ffd30f9a9ef R14: 00007f94d1277300 R15: 0000000000022000 17:52:23 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0}}], 0x2, 0xe0ffffff00000000) 17:52:23 executing program 4 (fault-call:1 fault-nth:23): openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x300}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:52:23 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:52:23 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000740001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:52:23 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffff801, 0x0, @perf_bp={&(0x7f0000000000), 0xdc09}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = fork() r2 = perf_event_open(&(0x7f0000000200)={0x0, 0x80, 0x7, 0x5, 0x8, 0x0, 0x0, 0xffff, 0x1010, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1ff, 0x2, @perf_bp={&(0x7f0000000080), 0x1}, 0x401a8, 0x3, 0x9, 0x8, 0x7fffffff, 0x2, 0x2, 0x0, 0x7, 0x0, 0x3}, r1, 0x10, 0xffffffffffffffff, 0x1) r3 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r3, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r4 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r4, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) ioctl$EVIOCGSW(r4, 0x8040451b, &(0x7f0000001540)) r5 = syz_open_dev$tty20(0xc, 0x4, 0x1) r6 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0, 0x0}) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x8914, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc8J,\x00\xd2\x97\x04\x03\xdc\r') ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x8923, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') sendmsg$NLBL_CIPSOV4_C_REMOVE(r9, &(0x7f0000000240)={&(0x7f0000000fc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f0000001740)=ANY=[@ANYBLOB="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", @ANYRES64=r8, @ANYRESHEX, @ANYRES32=r7, @ANYRESOCT, @ANYRES64, @ANYRESHEX=r6], 0x3}, 0x1, 0x0, 0x0, 0x4}, 0x40025) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000055700)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000055900)={0x10000, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r7}, {0x0, r10}], 0x5, "8d031b2413f839"}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) ppoll(&(0x7f0000001480)=[{r5, 0x200}, {0xffffffffffffffff, 0xc255}, {r11, 0x208}, {0xffffffffffffffff, 0xa280}, {r3, 0x20}, {0xffffffffffffffff, 0x142}, {r0, 0x40}], 0x7, &(0x7f00000014c0)={0x0, 0x3938700}, &(0x7f0000001500)={[0x583]}, 0x8) 17:52:23 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0}}], 0x2, 0xeffdffff00000000) 17:52:23 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:52:23 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0}}], 0x2, 0xf5ffffff00000000) 17:52:23 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f0000000000007a0001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 2681.883192][ T4065] FAULT_INJECTION: forcing a failure. [ 2681.883192][ T4065] name failslab, interval 1, probability 0, space 0, times 0 [ 2681.895952][ T4065] CPU: 1 PID: 4065 Comm: syz-executor.4 Tainted: G W 5.14.0-rc5-syzkaller #0 [ 2681.906043][ T4065] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2681.916126][ T4065] Call Trace: [ 2681.919479][ T4065] dump_stack_lvl+0xb7/0x103 [ 2681.924074][ T4065] dump_stack+0x11/0x1a [ 2681.928223][ T4065] should_fail+0x23c/0x250 [ 2681.932714][ T4065] __should_failslab+0x81/0x90 [ 2681.937470][ T4065] ? register_for_each_vma+0x372/0x890 [ 2681.942931][ T4065] should_failslab+0x5/0x20 [ 2681.947417][ T4065] kmem_cache_alloc_trace+0x49/0x310 [ 2681.952683][ T4065] ? register_for_each_vma+0x372/0x890 [ 2681.958249][ T4065] ? vma_interval_tree_iter_next+0x263/0x280 [ 2681.964223][ T4065] register_for_each_vma+0x372/0x890 [ 2681.969494][ T4065] __uprobe_register+0x3f4/0x8a0 [ 2681.974452][ T4065] uprobe_register_refctr+0x29/0x40 [ 2681.979645][ T4065] probe_event_enable+0x2be/0x7d0 [ 2681.984652][ T4065] ? __uprobe_trace_func+0x430/0x430 [ 2681.989994][ T4065] trace_uprobe_register+0x88/0x410 [ 2681.995211][ T4065] perf_trace_event_init+0x34e/0x790 [ 2682.000487][ T4065] perf_uprobe_init+0xf5/0x140 [ 2682.005258][ T4065] perf_uprobe_event_init+0xde/0x140 [ 2682.010536][ T4065] perf_try_init_event+0x21a/0x400 [ 2682.015636][ T4065] perf_event_alloc+0xa60/0x1790 [ 2682.020571][ T4065] __se_sys_perf_event_open+0x5c7/0x27f0 [ 2682.026195][ T4065] ? vfs_write+0x50c/0x770 [ 2682.030592][ T4065] __x64_sys_perf_event_open+0x63/0x70 [ 2682.036102][ T4065] do_syscall_64+0x3d/0x90 [ 2682.040517][ T4065] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2682.046411][ T4065] RIP: 0033:0x4665e9 [ 2682.050287][ T4065] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2682.069887][ T4065] RSP: 002b:00007f94d1277188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2682.078280][ T4065] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665e9 [ 2682.086585][ T4065] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000180 [ 2682.094541][ T4065] RBP: 00007f94d12771d0 R08: 0000000000000000 R09: 0000000000000000 [ 2682.102508][ T4065] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2682.110462][ T4065] R13: 00007ffd30f9a9ef R14: 00007f94d1277300 R15: 0000000000022000 17:52:23 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, @perf_bp={&(0x7f0000000000), 0x300}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:52:23 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0}}], 0x2, 0xfc00000000000000) 17:52:23 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f0000000000007e0001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:52:23 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:52:23 executing program 4 (fault-call:1 fault-nth:24): openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x300}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:52:23 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0}}], 0x2, 0xfe80000000000000) 17:52:23 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000001840001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 2682.438074][ T4106] FAULT_INJECTION: forcing a failure. [ 2682.438074][ T4106] name failslab, interval 1, probability 0, space 0, times 0 [ 2682.450880][ T4106] CPU: 1 PID: 4106 Comm: syz-executor.4 Tainted: G W 5.14.0-rc5-syzkaller #0 [ 2682.460943][ T4106] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2682.470979][ T4106] Call Trace: [ 2682.474240][ T4106] dump_stack_lvl+0xb7/0x103 [ 2682.478841][ T4106] dump_stack+0x11/0x1a [ 2682.482993][ T4106] should_fail+0x23c/0x250 [ 2682.487398][ T4106] __should_failslab+0x81/0x90 [ 2682.492141][ T4106] ? register_for_each_vma+0x372/0x890 [ 2682.497598][ T4106] should_failslab+0x5/0x20 [ 2682.502084][ T4106] kmem_cache_alloc_trace+0x49/0x310 [ 2682.507362][ T4106] ? register_for_each_vma+0x372/0x890 [ 2682.512825][ T4106] ? vma_interval_tree_iter_next+0x263/0x280 [ 2682.518884][ T4106] register_for_each_vma+0x372/0x890 [ 2682.524178][ T4106] __uprobe_register+0x3f4/0x8a0 [ 2682.529241][ T4106] uprobe_register_refctr+0x29/0x40 [ 2682.534413][ T4106] probe_event_enable+0x2be/0x7d0 [ 2682.539489][ T4106] ? __uprobe_trace_func+0x430/0x430 [ 2682.544783][ T4106] trace_uprobe_register+0x88/0x410 [ 2682.550011][ T4106] perf_trace_event_init+0x34e/0x790 [ 2682.555427][ T4106] perf_uprobe_init+0xf5/0x140 [ 2682.560180][ T4106] perf_uprobe_event_init+0xde/0x140 [ 2682.565514][ T4106] perf_try_init_event+0x21a/0x400 [ 2682.570653][ T4106] perf_event_alloc+0xa60/0x1790 [ 2682.575605][ T4106] __se_sys_perf_event_open+0x5c7/0x27f0 [ 2682.581374][ T4106] ? vfs_write+0x50c/0x770 [ 2682.585768][ T4106] __x64_sys_perf_event_open+0x63/0x70 [ 2682.591223][ T4106] do_syscall_64+0x3d/0x90 [ 2682.595711][ T4106] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2682.601689][ T4106] RIP: 0033:0x4665e9 [ 2682.605573][ T4106] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2682.625158][ T4106] RSP: 002b:00007f94d1277188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2682.633615][ T4106] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665e9 [ 2682.641563][ T4106] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000180 [ 2682.649519][ T4106] RBP: 00007f94d12771d0 R08: 0000000000000000 R09: 0000000000000000 [ 2682.657468][ T4106] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2682.665417][ T4106] R13: 00007ffd30f9a9ef R14: 00007f94d1277300 R15: 0000000000022000 17:52:24 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffff801, 0x0, @perf_bp={&(0x7f0000000000), 0xdc09}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000140)={0x0, 0x0}) syz_open_dev$loop(&(0x7f00000005c0), 0x9, 0x10040) kcmp$KCMP_EPOLL_TFD(0x0, r2, 0x7, 0xffffffffffffffff, &(0x7f0000000600)={r0, r1, 0x3}) fork() perf_event_open(&(0x7f0000000640)={0x0, 0x80, 0x20, 0x5, 0x8, 0x0, 0x0, 0x4, 0x1010, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1ff, 0x2, @perf_bp={&(0x7f0000000080), 0x1}, 0x401ac, 0x3, 0x9, 0x4, 0x7fffffff, 0x2, 0x2, 0x0, 0x7, 0x0, 0x3}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x1) r3 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) preadv(r1, &(0x7f0000000540)=[{&(0x7f0000000300)=""/126, 0x7e}, {&(0x7f0000000380)=""/255, 0xff}, {&(0x7f00000000c0)=""/27, 0x1b}, {&(0x7f0000000480)=""/136, 0x88}, {&(0x7f0000001540)=""/4096, 0x1000}], 0x5, 0x0, 0x80000001) ioctl$EVIOCSKEYCODE_V2(r3, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r4 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r4, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) ioctl$EVIOCGSW(r4, 0x8040451b, &(0x7f0000001540)) r5 = syz_open_dev$tty20(0xc, 0x4, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) r7 = fsmount(r0, 0x0, 0x0) ioctl$EVIOCGLED(r7, 0x80404519, &(0x7f0000000280)=""/117) r8 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) preadv(r8, &(0x7f00000008c0), 0xa, 0xff, 0xf1f5) ppoll(&(0x7f0000001480)=[{r5, 0x200}, {0xffffffffffffffff, 0xc255}, {r6, 0x208}, {0xffffffffffffffff, 0xa280}, {r3, 0x20}, {0xffffffffffffffff, 0x142}, {r1, 0x40}], 0x7, &(0x7f00000014c0)={0x0, 0x3938700}, &(0x7f0000001500)={[0x583]}, 0x8) 17:52:24 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:52:24 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000001860001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:52:24 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0}}], 0x2, 0xfe80ffff00000000) 17:52:24 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0}}], 0x2, 0xfec0ffff00000000) 17:52:24 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, @perf_bp={&(0x7f0000000000), 0x300}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:52:24 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000001890001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:52:24 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:52:24 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0}}], 0x2, 0xff00000000000000) 17:52:24 executing program 4 (fault-call:1 fault-nth:25): openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x300}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:52:24 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:52:24 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f0000000000018a0001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 2683.179491][ T4135] FAULT_INJECTION: forcing a failure. [ 2683.179491][ T4135] name failslab, interval 1, probability 0, space 0, times 0 [ 2683.192122][ T4135] CPU: 1 PID: 4135 Comm: syz-executor.4 Tainted: G W 5.14.0-rc5-syzkaller #0 [ 2683.202274][ T4135] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2683.212391][ T4135] Call Trace: [ 2683.215675][ T4135] dump_stack_lvl+0xb7/0x103 [ 2683.220261][ T4135] dump_stack+0x11/0x1a [ 2683.224396][ T4135] should_fail+0x23c/0x250 [ 2683.228807][ T4135] __should_failslab+0x81/0x90 [ 2683.233561][ T4135] ? register_for_each_vma+0x372/0x890 [ 2683.238998][ T4135] should_failslab+0x5/0x20 [ 2683.243501][ T4135] kmem_cache_alloc_trace+0x49/0x310 [ 2683.248783][ T4135] ? register_for_each_vma+0x372/0x890 [ 2683.254231][ T4135] ? vma_interval_tree_iter_next+0x24c/0x280 [ 2683.260216][ T4135] register_for_each_vma+0x372/0x890 [ 2683.265490][ T4135] __uprobe_register+0x3f4/0x8a0 [ 2683.270427][ T4135] uprobe_register_refctr+0x29/0x40 [ 2683.275635][ T4135] probe_event_enable+0x2be/0x7d0 [ 2683.280667][ T4135] ? __uprobe_trace_func+0x430/0x430 [ 2683.285940][ T4135] trace_uprobe_register+0x88/0x410 [ 2683.291202][ T4135] perf_trace_event_init+0x34e/0x790 [ 2683.296556][ T4135] perf_uprobe_init+0xf5/0x140 [ 2683.301316][ T4135] perf_uprobe_event_init+0xde/0x140 [ 2683.306671][ T4135] perf_try_init_event+0x21a/0x400 [ 2683.311762][ T4135] perf_event_alloc+0xa60/0x1790 [ 2683.316755][ T4135] __se_sys_perf_event_open+0x5c7/0x27f0 [ 2683.322369][ T4135] ? vfs_write+0x50c/0x770 [ 2683.326778][ T4135] __x64_sys_perf_event_open+0x63/0x70 [ 2683.332272][ T4135] do_syscall_64+0x3d/0x90 [ 2683.336700][ T4135] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2683.342575][ T4135] RIP: 0033:0x4665e9 [ 2683.346510][ T4135] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2683.366221][ T4135] RSP: 002b:00007f94d1277188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2683.374619][ T4135] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665e9 [ 2683.382589][ T4135] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000180 [ 2683.390546][ T4135] RBP: 00007f94d12771d0 R08: 0000000000000000 R09: 0000000000000000 [ 2683.398496][ T4135] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2683.406451][ T4135] R13: 00007ffd30f9a9ef R14: 00007f94d1277300 R15: 0000000000022000 17:52:24 executing program 1: r0 = inotify_add_watch(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x2000000) inotify_rm_watch(0xffffffffffffffff, r0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffff801, 0x0, @perf_bp={&(0x7f0000000000), 0xdc09}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = fork() perf_event_open(&(0x7f0000000200)={0x0, 0x80, 0x20, 0x5, 0x8, 0x0, 0x0, 0xffff, 0x1010, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1ff, 0x2, @perf_bp={&(0x7f0000000080), 0x1}, 0x401a8, 0x3, 0x9, 0x8, 0x7fffffff, 0x2, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x10, 0xffffffffffffffff, 0x1) r3 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r3, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r4 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r4, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) ioctl$EVIOCGSW(r4, 0x8040451b, &(0x7f0000001540)) r5 = syz_open_dev$tty20(0xc, 0x4, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) ppoll(&(0x7f0000001480)=[{r5, 0x200}, {0xffffffffffffffff, 0xc255}, {r6, 0x208}, {0xffffffffffffffff, 0xa280}, {r3, 0x20}, {0xffffffffffffffff, 0x142}, {r1, 0x40}], 0x7, &(0x7f00000014c0)={0x0, 0x3938700}, &(0x7f0000001500)={[0x583]}, 0x8) 17:52:24 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0}}], 0x2, 0xffff000000000000) 17:52:24 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:52:24 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f0000000000009c0001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:52:24 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0}}], 0x2, 0xffffff7f00000000) 17:52:25 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @perf_bp={&(0x7f0000000000), 0x300}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:52:25 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:52:25 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000003ae0001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:52:25 executing program 4 (fault-call:1 fault-nth:26): openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x300}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:52:25 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0}}], 0x2, 0xffffffff00000000) 17:52:25 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f00000000c0)=0x0) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x4) perf_event_open(&(0x7f0000000280)={0x4, 0x80, 0x80, 0x2, 0x3f, 0x0, 0x0, 0x9, 0x10, 0xe, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x9517, 0x0, @perf_config_ext={0x2, 0x5}, 0x4, 0xc6, 0x4a7, 0x7, 0x3, 0x200, 0xfffc, 0x0, 0xfcf, 0x0, 0x8}, r1, 0xf, r2, 0x3) r3 = perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffff801, 0x0, @perf_bp={&(0x7f0000000000), 0xdc09}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = fork() perf_event_open(&(0x7f0000000200)={0x0, 0x80, 0x20, 0x5, 0x8, 0x0, 0x0, 0xffff, 0x1010, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1ff, 0x2, @perf_bp={&(0x7f0000000080), 0x1}, 0x401a8, 0x3, 0x9, 0x8, 0x7fffffff, 0x2, 0x2, 0x0, 0x7, 0x0, 0x3}, r4, 0x10, 0xffffffffffffffff, 0x1) r5 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r5, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r6 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r6, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) ioctl$EVIOCGSW(r6, 0x8040451b, &(0x7f0000001540)) r7 = syz_open_dev$tty20(0xc, 0x4, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) ppoll(&(0x7f0000001480)=[{r7, 0x200}, {0xffffffffffffffff, 0xc255}, {r8, 0x208}, {0xffffffffffffffff, 0xa280}, {r5, 0x20}, {0xffffffffffffffff, 0x142}, {r3, 0x40}], 0x7, &(0x7f00000014c0)={0x0, 0x3938700}, &(0x7f0000001500)={[0x583]}, 0x8) 17:52:25 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) ppoll(&(0x7f00000001c0)=[{r2}], 0x1, 0x0, 0x0, 0x0) dup2(r2, r1) dup2(r2, r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) ppoll(&(0x7f00000001c0)=[{r4}], 0x1, 0x0, 0x0, 0x0) dup2(r4, r3) recvmmsg(r4, &(0x7f0000003940)=[{{&(0x7f0000000000)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000100)=""/175, 0xaf}], 0x1, &(0x7f0000000280)=""/77, 0x4d}, 0x5}, {{&(0x7f0000000300)=@ax25={{0x3, @null}, [@rose, @rose, @null, @bcast, @netrom, @netrom, @default, @default]}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000380)=""/16, 0x10}], 0x1, &(0x7f0000000400)=""/121, 0x79}, 0x8000}, {{&(0x7f0000000480)=@generic, 0x80, &(0x7f0000000700)=[{&(0x7f0000000500)=""/251, 0xfb}, {&(0x7f0000000600)=""/116, 0x74}, {&(0x7f0000000680)=""/119, 0x77}], 0x3, &(0x7f0000000740)=""/73, 0x49}, 0x1ff}, {{&(0x7f00000007c0)=@qipcrtr, 0x80, &(0x7f0000001900)=[{&(0x7f0000000840)=""/4096, 0x1000}, {&(0x7f0000002700)=""/4096, 0x1000}, {&(0x7f0000001840)=""/10, 0xa}, {&(0x7f0000001880)=""/99, 0x63}], 0x4, &(0x7f0000001940)=""/29, 0x1d}, 0x7}, {{&(0x7f0000001980)=@nfc_llcp, 0x80, &(0x7f0000001e40)=[{&(0x7f0000001a00)=""/92, 0x5c}, {&(0x7f0000001a80)=""/129, 0x81}, {&(0x7f0000001b40)=""/5, 0x5}, {&(0x7f0000001b80)=""/230, 0xe6}, {&(0x7f0000001c80)=""/200, 0xc8}, {&(0x7f0000001d80)=""/174, 0xae}], 0x6, &(0x7f0000001ec0)=""/78, 0x4e}, 0xffffffff}, {{0x0, 0x0, &(0x7f0000002500)=[{&(0x7f0000001f40)=""/250, 0xfa}, {&(0x7f0000002040)=""/246, 0xf6}, {&(0x7f0000002140)=""/51, 0x33}, {&(0x7f0000002180)=""/245, 0xf5}, {&(0x7f0000002280)=""/149, 0x95}, {&(0x7f0000002340)=""/136, 0x88}, {&(0x7f0000002400)=""/26, 0x1a}, {&(0x7f0000002440)=""/179, 0xb3}], 0x8}, 0x1ff}, {{&(0x7f0000002580)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f0000003900)=[{&(0x7f0000003700)=""/205, 0xcd}, {&(0x7f0000003800)=""/228, 0xe4}, {&(0x7f0000002600)=""/132, 0x84}], 0x3, &(0x7f0000004980)=""/4096, 0x1000}, 0x9610}], 0x7, 0x102, &(0x7f0000003b00)={0x77359400}) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@rc={0x1f, @none, 0x1a}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10, 0x0, 0x5}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x2, 0x1, 0x3, 0x3, {0xa, 0x4e22, 0x2, @mcast1, 0x6}}}, 0x80, 0x0}}], 0x2, 0x0) 17:52:25 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000003af0001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:52:25 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:52:25 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:52:25 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000003b00001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 2683.855433][ T4173] FAULT_INJECTION: forcing a failure. [ 2683.855433][ T4173] name failslab, interval 1, probability 0, space 0, times 0 [ 2683.868161][ T4173] CPU: 0 PID: 4173 Comm: syz-executor.4 Tainted: G W 5.14.0-rc5-syzkaller #0 [ 2683.878218][ T4173] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2683.888313][ T4173] Call Trace: [ 2683.891591][ T4173] dump_stack_lvl+0xb7/0x103 [ 2683.896244][ T4173] dump_stack+0x11/0x1a [ 2683.900442][ T4173] should_fail+0x23c/0x250 [ 2683.904890][ T4173] __should_failslab+0x81/0x90 [ 2683.909649][ T4173] ? register_for_each_vma+0x372/0x890 [ 2683.915089][ T4173] should_failslab+0x5/0x20 [ 2683.919589][ T4173] kmem_cache_alloc_trace+0x49/0x310 [ 2683.924935][ T4173] ? register_for_each_vma+0x372/0x890 [ 2683.930394][ T4173] ? vma_interval_tree_iter_next+0x263/0x280 [ 2683.936391][ T4173] register_for_each_vma+0x372/0x890 [ 2683.941685][ T4173] __uprobe_register+0x3f4/0x8a0 [ 2683.946628][ T4173] uprobe_register_refctr+0x29/0x40 [ 2683.951825][ T4173] probe_event_enable+0x2be/0x7d0 [ 2683.956940][ T4173] ? __uprobe_trace_func+0x430/0x430 [ 2683.962208][ T4173] trace_uprobe_register+0x88/0x410 [ 2683.967458][ T4173] perf_trace_event_init+0x34e/0x790 [ 2683.972742][ T4173] perf_uprobe_init+0xf5/0x140 [ 2683.977487][ T4173] perf_uprobe_event_init+0xde/0x140 [ 2683.982819][ T4173] perf_try_init_event+0x21a/0x400 [ 2683.987911][ T4173] perf_event_alloc+0xa60/0x1790 [ 2683.992883][ T4173] __se_sys_perf_event_open+0x5c7/0x27f0 [ 2683.998504][ T4173] ? vfs_write+0x50c/0x770 [ 2684.002999][ T4173] __x64_sys_perf_event_open+0x63/0x70 [ 2684.008504][ T4173] do_syscall_64+0x3d/0x90 [ 2684.012912][ T4173] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2684.018799][ T4173] RIP: 0033:0x4665e9 [ 2684.022771][ T4173] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2684.042362][ T4173] RSP: 002b:00007f94d1277188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a 17:52:25 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:52:25 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11, 0x0, @perf_bp={&(0x7f0000000000), 0x300}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:52:25 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000003b10001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 2684.050786][ T4173] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665e9 [ 2684.058748][ T4173] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000180 [ 2684.066712][ T4173] RBP: 00007f94d12771d0 R08: 0000000000000000 R09: 0000000000000000 [ 2684.074663][ T4173] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2684.082611][ T4173] R13: 00007ffd30f9a9ef R14: 00007f94d1277300 R15: 0000000000022000 17:52:25 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x12}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:52:25 executing program 4 (fault-call:1 fault-nth:27): openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x300}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:52:25 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000b80001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:52:25 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x27}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2684.390421][ T4207] FAULT_INJECTION: forcing a failure. [ 2684.390421][ T4207] name failslab, interval 1, probability 0, space 0, times 0 [ 2684.403150][ T4207] CPU: 0 PID: 4207 Comm: syz-executor.4 Tainted: G W 5.14.0-rc5-syzkaller #0 [ 2684.413245][ T4207] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2684.423333][ T4207] Call Trace: [ 2684.426660][ T4207] dump_stack_lvl+0xb7/0x103 [ 2684.431249][ T4207] dump_stack+0x11/0x1a [ 2684.435381][ T4207] should_fail+0x23c/0x250 [ 2684.439878][ T4207] __should_failslab+0x81/0x90 [ 2684.444620][ T4207] ? register_for_each_vma+0x372/0x890 [ 2684.450051][ T4207] should_failslab+0x5/0x20 [ 2684.454565][ T4207] kmem_cache_alloc_trace+0x49/0x310 [ 2684.459859][ T4207] ? register_for_each_vma+0x372/0x890 [ 2684.465298][ T4207] ? vma_interval_tree_iter_next+0x263/0x280 [ 2684.471391][ T4207] register_for_each_vma+0x372/0x890 [ 2684.476662][ T4207] __uprobe_register+0x3f4/0x8a0 [ 2684.481584][ T4207] uprobe_register_refctr+0x29/0x40 [ 2684.486773][ T4207] probe_event_enable+0x2be/0x7d0 [ 2684.491832][ T4207] ? __uprobe_trace_func+0x430/0x430 [ 2684.497182][ T4207] trace_uprobe_register+0x88/0x410 [ 2684.502364][ T4207] perf_trace_event_init+0x34e/0x790 [ 2684.507768][ T4207] perf_uprobe_init+0xf5/0x140 [ 2684.512702][ T4207] perf_uprobe_event_init+0xde/0x140 [ 2684.517972][ T4207] perf_try_init_event+0x21a/0x400 [ 2684.523066][ T4207] perf_event_alloc+0xa60/0x1790 [ 2684.527994][ T4207] __se_sys_perf_event_open+0x5c7/0x27f0 [ 2684.533620][ T4207] ? vfs_write+0x50c/0x770 [ 2684.538040][ T4207] __x64_sys_perf_event_open+0x63/0x70 [ 2684.543511][ T4207] do_syscall_64+0x3d/0x90 [ 2684.547907][ T4207] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2684.553803][ T4207] RIP: 0033:0x4665e9 [ 2684.557684][ T4207] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2684.577275][ T4207] RSP: 002b:00007f94d1277188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2684.585680][ T4207] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665e9 [ 2684.593635][ T4207] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000180 [ 2684.601597][ T4207] RBP: 00007f94d12771d0 R08: 0000000000000000 R09: 0000000000000000 [ 2684.609549][ T4207] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2684.617504][ T4207] R13: 00007ffd30f9a9ef R14: 00007f94d1277300 R15: 0000000000022000 17:52:26 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @mcast2}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0}}], 0x2, 0x0) 17:52:26 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffff801, 0x0, @perf_bp={&(0x7f0000000000), 0xdc09}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x412901, 0x94) r1 = fork() perf_event_open(&(0x7f0000000200)={0x0, 0x80, 0x20, 0x5, 0x8, 0x0, 0x0, 0xffff, 0x1010, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1ff, 0x2, @perf_bp={&(0x7f0000000080), 0x1}, 0x401a8, 0x3, 0x9, 0x8, 0x7fffffff, 0x2, 0x2, 0x0, 0x7, 0x0, 0x3}, r1, 0x10, 0xffffffffffffffff, 0x1) r2 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r2, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r3 = fork() tkill(r3, 0x24) r4 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r4, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) ioctl$EVIOCGSW(r4, 0x8040451b, &(0x7f0000001540)) r5 = syz_open_dev$tty20(0xc, 0x4, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) ppoll(&(0x7f0000001480)=[{r5, 0x200}, {0xffffffffffffffff, 0xc255}, {r6, 0x208}, {0xffffffffffffffff, 0xa280}, {r2, 0x20}, {0xffffffffffffffff, 0x142}, {r0, 0x40}], 0x7, &(0x7f00000014c0)={0x0, 0x3938700}, &(0x7f0000001500)={[0x583]}, 0x8) 17:52:26 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:52:26 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000b90001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:52:26 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, @perf_bp={&(0x7f0000000000), 0x300}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:52:26 executing program 4 (fault-call:1 fault-nth:28): openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x300}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:52:26 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r0, 0x8983, &(0x7f0000000000)={0x6, 'macvlan1\x00', {0x8}, 0xffe1}) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000001280), 0x2801, 0x0) setsockopt$inet6_int(r1, 0x29, 0x4e, &(0x7f00000012c0)=0x4, 0x4) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0}}], 0x2, 0x0) 17:52:26 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000bc0001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:52:26 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000), 0x6a0400, 0x0) preadv(r1, &(0x7f0000000040)=[{&(0x7f0000000100)=""/223, 0xdf}, {&(0x7f0000000200)=""/194, 0xc2}, {&(0x7f0000000300)=""/133, 0x85}], 0x3, 0x9, 0x1) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000400), 0x1, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$BTRFS_IOC_SUBVOL_CREATE(r2, 0x5000940e, &(0x7f0000000440)={{r3}, "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"}) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="1000000000000000000000000001040000000000000000e90000000000007277a9"], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0}}], 0x2, 0x0) [ 2684.835107][ T4228] FAULT_INJECTION: forcing a failure. [ 2684.835107][ T4228] name failslab, interval 1, probability 0, space 0, times 0 [ 2684.847749][ T4228] CPU: 0 PID: 4228 Comm: syz-executor.4 Tainted: G W 5.14.0-rc5-syzkaller #0 [ 2684.857815][ T4228] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2684.867871][ T4228] Call Trace: [ 2684.871224][ T4228] dump_stack_lvl+0xb7/0x103 [ 2684.875812][ T4228] dump_stack+0x11/0x1a [ 2684.879947][ T4228] should_fail+0x23c/0x250 [ 2684.884344][ T4228] __should_failslab+0x81/0x90 [ 2684.889086][ T4228] ? register_for_each_vma+0x372/0x890 [ 2684.894652][ T4228] should_failslab+0x5/0x20 [ 2684.899175][ T4228] kmem_cache_alloc_trace+0x49/0x310 [ 2684.904478][ T4228] ? register_for_each_vma+0x372/0x890 [ 2684.909917][ T4228] ? vma_interval_tree_iter_next+0x24c/0x280 [ 2684.916110][ T4228] register_for_each_vma+0x372/0x890 [ 2684.921387][ T4228] __uprobe_register+0x3f4/0x8a0 [ 2684.926390][ T4228] uprobe_register_refctr+0x29/0x40 [ 2684.931571][ T4228] probe_event_enable+0x2be/0x7d0 [ 2684.936582][ T4228] ? __uprobe_trace_func+0x430/0x430 [ 2684.941955][ T4228] trace_uprobe_register+0x88/0x410 [ 2684.947148][ T4228] perf_trace_event_init+0x34e/0x790 [ 2684.952434][ T4228] perf_uprobe_init+0xf5/0x140 [ 2684.957191][ T4228] perf_uprobe_event_init+0xde/0x140 [ 2684.962533][ T4228] perf_try_init_event+0x21a/0x400 [ 2684.967702][ T4228] perf_event_alloc+0xa60/0x1790 [ 2684.972669][ T4228] __se_sys_perf_event_open+0x5c7/0x27f0 [ 2684.978285][ T4228] ? vfs_write+0x50c/0x770 [ 2684.982701][ T4228] __x64_sys_perf_event_open+0x63/0x70 [ 2684.988143][ T4228] do_syscall_64+0x3d/0x90 [ 2684.992552][ T4228] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2684.998487][ T4228] RIP: 0033:0x4665e9 [ 2685.002448][ T4228] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2685.022153][ T4228] RSP: 002b:00007f94d1277188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a 17:52:26 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2685.030559][ T4228] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665e9 [ 2685.038517][ T4228] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000180 [ 2685.046590][ T4228] RBP: 00007f94d12771d0 R08: 0000000000000000 R09: 0000000000000000 [ 2685.054540][ T4228] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2685.062496][ T4228] R13: 00007ffd30f9a9ef R14: 00007f94d1277300 R15: 0000000000022000 17:52:26 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:52:26 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000002bc0001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:52:26 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) r1 = syz_open_dev$ttys(0xc, 0x2, 0x1) sendfile(r1, r0, &(0x7f0000000000), 0x400000000400) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) getpeername$unix(r3, &(0x7f0000000100)=@abs, &(0x7f0000000040)=0x6e) ppoll(&(0x7f00000001c0)=[{r3}], 0x1, 0x0, 0x0, 0x0) dup2(r3, r2) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r2, 0x6612) sendmmsg(r0, &(0x7f00000089c0), 0x0, 0x0) 17:52:26 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x40, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffff801, 0x0, @perf_bp={&(0x7f0000000000), 0xdc09}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r2 = fork() r3 = perf_event_open(&(0x7f0000000200)={0x0, 0x80, 0x20, 0x5, 0x8, 0x0, 0x0, 0xffff, 0x1010, 0x8, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1ff, 0x2, @perf_bp={&(0x7f0000000080), 0x1}, 0x401a8, 0x23, 0x9, 0x8, 0x7fffffff, 0x2, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x10, 0xffffffffffffffff, 0x1) r4 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r4, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000740)=""/179) r5 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) preadv(r3, &(0x7f00000006c0)=[{&(0x7f0000000340)=""/107, 0x6b}, {&(0x7f00000003c0)=""/237, 0xed}, {&(0x7f00000004c0)=""/203, 0xcb}, {&(0x7f00000002c0)=""/40, 0x28}, {&(0x7f00000005c0)=""/50, 0x32}, {&(0x7f0000000600)=""/167, 0xa7}], 0x6, 0x101, 0x2) ioctl$EVIOCSKEYCODE_V2(r5, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, &(0x7f0000001540)=""/102400) mount_setattr(0xffffffffffffffff, &(0x7f0000000a00)='./file0\x00', 0x100, &(0x7f0000000cc0)={0x0, 0x10007f, 0x40000, {r0}}, 0x20) ioctl$EVIOCSKEYCODE_V2(r5, 0x40284504, &(0x7f00000009c0)={0x0, 0x14, 0x80, 0x7ff, "892c3178951568423b57619cac648a2b454dea830ab74a96433e2c8cecfce7d8"}) r6 = syz_open_dev$tty20(0xc, 0x4, 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ppoll(&(0x7f0000001480)=[{r6, 0x200}, {r7, 0xc255}, {r7, 0x208}, {0xffffffffffffffff, 0xa280}, {0xffffffffffffffff, 0x20}, {0xffffffffffffffff, 0x142}, {r1, 0x40}], 0x7, &(0x7f00000014c0)={0x0, 0x3938700}, &(0x7f0000001500)={[0x583]}, 0x8) ioctl$EVIOCSKEYCODE_V2(r4, 0x40284504, &(0x7f00000000c0)={0x0, 0x10, 0x8000, 0xbc, "a26bb032bcbb43e37af11ca7956bc612a6ac30993189fb993728b39b3b935a90"}) r9 = signalfd(r8, &(0x7f0000000140)={[0x3000000000]}, 0x8) connect$inet6(r9, &(0x7f0000000280)={0xa, 0x4e23, 0x6, @mcast2, 0x3}, 0x1c) preadv(0xffffffffffffffff, &(0x7f0000000c40)=[{&(0x7f0000000800)=""/119, 0x77}, {&(0x7f0000000880)=""/68, 0x44}, {&(0x7f0000000900)=""/90, 0x5a}, {&(0x7f0000000980)=""/60, 0x3c}, {&(0x7f0000000bc0)=""/76, 0x4c}, {&(0x7f0000000a40)=""/95, 0x5f}, {&(0x7f0000000ac0)=""/105, 0x69}, {&(0x7f0000000b40)=""/105, 0x69}], 0x8, 0x17, 0x9) 17:52:26 executing program 4 (fault-call:1 fault-nth:29): openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x300}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:52:26 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000003c10001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:52:26 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:52:26 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x27, 0x0, @perf_bp={&(0x7f0000000000), 0x300}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:52:26 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x74}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:52:26 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000003d60001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 2685.686802][ T4270] FAULT_INJECTION: forcing a failure. [ 2685.686802][ T4270] name failslab, interval 1, probability 0, space 0, times 0 [ 2685.699553][ T4270] CPU: 0 PID: 4270 Comm: syz-executor.4 Tainted: G W 5.14.0-rc5-syzkaller #0 [ 2685.709611][ T4270] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2685.719663][ T4270] Call Trace: [ 2685.722965][ T4270] dump_stack_lvl+0xb7/0x103 [ 2685.727555][ T4270] dump_stack+0x11/0x1a [ 2685.731739][ T4270] should_fail+0x23c/0x250 [ 2685.736139][ T4270] __should_failslab+0x81/0x90 [ 2685.740980][ T4270] ? register_for_each_vma+0x372/0x890 [ 2685.746438][ T4270] should_failslab+0x5/0x20 [ 2685.750944][ T4270] kmem_cache_alloc_trace+0x49/0x310 [ 2685.756230][ T4270] ? register_for_each_vma+0x372/0x890 [ 2685.761716][ T4270] ? vma_interval_tree_iter_next+0x263/0x280 [ 2685.767732][ T4270] register_for_each_vma+0x372/0x890 [ 2685.773092][ T4270] __uprobe_register+0x3f4/0x8a0 [ 2685.778013][ T4270] uprobe_register_refctr+0x29/0x40 [ 2685.783188][ T4270] probe_event_enable+0x2be/0x7d0 [ 2685.788253][ T4270] ? __uprobe_trace_func+0x430/0x430 [ 2685.793536][ T4270] trace_uprobe_register+0x88/0x410 [ 2685.798816][ T4270] perf_trace_event_init+0x34e/0x790 [ 2685.804097][ T4270] perf_uprobe_init+0xf5/0x140 [ 2685.808848][ T4270] perf_uprobe_event_init+0xde/0x140 [ 2685.814127][ T4270] perf_try_init_event+0x21a/0x400 [ 2685.819375][ T4270] perf_event_alloc+0xa60/0x1790 [ 2685.824294][ T4270] __se_sys_perf_event_open+0x5c7/0x27f0 [ 2685.829943][ T4270] ? vfs_write+0x50c/0x770 [ 2685.834438][ T4270] __x64_sys_perf_event_open+0x63/0x70 [ 2685.839968][ T4270] do_syscall_64+0x3d/0x90 [ 2685.844381][ T4270] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2685.850260][ T4270] RIP: 0033:0x4665e9 [ 2685.854145][ T4270] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2685.873842][ T4270] RSP: 002b:00007f94d1277188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a 17:52:27 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000002f00001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:52:27 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7a}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:52:27 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffff801, 0x0, @perf_bp={&(0x7f0000000000), 0xdc09}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = fork() perf_event_open(&(0x7f0000000200)={0x0, 0x80, 0x20, 0x5, 0x8, 0x0, 0x0, 0xffff, 0x1010, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1ff, 0x2, @perf_bp={&(0x7f0000000080), 0x1}, 0x401a8, 0x3, 0x9, 0x8, 0x7fffffff, 0x2, 0x2, 0x0, 0x7, 0x0, 0x3}, r1, 0x10, 0xffffffffffffffff, 0x1) r2 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r2, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r3 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r3, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) ioctl$EVIOCGSW(r3, 0x8040451b, &(0x7f0000001540)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) ppoll(&(0x7f0000001480)=[{0xffffffffffffffff, 0x200}, {0xffffffffffffffff, 0xc255}, {r4, 0x208}, {0xffffffffffffffff, 0xa280}, {r2, 0x20}, {0xffffffffffffffff, 0x142}, {r0, 0x40}], 0x7, &(0x7f00000014c0)={0x0, 0x3938700}, &(0x7f0000001500)={[0x583]}, 0x8) r5 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000000)={'veth1_to_bridge\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r5, 0x89f7, &(0x7f0000000140)={'sit0\x00', &(0x7f00000000c0)={'syztnl2\x00', r6, 0x16, 0xbc, 0x80, 0x6, 0x8, @dev={0xfe, 0x80, '\x00', 0x38}, @empty, 0x20, 0x20, 0x9, 0x4}}) r8 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0xc4000, 0x0) r9 = syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000180)={0x14, r9, 0x1, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r8, &(0x7f0000000380)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000200)={0x64, r9, 0x200, 0x70bd25, 0x25dfdbff, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x50, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}]}, 0x64}, 0x1, 0x0, 0x0, 0x4}, 0x250c8e04860779a5) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r8) 17:52:27 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f00000000000ff80001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 2685.882235][ T4270] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665e9 [ 2685.890204][ T4270] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000180 [ 2685.898167][ T4270] RBP: 00007f94d12771d0 R08: 0000000000000000 R09: 0000000000000000 [ 2685.906136][ T4270] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2685.914100][ T4270] R13: 00007ffd30f9a9ef R14: 00007f94d1277300 R15: 0000000000022000 [ 2686.066789][ T4291] ================================================================== [ 2686.075067][ T4291] BUG: KCSAN: data-race in uprobe_dispatcher / uprobe_dispatcher [ 2686.082783][ T4291] [ 2686.085098][ T4291] write to 0xffff88813b27d428 of 8 bytes by task 4296 on cpu 0: [ 2686.092715][ T4291] uprobe_dispatcher+0x46/0x670 [ 2686.097690][ T4291] uprobe_notify_resume+0x73a/0x1310 [ 2686.102975][ T4291] exit_to_user_mode_prepare+0xcb/0x190 [ 2686.108515][ T4291] irqentry_exit_to_user_mode+0x5/0x10 [ 2686.113964][ T4291] asm_exc_int3+0x31/0x40 [ 2686.118281][ T4291] [ 2686.120590][ T4291] read to 0xffff88813b27d428 of 8 bytes by task 4291 on cpu 1: [ 2686.128113][ T4291] uprobe_dispatcher+0x37/0x670 [ 2686.132952][ T4291] uprobe_notify_resume+0x73a/0x1310 [ 2686.138221][ T4291] exit_to_user_mode_prepare+0xcb/0x190 [ 2686.143757][ T4291] irqentry_exit_to_user_mode+0x5/0x10 [ 2686.149210][ T4291] asm_exc_int3+0x31/0x40 [ 2686.153529][ T4291] [ 2686.155831][ T4291] value changed: 0x0000000000000825 -> 0x0000000000000826 [ 2686.162916][ T4291] [ 2686.165219][ T4291] Reported by Kernel Concurrency Sanitizer on: [ 2686.171346][ T4291] CPU: 1 PID: 4291 Comm: syz-executor.1 Tainted: G W 5.14.0-rc5-syzkaller #0 [ 2686.181398][ T4291] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2686.191435][ T4291] ================================================================== 17:52:27 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e21, 0x2, @remote, 0x7128}, 0x1c) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0}}], 0x2, 0x0) 17:52:27 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:52:27 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000003fa0001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:52:27 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48, 0x0, @perf_bp={&(0x7f0000000000), 0x300}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:52:27 executing program 4 (fault-call:1 fault-nth:30): openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x300}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:52:27 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000002fe0001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:52:27 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0}}], 0x2, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) recvmmsg(r1, &(0x7f0000004b00)=[{{&(0x7f0000000000)=@l2={0x1f, 0x0, @fixed}, 0x80, &(0x7f00000013c0)=[{&(0x7f0000000100)=""/245, 0xf5}, {&(0x7f0000000200)=""/158, 0x9e}, {&(0x7f00000002c0)=""/77, 0x4d}, {&(0x7f0000000340)=""/69, 0x45}, {&(0x7f00000003c0)=""/4096, 0x1000}], 0x5, &(0x7f0000001440)=""/106, 0x6a}, 0x8}, {{&(0x7f00000014c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @private}}}, 0x80, &(0x7f0000001540), 0x0, &(0x7f0000001580)=""/238, 0xee}, 0x7}, {{0x0, 0x0, &(0x7f0000001a00)=[{&(0x7f0000001680)=""/92, 0x5c}, {&(0x7f0000001700)=""/78, 0x4e}, {&(0x7f0000001780)=""/141, 0x8d}, {&(0x7f0000001840)=""/154, 0x9a}, {&(0x7f0000001900)=""/255, 0xff}], 0x5}, 0xffff}, {{&(0x7f0000001a80)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f0000001cc0)=[{&(0x7f0000001b00)=""/157, 0x9d}, {&(0x7f0000001bc0)=""/134, 0x86}, {&(0x7f0000001c80)=""/32, 0x20}], 0x3}, 0x4}, {{0x0, 0x0, &(0x7f0000001fc0)=[{&(0x7f0000001d00)=""/125, 0x7d}, {&(0x7f0000001d80)=""/116, 0x74}, {&(0x7f0000001e00)=""/208, 0xd0}, {&(0x7f0000001f00)=""/138, 0x8a}], 0x4}, 0x800}, {{&(0x7f0000002000)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000002480)=[{&(0x7f0000002080)=""/39, 0x27}, {&(0x7f00000020c0)=""/232, 0xe8}, {&(0x7f00000021c0)=""/69, 0x45}, {&(0x7f0000002700)=""/4096, 0x1000}, {&(0x7f0000002240)=""/54, 0x36}, {&(0x7f0000002280)=""/17, 0x11}, {&(0x7f00000022c0)=""/188, 0xbc}, {&(0x7f0000002380)=""/245, 0xf5}], 0x8, &(0x7f0000002500)=""/25, 0x19}, 0x7f}, {{&(0x7f0000002540)=@l2tp={0x2, 0x0, @remote}, 0x80, &(0x7f0000002640)=[{&(0x7f0000003700)=""/4096, 0x1000}, {&(0x7f00000025c0)=""/92, 0x5c}, {&(0x7f0000004700)=""/210, 0xd2}, {&(0x7f0000004800)=""/218, 0xda}, {&(0x7f0000004980)=""/219, 0xdb}], 0x5, &(0x7f0000004a80)=""/118, 0x76}, 0x3}], 0x7, 0x100, 0x0) 17:52:27 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x12f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2686.438437][ T4307] FAULT_INJECTION: forcing a failure. [ 2686.438437][ T4307] name failslab, interval 1, probability 0, space 0, times 0 [ 2686.451071][ T4307] CPU: 1 PID: 4307 Comm: syz-executor.4 Tainted: G W 5.14.0-rc5-syzkaller #0 [ 2686.461141][ T4307] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2686.471215][ T4307] Call Trace: [ 2686.474493][ T4307] dump_stack_lvl+0xb7/0x103 [ 2686.479147][ T4307] dump_stack+0x11/0x1a [ 2686.483291][ T4307] should_fail+0x23c/0x250 [ 2686.487700][ T4307] __should_failslab+0x81/0x90 [ 2686.492460][ T4307] ? register_for_each_vma+0x372/0x890 [ 2686.497991][ T4307] should_failslab+0x5/0x20 [ 2686.502481][ T4307] kmem_cache_alloc_trace+0x49/0x310 [ 2686.507833][ T4307] ? register_for_each_vma+0x372/0x890 [ 2686.513292][ T4307] ? vma_interval_tree_iter_next+0x24c/0x280 [ 2686.519287][ T4307] register_for_each_vma+0x372/0x890 [ 2686.524678][ T4307] __uprobe_register+0x3f4/0x8a0 [ 2686.529756][ T4307] uprobe_register_refctr+0x29/0x40 [ 2686.535679][ T4307] probe_event_enable+0x2be/0x7d0 [ 2686.540774][ T4307] ? __uprobe_trace_func+0x430/0x430 [ 2686.546055][ T4307] trace_uprobe_register+0x88/0x410 [ 2686.551362][ T4307] perf_trace_event_init+0x34e/0x790 [ 2686.556747][ T4307] perf_uprobe_init+0xf5/0x140 [ 2686.561498][ T4307] perf_uprobe_event_init+0xde/0x140 [ 2686.566804][ T4307] perf_try_init_event+0x21a/0x400 [ 2686.571919][ T4307] perf_event_alloc+0xa60/0x1790 [ 2686.576946][ T4307] __se_sys_perf_event_open+0x5c7/0x27f0 [ 2686.582581][ T4307] ? vfs_write+0x50c/0x770 [ 2686.586996][ T4307] __x64_sys_perf_event_open+0x63/0x70 [ 2686.592451][ T4307] do_syscall_64+0x3d/0x90 [ 2686.596860][ T4307] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2686.602761][ T4307] RIP: 0033:0x4665e9 [ 2686.606639][ T4307] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2686.626229][ T4307] RSP: 002b:00007f94d1277188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a 17:52:27 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000003fe0001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:52:27 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:52:27 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffff801, 0x0, @perf_bp={&(0x7f0000000000), 0xdc09}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'veth1_to_bridge\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r1, 0x89f7, &(0x7f0000000140)={'sit0\x00', &(0x7f00000000c0)={'syztnl2\x00', r2, 0x16, 0xbc, 0x80, 0x6, 0x8, @dev={0xfe, 0x80, '\x00', 0x38}, @empty, 0x20, 0x20, 0x9, 0x4}}) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0xc4000, 0x0) r5 = syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000180)={0x14, r5, 0x1, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r4, &(0x7f0000000380)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000200)=ANY=[@ANYBLOB='d\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="000225bd7000ffdbdf250500000008000100"/30, @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=r3, @ANYBLOB="140002006272696467655f736c6176655f30000008000100", @ANYRES32=r2, @ANYBLOB="0800030000000000"], 0x64}, 0x1, 0x0, 0x0, 0x4}, 0x250c8e04860779a5) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r4) r6 = fork() perf_event_open(&(0x7f0000000200)={0x0, 0x80, 0x20, 0x5, 0x8, 0x2, 0x0, 0xffff, 0x1010, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1ff, 0x2, @perf_bp={&(0x7f0000000280), 0x1}, 0x0, 0x4, 0x9, 0x8, 0x7fffffff, 0x2, 0x2, 0x0, 0x7, 0x0, 0x3}, r6, 0x10, 0xffffffffffffffff, 0x1) r7 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r7, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r8 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r8, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, &(0x7f0000001540)) r9 = syz_open_dev$tty20(0xc, 0x4, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) ppoll(&(0x7f0000001480)=[{r9, 0x200}, {0xffffffffffffffff, 0xc255}, {r10, 0x208}, {0xffffffffffffffff, 0xa280}, {r7, 0x20}, {0xffffffffffffffff, 0x142}, {r0, 0x40}], 0x7, &(0x7f00000014c0)={0x0, 0x3938700}, &(0x7f0000001500)={[0x583]}, 0x8) [ 2686.634675][ T4307] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665e9 [ 2686.642681][ T4307] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000180 [ 2686.650653][ T4307] RBP: 00007f94d12771d0 R08: 0000000000000000 R09: 0000000000000000 [ 2686.658620][ T4307] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2686.666584][ T4307] R13: 00007ffd30f9a9ef R14: 00007f94d1277300 R15: 0000000000022000 17:52:27 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f0000000000fffe0001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:52:27 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3dc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:52:27 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000001ff0001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:52:27 executing program 4 (fault-call:1 fault-nth:31): openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x300}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2686.808146][ T4337] FAULT_INJECTION: forcing a failure. [ 2686.808146][ T4337] name failslab, interval 1, probability 0, space 0, times 0 [ 2686.820807][ T4337] CPU: 1 PID: 4337 Comm: syz-executor.4 Tainted: G W 5.14.0-rc5-syzkaller #0 [ 2686.830864][ T4337] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2686.841014][ T4337] Call Trace: [ 2686.844280][ T4337] dump_stack_lvl+0xb7/0x103 [ 2686.848858][ T4337] dump_stack+0x11/0x1a [ 2686.852992][ T4337] should_fail+0x23c/0x250 [ 2686.857530][ T4337] __should_failslab+0x81/0x90 [ 2686.862276][ T4337] ? register_for_each_vma+0x372/0x890 [ 2686.867777][ T4337] should_failslab+0x5/0x20 [ 2686.872279][ T4337] kmem_cache_alloc_trace+0x49/0x310 [ 2686.877586][ T4337] ? register_for_each_vma+0x372/0x890 [ 2686.883032][ T4337] ? vma_interval_tree_iter_next+0x263/0x280 [ 2686.889043][ T4337] register_for_each_vma+0x372/0x890 [ 2686.894312][ T4337] __uprobe_register+0x3f4/0x8a0 [ 2686.899270][ T4337] uprobe_register_refctr+0x29/0x40 [ 2686.904512][ T4337] probe_event_enable+0x2be/0x7d0 [ 2686.909576][ T4337] ? __uprobe_trace_func+0x430/0x430 [ 2686.914993][ T4337] trace_uprobe_register+0x88/0x410 [ 2686.920177][ T4337] perf_trace_event_init+0x34e/0x790 [ 2686.925482][ T4337] perf_uprobe_init+0xf5/0x140 [ 2686.930293][ T4337] perf_uprobe_event_init+0xde/0x140 [ 2686.935583][ T4337] perf_try_init_event+0x21a/0x400 [ 2686.940939][ T4337] perf_event_alloc+0xa60/0x1790 [ 2686.945888][ T4337] __se_sys_perf_event_open+0x5c7/0x27f0 [ 2686.951504][ T4337] ? vfs_write+0x50c/0x770 [ 2686.955908][ T4337] __x64_sys_perf_event_open+0x63/0x70 [ 2686.961365][ T4337] do_syscall_64+0x3d/0x90 [ 2686.966116][ T4337] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2686.972017][ T4337] RIP: 0033:0x4665e9 [ 2686.975951][ T4337] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2686.995704][ T4337] RSP: 002b:00007f94d1277188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2687.004103][ T4337] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665e9 [ 2687.012121][ T4337] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000180 [ 2687.020073][ T4337] RBP: 00007f94d12771d0 R08: 0000000000000000 R09: 0000000000000000 [ 2687.028067][ T4337] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2687.036017][ T4337] R13: 00007ffd30f9a9ef R14: 00007f94d1277300 R15: 0000000000022000 17:52:28 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c, 0x0, @perf_bp={&(0x7f0000000000), 0x300}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:52:28 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:52:28 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000002ff0001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:52:28 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10, 0x0, 0x3}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0}}], 0x2, 0x0) 17:52:28 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:52:28 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f00000000000fff0001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:52:28 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffff801, 0x0, @perf_bp={&(0x7f0000000000), 0xdc09}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = fork() perf_event_open(&(0x7f0000000200)={0x0, 0x80, 0x20, 0x5, 0x8, 0x0, 0x0, 0xffff, 0x1010, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1ff, 0x2, @perf_bp={&(0x7f0000000080), 0x1}, 0x401a8, 0x3, 0x9, 0x8, 0x7fffffff, 0x2, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x10, 0xffffffffffffffff, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) ppoll(&(0x7f00000001c0)=[{r4}], 0x1, 0x0, 0x0, 0x0) r5 = dup2(r4, r3) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x4, 0x810, r3, 0x22a47000) ioctl$sock_TIOCINQ(r5, 0x541b, &(0x7f00000000c0)) r6 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r6, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r7 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r7, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) ioctl$EVIOCGSW(r7, 0x8040451b, &(0x7f0000001540)) r8 = syz_open_dev$tty20(0xc, 0x4, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) ppoll(&(0x7f0000001480)=[{r8, 0x200}, {0xffffffffffffffff, 0xc255}, {r9, 0x208}, {0xffffffffffffffff, 0xa280}, {r6, 0x20}, {0xffffffffffffffff, 0x142}, {r1, 0x40}], 0x7, &(0x7f00000014c0)={0x0, 0x3938700}, &(0x7f0000001500)={[0x583]}, 0x8) mmap(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x7000000, 0x110, r0, 0x8a3fd000) 17:52:28 executing program 4 (fault-call:1 fault-nth:32): openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x300}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:52:28 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68, 0x0, @perf_bp={&(0x7f0000000000), 0x300}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:52:28 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:52:28 executing program 0: write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000100)={[{0x2d, 'pids'}, {0x2d, 'io'}]}, 0xa) r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=ANY=[@ANYBLOB="10000000000000000000000000000000100000000100"/32], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0}}], 0x2, 0x0) r1 = creat(&(0x7f0000000000)='.\x00', 0x76) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000040)={@private0, 0x9, 0x1, 0xff, 0x5, 0x4, 0x3}, 0x20) 17:52:28 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f0000000000feff0001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:52:28 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='macsec0\x00', 0x10) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0}}], 0x2, 0x0) [ 2687.459435][ T4366] FAULT_INJECTION: forcing a failure. [ 2687.459435][ T4366] name failslab, interval 1, probability 0, space 0, times 0 [ 2687.472093][ T4366] CPU: 0 PID: 4366 Comm: syz-executor.4 Tainted: G W 5.14.0-rc5-syzkaller #0 [ 2687.482239][ T4366] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2687.492390][ T4366] Call Trace: [ 2687.495661][ T4366] dump_stack_lvl+0xb7/0x103 [ 2687.500309][ T4366] dump_stack+0x11/0x1a [ 2687.504461][ T4366] should_fail+0x23c/0x250 [ 2687.508979][ T4366] __should_failslab+0x81/0x90 [ 2687.513741][ T4366] ? register_for_each_vma+0x372/0x890 [ 2687.519195][ T4366] should_failslab+0x5/0x20 [ 2687.523747][ T4366] kmem_cache_alloc_trace+0x49/0x310 [ 2687.529017][ T4366] ? register_for_each_vma+0x372/0x890 [ 2687.534552][ T4366] ? vma_interval_tree_iter_next+0x24c/0x280 [ 2687.540515][ T4366] register_for_each_vma+0x372/0x890 [ 2687.545841][ T4366] __uprobe_register+0x3f4/0x8a0 [ 2687.550756][ T4366] uprobe_register_refctr+0x29/0x40 [ 2687.555931][ T4366] probe_event_enable+0x2be/0x7d0 [ 2687.560990][ T4366] ? __uprobe_trace_func+0x430/0x430 [ 2687.566297][ T4366] trace_uprobe_register+0x88/0x410 [ 2687.571549][ T4366] perf_trace_event_init+0x34e/0x790 [ 2687.576831][ T4366] perf_uprobe_init+0xf5/0x140 [ 2687.581636][ T4366] perf_uprobe_event_init+0xde/0x140 [ 2687.587092][ T4366] perf_try_init_event+0x21a/0x400 [ 2687.592257][ T4366] perf_event_alloc+0xa60/0x1790 [ 2687.597195][ T4366] __se_sys_perf_event_open+0x5c7/0x27f0 [ 2687.602824][ T4366] ? vfs_write+0x50c/0x770 [ 2687.607296][ T4366] __x64_sys_perf_event_open+0x63/0x70 [ 2687.612844][ T4366] do_syscall_64+0x3d/0x90 [ 2687.617255][ T4366] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2687.623176][ T4366] RIP: 0033:0x4665e9 [ 2687.627119][ T4366] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2687.646819][ T4366] RSP: 002b:00007f94d1277188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a 17:52:28 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x900}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:52:28 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000017101000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 2687.655228][ T4366] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665e9 [ 2687.663197][ T4366] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000180 [ 2687.671162][ T4366] RBP: 00007f94d12771d0 R08: 0000000000000000 R09: 0000000000000000 [ 2687.679154][ T4366] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2687.687162][ T4366] R13: 00007ffd30f9a9ef R14: 00007f94d1277300 R15: 0000000000022000 17:52:28 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f0000000100)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0}}], 0x2, 0x0) sendto$inet6(r0, &(0x7f0000000200)="1b640af4d1062b785afff22cb079413cd2254abd9ac0e133c451b8bfb4cb6996222376ee1af2fa01ca06ac49915915f5936774bef57040e1fd7844514c00a8f06483f0b11bd459b0d927c5758af655cc7372a8d81dae698929a5ce2ac2b9259c679fbf382d12fb11e13a5e7eb6f3ed1c802008b8b4d4d203145747bf8154eb306591fd4e09e7a8e8904a7906126482d7a9d8a41b1ef9cf0b2dedc91073bd5babcac5481a9a81de77e783724a261f5898afb185227d55b5b23daa4e67de255ac93280e88c7402e7b01d29e96d21af67d18fa8c7fa1202b6b3d5f156309673b967994189ea7060775f3b78b2e33cd24fbb95f7", 0xf2, 0x24008004, &(0x7f0000000000)={0xa, 0x4e20, 0x80000000, @loopback, 0x4}, 0x1c) 17:52:28 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa00}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:52:28 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000002000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:52:29 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffff801, 0x0, @perf_config_ext={0x93d, 0xa22}, 0x0, 0xff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = fork() perf_event_open(&(0x7f0000000200)={0x0, 0x80, 0x20, 0x5, 0x8, 0x0, 0x0, 0xffff, 0x1010, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1ff, 0x2, @perf_bp={&(0x7f0000000080), 0x1}, 0x401a8, 0x3, 0x9, 0x8, 0x7fffffff, 0x2, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x10, 0xffffffffffffffff, 0x1) r3 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r3, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) preadv(r0, &(0x7f00000008c0)=[{&(0x7f00000000c0)=""/16, 0x10}, {&(0x7f0000000140)=""/42, 0x2a}, {&(0x7f0000000280)=""/165, 0xa5}, {&(0x7f0000000340)=""/219, 0xdb}, {&(0x7f0000000440)=""/252, 0xfc}, {&(0x7f0000000540)=""/155, 0x9b}, {&(0x7f0000000600)=""/246, 0xf6}, {&(0x7f0000000700)=""/49, 0x31}, {&(0x7f0000000740)=""/123, 0x7b}, {&(0x7f00000007c0)=""/212, 0xd4}], 0xa, 0x5, 0xc) r4 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r4, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) ioctl$EVIOCGSW(r4, 0x8040451b, &(0x7f0000001540)) r5 = syz_open_dev$tty20(0xc, 0x4, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) ppoll(&(0x7f0000001480)=[{r5, 0x200}, {0xffffffffffffffff, 0xc255}, {r6, 0x208}, {0xffffffffffffffff, 0xa280}, {r3, 0x20}, {0xffffffffffffffff, 0x142}, {r1, 0x40}], 0x7, &(0x7f00000014c0)={0x0, 0x3938700}, &(0x7f0000001500)={[0x583]}, 0x8) 17:52:29 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'veth1_to_bridge\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r0, 0x89f7, &(0x7f0000000140)={'sit0\x00', &(0x7f00000000c0)={'syztnl2\x00', r1, 0x16, 0xbc, 0x80, 0x6, 0x8, @dev={0xfe, 0x80, '\x00', 0x38}, @empty, 0x20, 0x20, 0x9, 0x4}}) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0xc4000, 0x0) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000180)={0x14, 0x0, 0x1, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r3, &(0x7f0000000380)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000200)={0x64, 0x0, 0x200, 0x70bd25, 0x25dfdbff, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x50, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}]}, 0x64}, 0x1, 0x0, 0x0, 0x4}, 0x250c8e04860779a5) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NL80211_CMD_DEAUTHENTICATE(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)={0x14, r5, 0xfeb, 0x0, 0x0, {{0x6b}, {@void, @void}}}, 0x14}}, 0x0) sendmsg$NL80211_CMD_RADAR_DETECT(r3, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000100)={&(0x7f0000000040)={0x2c, r5, 0x200, 0x70bd2a, 0x25dfdbfe, {{}, {@void, @void}}, [@NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0xf}, @NL80211_ATTR_CENTER_FREQ2={0x8, 0xa1, 0xcfc8}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x1e94505ef215050f}, 0x4000010) r6 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r6, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0}}], 0x2, 0x0) 17:52:29 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb00}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:52:29 executing program 4 (fault-call:1 fault-nth:33): openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x300}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:52:29 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000017102000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:52:29 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c, 0x0, @perf_bp={&(0x7f0000000000), 0x300}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2688.683120][ T4410] FAULT_INJECTION: forcing a failure. [ 2688.683120][ T4410] name failslab, interval 1, probability 0, space 0, times 0 [ 2688.695772][ T4410] CPU: 1 PID: 4410 Comm: syz-executor.4 Tainted: G W 5.14.0-rc5-syzkaller #0 [ 2688.705838][ T4410] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2688.715914][ T4410] Call Trace: [ 2688.719187][ T4410] dump_stack_lvl+0xb7/0x103 [ 2688.723780][ T4410] dump_stack+0x11/0x1a [ 2688.728037][ T4410] should_fail+0x23c/0x250 17:52:29 executing program 0: r0 = socket$inet6(0xa, 0x800, 0x400) connect$inet6(r0, &(0x7f0000000500)={0xa, 0x4e22, 0x5, @private1, 0x100}, 0x1c) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000580)={0x401, {{0xa, 0x4e22, 0x7fffffff, @local, 0x1}}}, 0x88) r1 = accept4(r0, &(0x7f0000000440)=@rc={0x1f, @none}, &(0x7f00000004c0)=0x80, 0x800) r2 = socket$inet6(0xa, 0x3, 0x2) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) preadv(r3, &(0x7f0000000400)=[{&(0x7f0000000200)=""/213, 0x74}, {&(0x7f0000000540)=""/20, 0x10}, {&(0x7f0000000100)=""/194, 0xc2}, {&(0x7f0000000340)=""/178, 0xb2}], 0x4, 0x401, 0xfffffffd) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e21, 0x7, @empty, 0xfffffffa}, 0x1c) sendmmsg(r2, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @mcast1}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=ANY=[@ANYBLOB="7ae99f0f0000000000000000001d0000"], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @multicast1}, 0x80, 0x0}}], 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e23, 0x80, @mcast2, 0xe5}, 0x1c) [ 2688.732466][ T4410] __should_failslab+0x81/0x90 [ 2688.737459][ T4410] ? register_for_each_vma+0x372/0x890 [ 2688.742918][ T4410] should_failslab+0x5/0x20 [ 2688.747422][ T4410] kmem_cache_alloc_trace+0x49/0x310 [ 2688.752754][ T4410] ? register_for_each_vma+0x372/0x890 [ 2688.758254][ T4410] ? vma_interval_tree_iter_next+0x263/0x280 [ 2688.764239][ T4410] register_for_each_vma+0x372/0x890 [ 2688.769534][ T4410] __uprobe_register+0x3f4/0x8a0 [ 2688.774461][ T4410] uprobe_register_refctr+0x29/0x40 [ 2688.779655][ T4410] probe_event_enable+0x2be/0x7d0 [ 2688.784747][ T4410] ? __uprobe_trace_func+0x430/0x430 [ 2688.790023][ T4410] trace_uprobe_register+0x88/0x410 [ 2688.795250][ T4410] perf_trace_event_init+0x34e/0x790 [ 2688.800522][ T4410] perf_uprobe_init+0xf5/0x140 [ 2688.805712][ T4410] perf_uprobe_event_init+0xde/0x140 [ 2688.811015][ T4410] perf_try_init_event+0x21a/0x400 [ 2688.816120][ T4410] perf_event_alloc+0xa60/0x1790 [ 2688.821043][ T4410] __se_sys_perf_event_open+0x5c7/0x27f0 [ 2688.826676][ T4410] ? vfs_write+0x50c/0x770 [ 2688.831156][ T4410] __x64_sys_perf_event_open+0x63/0x70 [ 2688.836770][ T4410] do_syscall_64+0x3d/0x90 [ 2688.841180][ T4410] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2688.847054][ T4410] RIP: 0033:0x4665e9 [ 2688.851133][ T4410] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2688.870723][ T4410] RSP: 002b:00007f94d1277188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a 17:52:30 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000003000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:52:30 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc00}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2688.879182][ T4410] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665e9 [ 2688.887177][ T4410] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000180 [ 2688.895136][ T4410] RBP: 00007f94d12771d0 R08: 0000000000000000 R09: 0000000000000000 [ 2688.903085][ T4410] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2688.911142][ T4410] R13: 00007ffd30f9a9ef R14: 00007f94d1277300 R15: 0000000000022000 17:52:30 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffff801, 0x0, @perf_bp={&(0x7f0000000000), 0xdc09}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = fork() perf_event_open(&(0x7f0000000200)={0x0, 0x80, 0x20, 0x5, 0x8, 0x0, 0x0, 0xffff, 0x1010, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1ff, 0x2, @perf_bp={&(0x7f0000000080), 0x1}, 0x401a8, 0x3, 0x9, 0x8, 0x7fffffff, 0x2, 0x2, 0x0, 0x7, 0x0, 0x3}, r1, 0x10, 0xffffffffffffffff, 0x1) r2 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r2, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r3 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0x20, 0x1, 0x2, 0x7, 0x0, 0x7f, 0x20, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xff, 0x4, @perf_bp={&(0x7f00000000c0), 0xa}, 0x1000, 0x1, 0x4d4, 0x9, 0x8, 0x1, 0x5, 0x0, 0x0, 0x0, 0x1}, r1, 0x6, 0xffffffffffffffff, 0x1) ioctl$EVIOCSKEYCODE_V2(r3, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) ioctl$EVIOCGSW(r3, 0x8040451b, &(0x7f0000001540)) r4 = syz_open_dev$tty20(0xc, 0x4, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) ppoll(&(0x7f0000001480)=[{r4, 0x200}, {0xffffffffffffffff, 0xc255}, {r5, 0x208}, {0xffffffffffffffff, 0xa280}, {r2, 0x20}, {0xffffffffffffffff, 0x142}, {r0, 0x40}], 0x7, &(0x7f00000014c0)={0x0, 0x3938700}, &(0x7f0000001500)={[0x583]}, 0x8) 17:52:30 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd00}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:52:30 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10, 0x115}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0}}], 0x2, 0x0) 17:52:30 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000017103000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:52:30 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000004000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:52:30 executing program 0: socket$inet6(0xa, 0x3, 0x2) 17:52:30 executing program 4 (fault-call:1 fault-nth:34): openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x300}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:52:30 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe00}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2689.316447][ T4459] FAULT_INJECTION: forcing a failure. [ 2689.316447][ T4459] name failslab, interval 1, probability 0, space 0, times 0 [ 2689.329128][ T4459] CPU: 0 PID: 4459 Comm: syz-executor.4 Tainted: G W 5.14.0-rc5-syzkaller #0 [ 2689.339189][ T4459] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2689.349292][ T4459] Call Trace: [ 2689.352558][ T4459] dump_stack_lvl+0xb7/0x103 [ 2689.357194][ T4459] dump_stack+0x11/0x1a [ 2689.361327][ T4459] should_fail+0x23c/0x250 [ 2689.365731][ T4459] __should_failslab+0x81/0x90 [ 2689.370490][ T4459] ? register_for_each_vma+0x372/0x890 [ 2689.375946][ T4459] should_failslab+0x5/0x20 [ 2689.380431][ T4459] kmem_cache_alloc_trace+0x49/0x310 [ 2689.385755][ T4459] ? register_for_each_vma+0x372/0x890 [ 2689.391209][ T4459] ? vma_interval_tree_iter_next+0x263/0x280 [ 2689.397249][ T4459] register_for_each_vma+0x372/0x890 [ 2689.402528][ T4459] __uprobe_register+0x3f4/0x8a0 [ 2689.407462][ T4459] uprobe_register_refctr+0x29/0x40 [ 2689.412712][ T4459] probe_event_enable+0x2be/0x7d0 [ 2689.417824][ T4459] ? __uprobe_trace_func+0x430/0x430 [ 2689.423410][ T4459] trace_uprobe_register+0x88/0x410 [ 2689.428612][ T4459] perf_trace_event_init+0x34e/0x790 [ 2689.433898][ T4459] perf_uprobe_init+0xf5/0x140 [ 2689.438690][ T4459] perf_uprobe_event_init+0xde/0x140 [ 2689.443972][ T4459] perf_try_init_event+0x21a/0x400 [ 2689.449067][ T4459] perf_event_alloc+0xa60/0x1790 [ 2689.454015][ T4459] __se_sys_perf_event_open+0x5c7/0x27f0 [ 2689.459650][ T4459] ? vfs_write+0x50c/0x770 [ 2689.464096][ T4459] __x64_sys_perf_event_open+0x63/0x70 [ 2689.469551][ T4459] do_syscall_64+0x3d/0x90 [ 2689.473961][ T4459] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2689.479840][ T4459] RIP: 0033:0x4665e9 [ 2689.483743][ T4459] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2689.503348][ T4459] RSP: 002b:00007f94d1277188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2689.511741][ T4459] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665e9 [ 2689.519771][ T4459] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000180 [ 2689.527737][ T4459] RBP: 00007f94d12771d0 R08: 0000000000000000 R09: 0000000000000000 [ 2689.535729][ T4459] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2689.543764][ T4459] R13: 00007ffd30f9a9ef R14: 00007f94d1277300 R15: 0000000000022000 17:52:30 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x74, 0x0, @perf_bp={&(0x7f0000000000), 0x300}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:52:30 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000017104000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:52:30 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0}}], 0x2, 0x0) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') 17:52:30 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1100}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:52:30 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffff801, 0x0, @perf_bp={&(0x7f0000000000), 0xdc09}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = fork() perf_event_open(&(0x7f0000000200)={0x0, 0x80, 0x20, 0x5, 0x4, 0x0, 0x0, 0xffff, 0x1010, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1ff, 0x2, @perf_config_ext={0x5, 0xfffffffffffffffa}, 0x401a8, 0xffffffffffffffff, 0x9, 0x5, 0x7fffffff, 0x2, 0x2, 0x0, 0x7, 0x0, 0x3}, r1, 0x10, 0xffffffffffffffff, 0x1) r2 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r2, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r3 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r3, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) ioctl$EVIOCGSW(r3, 0x8040451b, &(0x7f0000001540)) r4 = syz_open_dev$tty20(0xc, 0x4, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r7, &(0x7f00000bd000), 0x318, 0x0) ppoll(&(0x7f00000001c0)=[{r7}], 0x1, 0x0, 0x0, 0x0) dup2(r7, r6) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000080)=0x2) ppoll(&(0x7f0000001480)=[{r4, 0x200}, {0xffffffffffffffff, 0xc255}, {r5, 0x208}, {0xffffffffffffffff, 0x180}, {r2, 0x20}, {0xffffffffffffffff, 0x142}, {r6, 0x40}], 0x7, &(0x7f00000014c0), &(0x7f0000001500), 0x8) 17:52:30 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000005000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:52:30 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000000)={{{@in=@remote, @in=@initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e24, 0x5, 0x4e22, 0x7, 0xa, 0xa0, 0x0, 0x1, 0x0, r2}, {0x80000001, 0x7, 0x9, 0x6, 0xfff, 0x2, 0x100000001, 0x800}, {0x1, 0x4, 0xffffffff80000001, 0x20}, 0x3, 0x6e6bb8, 0x2, 0x1, 0x4, 0x3}, {{@in=@multicast2, 0x4d3, 0xff}, 0xa, @in=@loopback, 0x3507, 0x2, 0x0, 0x7, 0x5, 0x0, 0x100}}, 0xe8) sendmmsg(r0, &(0x7f00000089c0), 0x0, 0x4004) 17:52:30 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1200}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:52:30 executing program 4 (fault-call:1 fault-nth:35): openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x300}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:52:30 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:52:31 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2700}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:52:31 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0}}], 0x2, 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x9, &(0x7f0000001980)={@private0, 0x0}, &(0x7f00000019c0)=0x14) sendmmsg(r0, &(0x7f00000042c0)=[{{&(0x7f0000000540)=@can, 0x80, &(0x7f0000000600)=[{&(0x7f00000005c0)="116bbc4813c9faa164b2f2", 0xb}], 0x1, &(0x7f0000000640)=[{0x100, 0x6, 0x6, "f4e88aae24386021752e3be41ebd79636b03547adc9b6a09bd1769773905d57787f41a737794bf757d5850752f2ecf851d0f05388a4ec96465f8f32855f603029d0e480a884fdf9a3e50b1af45939d82ab79ddc4ed70514a102436232656bce02ca2b78c78cc198ea842701e98fa24c1ae6942f1e3c61aff08ae5e37433da81a217acd905696c3a59305bb1e9a2d7c2c2512bf8c4f15d85f472a45d84f4ccf2c34a992a830e54edda614975641dd8046756b65e683c7f643fec9fc0790f388579d7e01f37201ae0830dfab794f7550a7aa369df45377ee192850782c20b8deac0a9f29b0a9ed19e41b5346a8f6b9295f"}, {0x90, 0x113, 0x2, "45d5aa94d9cee5ff6017715b402d3f4e9cee0f808a482d35a9a12b2b2f38512c490359e52f6db1a00742fe668e934e7e54a79265a8939aba56606155746627c3798dc16789b8b3994f233d38447abc02743b8e075328929be2512b8c09940b48f1e0e6604f2b16eb1e5b10fece09b10f628daa8856dd89e30c67dfd9e44301e2"}, {0x70, 0x0, 0x0, "1d34857318425df53bf91df3ef41804d3a27ccedbb2d30c07894065673f4fab097d832eda4ac8b873879f207ed58f2458b22683c83edcd4a8d6b00c455f863138043e049c6669ab81167938e953fd638c0b79075d76162465401f5"}, {0x88, 0x101, 0x5ebb, "b14c9380322862f7bc32b0e8e4b1a8c07667cbf230ce96a94f72d9dcc57ecb02b4dd9112e2b6940e84e00f1df3f84259ed7c4f9d26895396c4b0cb1095ae3338ccdd6afc4d52e41d9f319d443331018c6b6cab61556078ec1b6185d1e40b8c57bb08ee6ba56e93074fd67983637e87dd9ef848101c4a"}], 0x288}}, {{&(0x7f0000000900)=@l2tp6={0xa, 0x0, 0x101, @empty, 0xff, 0x2}, 0x80, &(0x7f0000000c80)=[{&(0x7f0000000980)="ded1a35684fc9e4f619b5257ba5e1d2018b220230ba9e699ea6b0c6bb2ec3ffcba01384c089c1ac10b3e6cdc76531516b2d051b9e721e9234212dad0b2def55a1fa9a4e46a12a5b0117ff40c6545b12dae2e97ea47da9b42e9f7249dddf5b981b40862d02dcf845d237b927ffd74d12e1a16e03cc4f66ee626f6f51a607646dd803d12da59484599d9c57f3bf38540bcdc375716525da09271a3d9cd0fbe8a0c7a1014d62896bd8c11efc96c47b7aa9526853b1bdcca84ded91b88c2ceeb1678e70926fefcd236834cf18bdc27bbb6cbaba709320290c4fcd70517b9b6203089ededccbde0ee477c15c71f518e0868e6257ebabd7532b8c4ffab0c4a86f5ce", 0xff}, {&(0x7f0000000a80)="36ac6461850e560b75c319013b139a992804b8d97004762514e01921e8d6d3b102436043ee6056ede048f9ba3f678e56e3897795a6aecc542f4dc3d6a2402c9deeaccae5eff3d45275687b3a35d2e302b60cc443f6e8b2f30a24", 0x5a}, {&(0x7f0000000b00)="554898aff3077c600f5b2c551ad9d712ac71f689b00a549b721850ab53f8917a28a20f1090d39d285b8bd3827c52da694ecad92f57667bb1821cc692cac85e", 0x3f}, {&(0x7f0000000b40)="d59b6b97953de958d73d91de765218a1bae6", 0x12}, {&(0x7f0000000b80)="26336473520fc149acaeb6d6fb1cb064aa518e1a2cb2388037aaf8193289f5b805e76c31a3349c9e2281bddb76a0dc51029dd99d84e2bb6bfec19cd0a360cb64cf579a09c061ab7c84b8844c070d533ae384d4945a3f8252d238cac2ad1bc9039323538a3c774f856ee675eff9a0f1d33bf5d65b31a137d42ad6427920954bb01968e3ba6b672698b28878aaa0ea130342267113813feb239a5d6f9703e9a345ed7c14f0da10fafb3913a387593a0862925783044bc4827820580868bcba9ded154b7b6797080618d3cdaea943924d2516a6b0842d21a60da82df8f3c8f7b2bc", 0xe0}], 0x5}}, {{&(0x7f0000000d00)=@sco={0x1f, @none}, 0x80, &(0x7f0000001000)=[{&(0x7f0000000d80)="6fbe9a6a0b2cc30110d3f80f798b3533aac0e24632d827e17d751b8797f80721048a131b1c3d49aef7f34f839377c6c49613bf131e4ad04883358d297f5db8e80bf48bd23b51deacec6c96badd5bffb915f2c9fd7ce47340b26a93a1457878d1b1a6cbf689f1e146637507185611aa3ebf68e4d8d819bd9f5c56292b99cbb942f0c0a9ed0087df15df6763320650198e7f22fc30b5d012fbed14e7c1675e17c30e360184932d2f30030cfa6f8e7fd8063267161cccc742d27d5d0834b9f00fb7a543674b285344878ab3f312350fd4accb8c11147967097d97e564e66b4ff30a0aab1dfe8c4e6c385bb091c3468062249133ba27f3d3e2fa", 0xf8}, {&(0x7f0000000e80)="f8494ed5cae69f93dda1af95bee2ce1f6e901a188aae7b82dd60f4deb60b352ef84fced4cee29dc75ea641335336984ff29a446afeabb49568b78e559a5a4aebe1febb19d6d427e65c3c7ad6a4cb00876792ce289117635b0683be6ea53fb634f541e36ed55481895f3b653d4b7d44480af35e1932b8fe3eac1cbc555598733750c504c78039dc1848822aa7d7cc0e8fa96243c3d3747ab661f3e7f411b813040255880ef4051ffe4e3352aaaf7fcfd053c029fbe8676e026554eac738f064b776f34703250e3fbb5100509cd62cbde05a06f2bad264c00d6bde4ca7cfc3020378801b84c4a66c7de44f6f3d64ae381c", 0xf0}, {&(0x7f0000000f80)="916c2ba0f7cd18f43226a4c2d62a75cff80cc47c46be691a45f67c1fbd1493a6bd6cced042d9cb1dc48598f3c81ba8a3bda0e4e983e470b877e302d0b7a718a8d6", 0x41}], 0x3, &(0x7f0000001040)=[{0x28, 0x100, 0x13761ac5, "413d01ba7e5e3fd9c77bf1f88a2bb30d9fccd9"}, {0xc8, 0x6, 0x36, "cd673346bf7f7837c6ae817616189537c7bc376246bbc198cbe003fb7f1dbdcc195ae9666b4d48e8f7cac88cc95d94f8ef379353732b0c59380f071b2bcfc8ff4cf2b2d194e07e4fcee15e554123e6ce1c7a33a7935d19137115cb38fbac8f33658b5736312baef87d0e879e85c38df217946abdf0f92d55e87925c034ab930dae0df3bd618636273509c999aa03e6a39c33b5626a2a7996fa84982805a0a32c248afa472535329e3265a94ed52a74db9913"}, {0x40, 0x3a, 0xffff, "f5fdfc4b7a350fc867b622f70cb2e1e7a79bc704e129174b7c01e6e8288c8446fb64f58e61591fabb8743b4760"}, {0xe0, 0x116, 0x1, "0b676eebe9b5a57512d18f2e5b11fdcab4a630167d5544f9b65d956dfd6bb57d53108b66246df92ad15235d1e93e01c59733caf586e2629e857b552cb269f73e2b94c1cadd2fac43332306cfb02176d396b2440fc5cc2a95a4702e58e071f310a1621e6574e46ab4abcddf8248ad8bc99ee54843124f1fbf9fa63a9abe1295bc08bcfe4bbde994a8254a6fa1f5e7cf1a993a298a91d78daf22e4f2d0865f12eafa49e9baae93116c0ea5927975c27f159aea1426acac74e36a302c99632282188034df5a69bf75c323bd"}, {0xc0, 0x10b, 0xff, "41f6f5abda4d6b89dee348e5a1c7648879dd81df74b3bb3607cdda22a677b5e03551008dbace0fd357d53e69cc07e104ccc46bef0b74991837ffbed482178fa755895e96b600e6d3f5009b6b4d48be5491ce96f1130a5eba07a0bbf37852ce17813a68d30cb32f2818c841892c54203aef016a5e1e72d49aa63f3e86645de5a3c7fcf5018b391670a0ef0b5d61c685dce5c0cc6b2d66bb272cb4a96d422160f4022881c428c8e8b3fad4b295af11"}], 0x2d0}}, {{&(0x7f0000001340)=@nfc_llcp={0x27, 0x0, 0x0, 0x3, 0x2, 0x80, "fa747e3f5f267719bc2bfd6b5fb4f3a940a09f7331e9b0a6ee2d0e18f89cc4326f01d682c49756531baf6e69ad051a9d6b08d1d2ca95b7195a158f8645ce1f", 0xf}, 0x80, &(0x7f0000001540)=[{&(0x7f00000013c0)="7a436939f069291c0aa6696ffae16b3a6c0d874fc68b0ba92c9aa0407afc97aa5a91e1d1aa40677cfa865b39843e676f8cc3d2ac94df31827e5c93027a1ce2bd67518e44557035797632b817eb88d2531dbdd9607b5a9b", 0x57}, {&(0x7f0000001440)="c99a148847c480b5c474b416d49c3413d972243b64b1a7ad724e138a19dace852fe64b143b54953b73df1bcad59b1d62d92ad171a480c435d3668f5a1ed47ab6961107e97891087c8b36f3327a312e0dbb9037e5706937d70aa935132cec80ae41ed43ea5d5e00ae77e1540b689fe5ac9840976a295e8d1cd1d3995e5eeb6e7ff679963c708c13565b0bebe3f10fa7111c83a9ec10236c6cb46aeeaf4690524074c07c8733f450b911d6a5ac74d50c8c6264eec1c1afa063fe18cd01d637c29c1fde327af70524803333fc3a", 0xcc}], 0x2, &(0x7f0000001580)=[{0xa8, 0x10f, 0x7fff, "1f038b3a9b80130d63a6b9ab9149ec5bd5d5262d58a9ff8b59002ba30819f3cdce4eb758ebe5744df356ac75c3358f40b0ac9c56f09bd96e6b5d862d4dbca67881db408b4088728b5b3b23862ac401f668147770848616ba4014d6c0e3843133ad996c8d306c38e5d91260743c87a17d119486a88769c53920b2b91b35d0ab70e334e5904d7f8f2ade24afef9b35ef4dfc"}, {0x78, 0x116, 0x2, "bb6174fcbd3acb350a12125367c41ed3cbd03d31c79c86dfb09647de2c91102222c3682be79897a99e86df0ab5e68e256338721a53a80bee028f62e84944d49d5c6c41f1a9a021f3156cb2d97dabedbf1b0018f1c10ea175abf386d08521a8051d1d1df8666c3b45"}, {0xa0, 0x109, 0x6, "3e06e9fc27d45e0431382d6879363ff06068b10efd6fb80ce859d640b07a6e0c42095df6ea585dc25be055b82dc2bafc13fb1a4c5ad836f63115d50516b7180f1e67e6e0fed5c7e7790cb1f2cbc7e758d659e027eb93d3048601329dfe7c284f28d9a269260f9f454758c0b72d2f1e4d9d02fc19d9cb5371227e4d81e4336fdfa985c2447f68f869c0a4cb8f"}, {0xf0, 0x84, 0x9, "a71df2346c99376ea42f408fc693d5e897e43de4c50c44e3089e36cd8be670009546a74fc8a522189fadf95b5d62cac5b7591616ef264fc5fc6ee1a82e7f958c9d437da6d2a7a3d44bd34e96fd123f079fadac4944a7097bdbecd3b24f20fa0ff5a16c1d0cf5adbc5b792808db587be3571421997668a219f035f72db52f8d7a14d3c4aebf615cc9ef51c7051526e309fb1b70d71b97ef51dd6c240f0a332eacf57da18e5b4cbe5243ed3010358ac134326afa9412ea1df5f1045aaf86ea6c387147fb877057ac76593045322fb64e19ec7d03125a32c8a1854142f6a7"}, {0x108, 0x3a, 0x401, "53ddddb2a8b52fbcee4a90e9ab0712802c8522079d850ba981dc4bff06b216f62163e0b18fdd47622e33ac758170f8522860743c5f006318041c23bed76cb8208f40b4de206d1888ff0ce16f7b5e3d4d6f59693e91475a1236e940f414d53f61325e2ea43da18398869bdc89ab105f36bfcf0cd0c8474a19b201130e637bd44b191d9b4ed6ffaba63c8099ae1c18d07fc4a410a172021a69361ed780058d065163504bd6c11e8f0a77bb0ef293feb936314371a63719f875aef4ee8209560a52f65ee61daca9daa07b4d26af0451dc6f60e5977d71d0b9d222f45213bf6e9e81300a43acaebeca3da28029efea8eeb67b999f7"}, {0x20, 0x100, 0x4, "ac37aec74b9fed92497d41"}], 0x3d8}}, {{&(0x7f0000001a00)=@ll={0x11, 0x16, r1, 0x1, 0x1, 0x6, @multicast}, 0x80, &(0x7f0000001b80)=[{&(0x7f0000001a80)="6e9fa8605ddcdaeb068b06bd913ccdb7ecc089aa7d596254afce1df7f51caebefa40c4d2dbb4d084e031a24b7ad9947b1b49a18aba0875c11ab48e774f96a0a6b0df2e5797c61f5246837382e6a981bed795f24d8c493ed135b77e781f01736b38b973", 0x63}, {&(0x7f0000002700)="fdd0ca8a75330b7ecb6b4ebbd3881d8db695684a8c85c84083e63eb9a622f839968b8431f625a8ae0718bc9e7c0d98591b5dc0ad559869c1eff95427cdf4bc6bbbb5d85fd3795ec0723929d39d0150408a4bb47e3d2fbfaf1d2436212297abf170425d8aa4d3d756d21c3f3efae2e4c15b0ccb1c0cd0188482eb41b3562182160bb3f554247b4f19566f3de494eeaafee5ea4227cab4ffaafa56b60f2e4efc8998121583da8971a9f3fde3692462f5a8f33f8efadee39b44e483e7a8afd43a67046a662ffaa319fcba33c9a3c2a11edabb839ad753052c2b6872c37e77d5372f89e6b96cddefeb8cf5a00ac9e44b7a569e8c0b6613b337c4caeed75f94fe2efcc49d0e8327d7e15e92bac64bf05dc04223d3102bbcd361b0bc6cefe6426f64a739c6f49e095c919908cb31586ca835069c1160d04a14c0f68407c362dbfda64775332d3f71f9a80a34f113be5deccc3c7148bb2ac223c4348290c9334b591043d48905ebb080a065e6361cacd017852dfac64caf8002baf4027bf6dfba470993c5ace83a7cf16895f552a414d54b7495d6795177842ebefcc815397b86141799e873d6aae064ab40d6205ddce305284e95444ac34a25295e3c3c7a25c08a714221cc5e2e012cdbc551656f0d96b3f4d067678a87cf8d101c022d7fbcc6502e5ca6891d09a4ce4a34c88b240e67a63b81a3877f00e7dff2c8f06440b22a41275541a4171223a5f0047cb6af610912579150746b2c7a1cf48f1c8cfb8a1ecb1291c70405b27737acf62cd7b69071fd77da68537a831559f23140b9ab60af036f5559e295d35330bd42b55b9cb5b06746e518abeaabb891fa1b766caa873eaafbca0d3bd3315dcea28f9fd04c9dbc68e6c6d83cd3917078c1244c25f0c3cec8501cb97ff843d528b0c10dbf1972ec53a024f0865a3dd2e5b3578e4a79720991b62f4aaed825f0e2ef3135f1e8d77dd754a1e59cf213d9a014c9640d4280738ff69890f2ceee96217bfc7a7b7b7508a44ccc4fece86afe19b05eb09318c62e18caff835cbbae031fa7668b401113aa704f1446e8b1e8bea478448b7e9a525d6330d394b80a598a5989e5c6d3ce65151fea1b94d09ff5f6bee9d588645f5e3544795cfbb6a366cf9319afc3e630bd2b3ca6cd1461db58b8a4621569ef562e65a92c01c022c0587200e5e8d24a828fab2a590de16549a8878af588318dba31b3df630b83272e128399f08dd63cb89be4ffed1e9d1d679004bf7e5efc8eb68e0c20101f8dcddbddee0212caf07d7d5c6b03ceec2e19504257961f34c8d022f46f939a16581ec6cb377bf0e749a108d75ed5ce277806d99b49b51671c2ff2533318d1a292bea87a2947a06fa0081b91297f9bdf15fdda24ff051167e77715b35bc113812793727655c66aea6b155a7ee11a2aea079d5d340dcc21b6f7bc5bb9828c20a38881d92924c69e54f65e95b7e5885b2c617de7b557fb3b7c52240f88ef086620be8f2fea022d2843b3af871f5122a14e0c3853e73f3dfb01bdc42a2f60e5a984c56316b802702d92ba18dfebdd5a02bd0883f22a83764c9d54d13fdacd1d37f9bb2f9776c4d788f723ee0eec4430b71b37fef53a82e78290d1ad2c6d666f691b422a2cfdfc7b1b6ab36b31f278b84fb78730751f136e03452839bde2d60db5927cfc3eda37315d8d5906585d35cb678b2c143ca7e5c32976654f42847825a9fdc634b37366aeb44b6410e9ce29c1754f366fe7cf81a569f5220f04587dae815767157207777a112233e91e448895d352998d375fa4b0fbe3df02ac7b080c8d2f94f52fbc422ccf45061649d386f7d63efd57a306c326132495ca76acf0d4f1e43b8e6cc1277fab032419eb600333c53b1f8d05dfdbad33034ce53bea00edc29983d7f3342929b463b5bee554d675d6edf35081a29249f4764aa3be05b210573bf889399ad01c04a8fa81b7812ccbbee146b51ef6e2b374d17d69d3e2408bc676c6a2355233c4827ecf34a90f2120cc4a516fefb87832ac71f9a8ce184d0b885bc9b3460c3f21bc9069d052b8957b9e83b8c186b752e699d09624b9739b3c0c1fcd9ef554e184dbf6ea20c8f0d476f783df9cbdc3cf6e8494145f89da902ac37e1c141db6afa2d208fd09d4cb18ba9d54390c199770d97d6dbf4618653db23748e475e9fac753bf707def90226864ff04a0028ee447a393eb6508797cec589a68eda5d1cc5e6385b33cb15b901c8ca407d205a35bd638d7927a39cd473116b4ecde82036b964697ae1897542cf43bc7ca36e11bf1005ad0bc20016867d0f7195f6fcc79a679309eeac4e05ba38e1d3cc8b9e04e81861b9866cd0a1aa69992ec7d6076af21240af72880f4893514e1d9d2bf2a8964903ec63042f96419e4cab591bd7817e228a5c5668ad984ab625fc880efbbedc9727bbf1161a9ab2fc5dd7559b340485b9edbddbdbe9500fda45247341eb2d9884c6425ada4069e3f504d8249be0c9aaa4eeac947ff46420292dfe25abe91232114b2e80a32baecbac8ce4d0a4077e650d8de56c66417934e30a54d535d112ddfcde0da14bfc07408580252b5495385f582fbff07fc5ec6934e61a7d0c8d5655371b868b7c23109d94eade41b2d540d2ad5f76b1b8b987e45dd04794e7a15e1a81c922a66a0c5126c39715b6cbf569d5e2dcf9fe6c269e4ef6fb73616a712d34ccc8c6534b54b8d4c887ff1784716b175f1311ebc70b86a1dda5ece0c0a76467ace671e441dccee9a12d78b5daaa26eb29e44a28bff285e3a9fcbb8b8e23f1aaa2c2d2c100a48df46bbc99bb11a1956bde58724b993293ad7eb84bebc1ec2372b1f03ad4b27928751797ac90de644050d5ccee2e4d25d15cf502c87e3a99db512ecfb5cc2e0cd5e9f1e1b3bac0df49d5252d14351da956382366751f5dbd73f393762aefcfb1d8b3e7a3cc50af252660f5499e7b44588b1488f4f963251f727455417900357862956ce01dfb3e4e68c150643b155c196fc1283dbf22d1746fb8df453552a51940dbbf8044d5dc46400a90bcc02a84630f77ac12885fb6f4e3ad4f1c1bb04ef3be6c1480a1023bc78df31a0524f91e600eba9d92c87d37dfa7297bed8c398e63dff9b348f3bac9e0dd1ecc1560536eb71e9d2d5eaa1b23eb6936f0d7ef0c29d57903f31a91b28856bd583eacb17e10055ec6d63f88245a158aadcd97dede1b3bdcfc46ad8022f22bdf36b36163c2e4fb0c79c33534d88387fb8a54c12ff25ee46770a9a15ce356bb17fedb8b251d79c7568c0eed6ac1b67fbce1fde01e2b50b85b5395fabb105362422ce1505206d820c0b2f80b170d3bdcbeaa2737a379bcae3b811860199443eeca166202d5f9f599988cc36a06c9e551807a0c7fe4df410be51c4d0c0e642950da7c45c5b19b941f4e23e514567aa7ee233de99d5e0c268ca494f8d23edcf5ee533bdd0f0c9a753b5cf3522efdad8f921dc50fa191a01c2efda3a47bd47a5378b15488f29e45f316483ccafbddda5b27fa5ee7efbbca60bfdde135421475118cc14c13e9d55c33c72470fe667cfc23b68a8a2104fffcd3c8da264dd6560d96c52deac0de82a6eaa2ddbaa1338d40ca57938b1c2545a59eb2e4aea73cea0e82a972256f9ee9eee4e3c7106c642deb064766bac0ad4c25c207bcc149a7a97b634bea9a39702cb85de365da0be1e57dfd77d5f41d1b25057f0195d84aa59cf5727c2c93771566f19e8d0a3184e1de532e1f3ff8e618cf0405cb838a6d7624c7a82e27a5a820b4028897430883c22c6c219c436df370b4814d6cd335c7b26405a0ce4e19868819a264b2a12c89f13563fb6863a97c570f4113d8d1c8d3702a3cfbf8536d294ab7edba8cef25e1649ea5efc2309199bd44445e33f108bd0fd1b9209c318b1ba819402d6f378af4bda2cb6af43a11682e992450f23338f09f68b8c4b1a9a59045fd1d5ce18378b915548eec3deea8d74d17110ac99c900295ed5620a7755fa17c79b45cbd50110d51580ef9ecdf62fc5faa13c45ee7ba2bfe17b642c4a0a466712c5c2b20cd9201d1cb0391eef8b731184e48f33adfab888b03d8a9dcad885580de0a008c7b590d7e7d207c6e078054a607c5d505fdb3d2e0c4350e451d1a830b3649cc5b579177d738da4665102486c64b04bae4ead8033ed27fce64c824be46768da10e1fcb41debfa0e15e7876512a01d5509f33ba8ca2867951c67ec6ac515104dbac649533da390f8d7c735fec0e2af8f89fa93d32efc8c7f5c93f76564b59d963ac57d71c138978a744da1b2879b440cdd204305c329998b9bd30172075c90f60ace58667ee4df84ae176b84721e5194c5a8528f48d90a7069e92779a76920a275205668cdf70497d1b065d4e5d46d974399e855422c7699bba38f34cd2bbdedae9cee521a7fb3b6ccc4ec2a8656dff2506471b6957df62c9bfd8b996b3be38ebd0f481de15ccce2f3c67caae9b257dbce43a2295f88c00c9ee94761f3e95eca89d166a1800ccca7d75ffdec8d030f850881da03921539b2630ff4994b37fa9e820bef6bae9bcd0f7a359e640e44bf68e36e76971ded3321d0ef1ef8bb71b9f635ad0b89b6bf5b49890bf64de7b5556cf5e36d20b57a1e23eb4221b80a111b28f3ca82c005e5cea64393732e60acda74537e21e8981182946f65d60a3421c18f36efe8d22929595001d67ac6f2fb6dde83275b9f7912b49f19e4fa003fe0f9fa63c80668c92337f69362f2c34dfbaf13e185ac3765d9891e6afa72105689e7449abc49243f7ed315dd5cba122e6f60bd00e22bf858a5fbfec1572df07a583cae1a87e0130bde6cb9fb867b006adc4c9028761f716cc6ced75a49c09462750823a0df64773ed0786eca95190d5ca515a4b8f5841682fb60e8f1d196650f42d5c191e1b1e720524e58a1ee83062e3fb72e4c7cb4781bec165aca52caf671fee4b820a90f5e7eefe4fa1248f4696937cf1a5610ea3995fa104fab6ab437014c522b227f0aeaa4332e7484ed9a9e2cca6cc967a15ab6bd2de2a4f2d5ef6785d976eb5650323fc4922f988bf6cae8ba4186cb727288b30a80be65b7fe314fec03492894dc7a89330a1b8c664fe3bae2df6083e4f79b356555a2949a8ad85788eb81e9d96ef77d6ffd540d5c0cbd09bbaa96b464edc20c5dd8fa7ef8eedeb16ebf556b8b59489add282aaa162ceb901ecbfd02567d1728fc164ec6a322f022699b8ec1b08eeedd68716ea097c02ea668d01c4bcd9924a693a56a340259d9d6290a82c43197579e8636a22dbdee0c2ccbef45262613984765167eea462d77ee4211ce643d849aa5c4d8cf1a1146fda4a8c9cab30bd2c25ee74efc83e359aae842c7f258ebbcb26a3652a1e79fa947313a10d16aad0c829cffddf581847986e5c61768eec5570cf9527a3d6cea8139edac45325a59cce7402cf7b3f0879aff866a6447bc788dfc3f7255da3771ae4c190541704f1c01fd2003413e06de9807fddc0e08645e77b7911b240be6380db93904535fe5580b478f8ee291b3733216e12b7d39cd945dcfeb25a728fc4563b5c1bcdc8dd882e6e8b1bd81c7349f002d1b8108b650ca6cd5d05c241cd239a5e64e1e18af70476cb644a6f18fc99b09e085304024b70806cd641566cb4780cc7bf83599c793a65d8fa03482356384dbde7684f89d6fbe1626a415c1d06a60b12de2ca9ea1f6da4cf6077c93b01963d1db6029a0fd7b92604a013f5fadb718fc66f78d687cab5e6fd34555a73b93c9360e56841fd2634c6ef3a2ef4e369770077fb5258d35a56b79df28d578c4f7b", 0x1000}, {&(0x7f0000001b00)="bec90fd6303592b663001f1d6497bf458be397eaddd62b7823982a585a225d54d65576c92be26ec916331c5b2e4692624b838c77015a93e64cf0dd90ebc17654f027b3ea6358a3b0c11ae8b1dba3e1ac122a248bc302d00ca7bd41ce0fa76a391d5060522a4fd702bcbd91e2d8472bb1ffae19cab5855923b35f", 0x7a}], 0x3, &(0x7f0000001bc0)=[{0x30, 0x88, 0x5, "b0eebd648039c2fc7049994ca031b3d1fe5b4266f8ddab79af552ecfef86cd85"}, {0xc0, 0x114, 0x2, "3dcc54f12ba6498738d60e3977e59505275c91a6e78db3447e98288443035fcbb14c716edb6a983b010e2c29002103cbe42a5fe598c07d4e971c562ca35c9460876d4b658b95e287cc4f7f5c1c6f3e16339f62f9401a482e63ebd5a2075a7540935c5b802b52c85d53ff4544720b0926a6a9fccfde4db6a352ef9671f5e36b219af40c3ec7f68b34a3c7b4efc3c21278cd712a280defc6ab38fe605118444d588732cda6803d5af02a8a9c485257"}, {0x108, 0x1, 0xfff, "69fa8e345452124a22d737d09dfecb58c60872df355eb130ff6bd5f41d4f0b5163b01b289955a7416ce5908e3be721ded392f095994a8e754a538c2661c2b27dc314ab745738839d5a0a5fe9f93bb4bcd8bfcf5f8e2c550b2a59b46d746c22973af01a01dd9a7cf2c0dc16008a4df41ca07c89454ecf4b1e22b2c5471e1148c8cdb0829c9a3d30bd25632dbb17b59c5503be7c2c338f41ead88cc2a99c8893df2dac05068eacbb0300d9c27b1cde6c81a1d73d16322e6698fd6e75262e3aec1a6fbe1af9d6be0ca3de52295207f237b3d4feb2f30a9fe7892e3a32aa6003351bc20747971c68306a64b87f9a3f42a790791e1b"}, {0x98, 0xff, 0x20000000, "ead0272bea4184c23f1ce9605c5dbcdb4647405005fd80348113390a532ccb445ebb128cfe5636b944174c5cb384091081a554d7ce13fcae4bf22e00783f178b038ae5bd15215c4c5f81f110cdf5706a1cb7e0640bc682885aa017c7f0cbd183e06ed86ee82943b2ae2edeb9a0f7ea3c426d2d8a1a296a8e699324fcc7ef47b274556378f98ee8"}, {0x40, 0x11, 0x8, "32f2c90c2044f2e82080d0bca413d7e69cdb715c95db03330b31d55fa118a5929b0cb5084daae76776"}, {0xf8, 0x109, 0x2, "7ad706d9d80e612f4819436fdf1ec4bbe96c887612a6a19f0e8de0775b4653910d32efbad014322c52b577de7686ae4f089363a4d2c7c8a32e7c3280799068aedae99a15836ffdafbecd2e42333410e72dbe0efa3717ffb0ab71b83d23bb26977440bfdb2f9688cf93f94d7ed49e7723a8e36d253c235fbd0871d3bd9824279a2f7bf1736c5b696aa1274bdd3d630134001227b3f77286de63d3174514b85dd9ccab32d7e865ef972a49e9e0b7a347db74b11a04d3d7f0023ba0f289552370d1acfb4f24b238ae1126850646f912431d5d653fdcfce58555df3b5451ed816b7566672ba3"}, {0x88, 0x10e, 0x2, "c8307c87ef9071a778536d999233a66f3588a7c929c0e8f1c3b3b617118e2b2a6b2d029d8acb21f720a9f816c9c60c795bf5780ecfb6322a5c3df4124c5da48ed6957ce5bfb1636d9dc50c80617de504336953086c2620eea63424d0547096abbfce47d8570f3bb1a9eac92d8b493c09f31d8a0b"}, {0xb0, 0x103, 0x7, "bdea55019516f107a78d0c9becbf7b65064d818feee5b3a2b6b419ac9813c81af055714f77c87ee7c3731cfc880f542e6225ab13674a1239925ae0e43d2a143034f5e55c75df0eda00208bfe77b757e00084e1f5c95868201e1d9f2a509cf24f3915b06bc35b1a6f907cdf5750aaf155ef72971cb85db303f3d0067ff394a7b4de14fb6dd2cb5fb87adfab65a9316891b595dac71d4dd0d9c3"}], 0x500}}, {{0x0, 0x0, &(0x7f0000002240)=[{&(0x7f00000020c0)="3975280c7b8a87ba12871a52730e8fc45998ea9e8ff3f9fe426816bc01b7d6b2fa19e207e932f97fff322b58e9f2bd9443fc672425f318f2b93cb7fdf0d39cdf881dc92ab5300c788f3aa54db1301e9ce1f2030d9d6a6701c5dc89138223deedde18c444f7cab184bf6940105d4b06b7bcec726233771cc441103af1b16eb4871e93827f01087f4e627c9f4e2e2f081077d9be83b482abd96615828217339f0f05dad3dde9372371aaadd31abb14d3b2e4c32e43643114563282e48db03a9a1614e872579f8eee7f03509a0f1396ab055df061608ea827", 0xd7}, {&(0x7f00000021c0)="a3a4934ec231d0b9c389dd3071ba8ccf9f03de6758843fde28fedc2575123b2c2cf9af3880216bcd5687631c40bda186be415fa15f36e85ffa2e53749ccbd770ec592f70f3141938d43eef7d746474a9d04160dd9a32e788ae46ea1fa7c2af7cb91ae85a9a35e8b096fa57cc624d7b", 0x6f}], 0x2, &(0x7f0000002280)=[{0x88, 0x84, 0x80, "a692d73019d2283e46d909cdd3a9e4c2f73deb58cab44d3b2bd22a10a29b5987193c4e00c2c1b9a47dc86dd4df197b4f2e9419a718d25c5bbc4263d7ef98b43e1ca954f75e69e0b2fa410749ccf08c9ef6f12093ba6472a947695a43481a657e7fcb504e0b40a56d70ce192fd97a221bfdbf8f807a6fb5ff"}, {0x78, 0x11d, 0x0, "b0d856270f20c28c9f2da3a3f193f565d6f12843ab4de7b08440087b88b834c38473bb3350135bb72a7167906122f0ae4b51bc8561dcbe26e891fc94af70fd1065f2af8f0b5c545044a9d96249048bd0f0f74c30785845b04f34f5844e10fc831c18"}, {0xd8, 0x1, 0x2, "2cea7d8b5d17a59c3c106d9df40746b0fed5bb4cb065409b6dffc0e44b3ea89781d6307799c1cda8272b0dfaec10a06748540dda13439c1b59ba449438f37f56fca0e5ed92c7f70b358ce691097bb4b1e578866d1907fc114478c2f706287d06c1a4fe4ea4b434f2517b7f04a2b6995250c20bae520ef99e25e8c0dcae9a12f8615ae3314da6f53f642c38b141ee2ff7d493a0e16b0ac5d3a40dd5069775b037d6a0b4361632832f8d24a244a3d3cdb3a9cb66d24e0e1599ed5920016b9914bb604ce6"}], 0x1d8}}, {{0x0, 0x0, &(0x7f0000003840)=[{&(0x7f0000002480)="d2f7e867650b7ea54994484dd93f3b88b176ce397f3d02f1a0d15e9f0e1a0cde7afff9e3936c0b3203c715ad206907bd47f8488eb68c79c32c39fa60418ec8ba8b6a88d758443b2ff94005ef7a58623ec3ceaffc95677c995ecfea9f24020c72deec1a13bb", 0x65}, {&(0x7f0000002500)="baaa6f661636311cd0fb4e5bcaaad24ed00354c433eb5ecad6745f7c938db53eac37df455f2a44869692c74fe240144524ad6125fa6274b7d750f210d950bb4c9aaecc224e99f6ea8f66d7ce5704d47d22ed1c50ed6881b86136c09e6f53b6762ac7b7106622456ef845dfc9134b8ab417f777d104bf03f04e62cc650056623217a7fe0207be22267e4435ff074577fa1225aa1b68739419b9aa6e0dac3e822c2f661651a2d9a40f25627862d71a0a9b", 0xb0}, {&(0x7f00000025c0)="8ed31bd071401bbc765fde04f9a4028137f635292da1079f2687375e9e28689e07d5641454a5f87c8897321532f8f0be6e1b74dedb154395f93ee9a55d1fa88c56ab00b93efde9b740f92916ed976e35dd4eb40d68c72e30c4ed1d7cc13c8a9a67b347ae8a61804b83504ef8e34a541f6c79b24a9c58fd94239656b9a0bc3895f7eafb6754f43386cf96933fe901705dc76695cf73", 0x95}, {&(0x7f0000003700)="31b870d1927d12478deff6c022f78953e76fbf4d298bfd005fed08c13bfdf56fb41ec650575c185a7f077257d1548a4f5b7ec530023b84117fce15047cb24568f5e206180730664bb336fa109da583e7ec9859953905c177b81407987cd99558091fa5a0dc0f60b3bc46e13dd048d6a36691cfef9e3be81fa053a6c0dd4747b2322697b5a4aeda19b4ba26c34dd0e6aa72f33ae02a05fbb6ad1d6f", 0x9b}, {&(0x7f00000037c0)="a663159d53936218701874f62ddab1d3feabfa04bc8eeff167f66596e7886bb4cb22367efb1bb6bff60e44f75b928867c012c430f8507f895237bbd0ba05f682aa0f010fca12251c44b461fb426cd606e1d5ec68d186b3e1c127104f4c392a23a3301c36132d9eb9ec1082c97308ad5f92cf576376", 0x75}], 0x5, &(0x7f00000038c0)=[{0x70, 0xc, 0x4, "720242d304fd8e3c5db9a94cf9ee631cda329c920a55b09caa0be142cddbcda55641459d53b3b5fc889a4c2de49f047c523ff16cd7b8262212652095c0fab39a33c85dd61bcba4c67019de8c503615279fb6b11c830695b3ba24605796"}], 0x70}}, {{&(0x7f0000003940)=@ethernet={0x306, @local}, 0x80, &(0x7f0000004080)=[{&(0x7f00000039c0)="dd4c429206e5b1b76a35f350af161f20b1880a18e3b40f541f7fc2c82fc1ba4d9b3cff134b6182150f5895a387f6c9816658c9867141811482f4bfb9412d04792089338f06e699fc8f9778e7285a0d1fe50faaeefe33a63424fc0b16dab3d0d6da1d821a9bdb13d60d2ea55c6d18d210088b36", 0x73}, {&(0x7f0000003a40)="2a464d00c50deec95f36d7dbcfdc9056bd75e0385d15d7532ca571ac751268c9356c8a2557724c4c3be695e82c9543810859fc73c135243347b510a1ed21eaeb70c5db7b0cc50d6410a1b1b6469768d70eb11630d0c5fc8a78900d50dc285764c2fe3f9663b52781ff6ee2d1bdf0224e518ead2d77e3fe45788b365da4c165831e7be21ebe8aa732893a64d34954a8098fbaa290fa339760141a837af1c67af37d0b4da43bb5c8682a26b92e619f70edd3b4f4fb8e227beb089c8b6b84d6b6b1f35204ad937dc328496f4244a01039a46719ca26a299d2f5e82a3d6e59193979dad4ddb9", 0xe4}, {&(0x7f0000003b40)="d5777c715384505114d0fac787157b2f4fa9fdb08bf080c596dfd064fc200d52d3afb999744002351062266104bfbb1b32c0bbc95f438fee5587b5c55fc1b04d9324e6aa672e1f216ad9ff7fb0429c27ae487d526cee0d6a30e9dadfaf55835c348294ef3bc49052072283f37a35f8d6902e83aa5f16d867c03b85d2a16dbd3e5b4d9aa39e6d220d75f5040c5dc343775bcc4b427a801b6225902593aabc", 0x9e}, {&(0x7f0000003c00)="efc48524c1c09b971fb08637ce5b34b214cb0840a1eeaae94e2c0d5645f6bc31ac42ff237e6e19bae4eae305cb5dc82e89c0e7b3e1fcd3394aaad0bf9f559395ca94ecc181ac766c630fd50a434638e788a0065083b4bdec2ef0e297724f77f269c5767f015ffeeb304509d10a4c89bdf629047b6b68046168ef798a4f443de99d443ab09e3be148abef28f9a0a8031c55151263fbb243b725e41a21bd00e91face144fcee4a768851164d3e47ea0b5ab30af654552d52c8", 0xb8}, {&(0x7f0000003cc0)="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", 0xfb}, {&(0x7f0000003dc0)="2fd0e9b2e5c082d6255e7aa5a74222c267851005f66cf9f435ad8b554c20c84f6af329935e964be8deff602884afd7a2ae734374a25682f09064a2092afcb6dafb7a7fe104d93551ab267438d241c54161316d00f7bed83094cf237c7a", 0x5d}, {&(0x7f0000003e40)="5d3ceed83d14691d5c3b2a0398b3ce905075618bd36ceec8fe2598263eca013e6e06ca9b5a9dcecf665800fd594cc7e0c5814389324eac13dfe512bf0629db4a5ca294fce3", 0x45}, {&(0x7f0000003ec0)="a625b4521f7d4f456f7cfcf0c89e8d8d2a2d153e4f150c79b426c6d3873b5ccd0c10bfd55e353765da83b5a24e003d75cb633962ef169f83e71c8a5d4060fadb73ea326cfdc251e370b9e103b04a58ed92e7dd673121849bb3867d0d32825f97c06951fd1414f3966600da353ca3b6acdaa1cae2aa09aa113bf1d55443e00a3e2fe54cc73695ccb8786494d1977aeb60fa41fb126b3cd4bcbdcf30445dc20264358c53ed7fb34ecc2739c269ec5f8c3f47007ba28a9ae1c43debf88a50ef42fbcb6956ad65f9fb7c4ee248b1746c59f4", 0xd0}, {&(0x7f0000003fc0)="c97815003e1508fc854d0934f32878613f5563ff1dfb9fbe0fabc59e8c157e09d6ea9c2e480a29515319e5900e484df5d65c71a768e3b18374e36cc48936186b60fe2bda4a710279d8b00df2530f78051f0408b171d693420854bcfd165fe85c96a73aee5be5203ea781169da90670073dad14de975b2fbf29f74c81fbcd056d189c92aa9711054ecc", 0x89}], 0x9, &(0x7f00000044c0)=ANY=[@ANYBLOB="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"], 0x168}}], 0x8, 0x8000) sendmmsg$sock(r0, &(0x7f0000000500)=[{{&(0x7f0000000000)=@isdn={0x22, 0x3f, 0xff, 0x4, 0x1}, 0x80, &(0x7f0000000440)=[{&(0x7f0000000100)="cc2a88ab85784adc198715939f9c0ab2258354f46249d6e6dbe53a20aa47a8dc49bb2edaa40d4129ebc307bb524431abf04d917ad68abf10", 0x38}, {&(0x7f0000000140)="df170db0cdaf57cdfba5349ae416750d1160f2c40c9a15239e331b3458bf7919cc553ba15e0cbbd816aab163b5d4e58fab14a7c7a870b91c85d3766e73d4129012244a8ddb1dbb12e8de1c7ea5ff12cccf6dfd30c89b4e7dd9ed1c411b88a0f170a7bfdb5f109672bf45cb2d31c40b01f1", 0x71}, {&(0x7f00000001c0)="09c9c55a04c60cef3e584fdf9659aa3d96c3fab0512f401cbb7acada7d8e4248af75c03b381d1df8605f0278faae4e1587d371bc0de46c14652edd3be76f9f841d8facfc72349d13a59ed9eea65fff4bbdc373ea82ce36c909269b151b8d4288d2a096f4057f46c0f4", 0x69}, {&(0x7f0000000240)="c4135cb6876af668301a369c2554cbd7df46ed978a24326eeb18803fef5bdccf73809e4381738fedfe60f65f043eebed1892a17aa55f458510d2372bde4baec08d9a859ba0f3be80a8ac07ca617d928ce37b67c5c7c9d3f4b1d82996a4c800b7926d5b4d54c6bcf6bbceb6f5ab10bbc4a5cfe5c9ae7148fbffcdf980a3b3a0e99ecea83912659a13f7103e44504495c2440c448636f9d822fbf64b276a6fd91862810fd3449aae249c165b1ba1199346936de8373d41c1167c06f6d730", 0xbd}, {&(0x7f0000000300)="74c771f34e3404ed8489f32945c03c3d1a2ca3bd23336246eedddfa6b146213d4b375be92d7b401e04aef6b1579d7c4865b25d248ffed3082004bab4700aa02f361abb8e933fa47d4c115db767fe3e5787610020a8b66ab052611729733948bf2f01007f593c17192b51bf591939ae9704b6e04bd5200680a9d03529159a2a055af9d9d947cfe7f10b891c14456561425f2aa537c02448b2e3f183eda547b8b3362a23440f83f8ad99bf19538267d0bc09d69f063da25736cc458ec7cf30829adbb27fb279063e", 0xc7}, {&(0x7f0000000400)="68de9618c1b2499093b5d42888394712459704c95e611880ada292f1d2efccad5a01fb4ffe852c0a48b844fdb633f71285cfef", 0x33}], 0x6, &(0x7f00000004c0)=[@mark={{0x14, 0x1, 0x24, 0x1}}, @timestamping={{0x14, 0x1, 0x25, 0x8}}], 0x30}}], 0x1, 0x10) [ 2689.969961][ T4489] FAULT_INJECTION: forcing a failure. [ 2689.969961][ T4489] name failslab, interval 1, probability 0, space 0, times 0 [ 2689.982724][ T4489] CPU: 1 PID: 4489 Comm: syz-executor.4 Tainted: G W 5.14.0-rc5-syzkaller #0 [ 2689.992808][ T4489] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2690.002901][ T4489] Call Trace: [ 2690.006236][ T4489] dump_stack_lvl+0xb7/0x103 [ 2690.010848][ T4489] dump_stack+0x11/0x1a [ 2690.014990][ T4489] should_fail+0x23c/0x250 [ 2690.019396][ T4489] __should_failslab+0x81/0x90 [ 2690.024143][ T4489] ? register_for_each_vma+0x372/0x890 [ 2690.029740][ T4489] should_failslab+0x5/0x20 [ 2690.034223][ T4489] kmem_cache_alloc_trace+0x49/0x310 [ 2690.039507][ T4489] ? register_for_each_vma+0x372/0x890 [ 2690.045007][ T4489] ? vma_interval_tree_iter_next+0x24c/0x280 [ 2690.051009][ T4489] register_for_each_vma+0x372/0x890 [ 2690.056348][ T4489] __uprobe_register+0x3f4/0x8a0 [ 2690.061301][ T4489] uprobe_register_refctr+0x29/0x40 [ 2690.066486][ T4489] probe_event_enable+0x2be/0x7d0 [ 2690.071510][ T4489] ? __uprobe_trace_func+0x430/0x430 [ 2690.076964][ T4489] trace_uprobe_register+0x88/0x410 [ 2690.082324][ T4489] perf_trace_event_init+0x34e/0x790 [ 2690.087602][ T4489] perf_uprobe_init+0xf5/0x140 [ 2690.092410][ T4489] perf_uprobe_event_init+0xde/0x140 [ 2690.097676][ T4489] perf_try_init_event+0x21a/0x400 [ 2690.103272][ T4489] perf_event_alloc+0xa60/0x1790 [ 2690.108196][ T4489] __se_sys_perf_event_open+0x5c7/0x27f0 [ 2690.113873][ T4489] ? vfs_write+0x50c/0x770 [ 2690.118268][ T4489] __x64_sys_perf_event_open+0x63/0x70 [ 2690.123722][ T4489] do_syscall_64+0x3d/0x90 [ 2690.128228][ T4489] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2690.134121][ T4489] RIP: 0033:0x4665e9 [ 2690.138048][ T4489] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2690.157718][ T4489] RSP: 002b:00007f94d1277188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a 17:52:31 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7a, 0x0, @perf_bp={&(0x7f0000000000), 0x300}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:52:31 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000017105000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:52:31 executing program 0: r0 = socket$inet6(0xa, 0x800, 0x10001) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e24, 0xfffffff8, @dev={0xfe, 0x80, '\x00', 0x3d}, 0x5}, 0x1c) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0}}], 0x2, 0x0) 17:52:31 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f01}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2690.166206][ T4489] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665e9 [ 2690.174190][ T4489] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000180 [ 2690.182167][ T4489] RBP: 00007f94d12771d0 R08: 0000000000000000 R09: 0000000000000000 [ 2690.190186][ T4489] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2690.198139][ T4489] R13: 00007ffd30f9a9ef R14: 00007f94d1277300 R15: 0000000000022000 17:52:31 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x4, 0x0, 0x0, 0x0, 0x4, 0x7, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffff801, 0x0, @perf_config_ext={0x1, 0xfffffffffffffffd}, 0x1520}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = fork() perf_event_open(&(0x7f0000000200)={0x0, 0x80, 0x20, 0x5, 0x8, 0x0, 0x0, 0xffff, 0x1010, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1ff, 0x2, @perf_bp={&(0x7f0000000080), 0x1}, 0x401a8, 0x3, 0x9, 0x8, 0x7fffffff, 0x2, 0x2, 0x0, 0x7, 0x0, 0x3}, r1, 0x10, 0xffffffffffffffff, 0x1) r2 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r2, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r3 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r3, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) ioctl$EVIOCGSW(r3, 0x8040451b, &(0x7f0000001540)) r4 = syz_open_dev$tty20(0xc, 0x4, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) ppoll(&(0x7f0000001480)=[{r4, 0x200}, {0xffffffffffffffff, 0xc255}, {r5, 0x208}, {0xffffffffffffffff, 0xa280}, {r2, 0x20}, {0xffffffffffffffff, 0x142}, {r0, 0x40}], 0x7, &(0x7f00000014c0)={0x0, 0x3938700}, &(0x7f0000001500)={[0x583]}, 0x8) 17:52:31 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000006000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:52:31 executing program 4 (fault-call:1 fault-nth:36): openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x300}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:52:31 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x10001, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000005580)={'wg0\x00', 0x0}) setsockopt$inet6_mreq(r1, 0x29, 0x14, &(0x7f00000055c0)={@local, r2}, 0x14) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0}}], 0x2, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f0000000040)={'rose0\x00'}) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e24, 0x2, @private2={0xfc, 0x2, '\x00', 0x1}, 0x9}, 0x1c) 17:52:31 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:52:31 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x12f, 0x0, @perf_bp={&(0x7f0000000000), 0x300}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:52:31 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000017106000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:52:31 executing program 0: sendmmsg(0xffffffffffffffff, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x10}, {0x108, 0x0, 0x0, "dc0e37ef1b2186bc19f4c303e6c3e8e180269be7d72f472d742d3b5d7373abbf6f501e3ae3ce3fdfe88a71e0c1bd209b3eca8eee2527bc0a25f0a23604312bff476ae3a22c33daa4d6e8d1b5d9230a641e6f72214825a2a81d3a9b9f2fd72e405d67e746de494775ae470157ef1ff3aec80d5ed88171815c8d271d04377fe4ef94d20c9d1fa0d02ae1d9b83d78185edcb71328146963feb9552d77f9f9bf3f3d7b7d659d7edbb1c1bf086309790a0592c126309791fcd5c6d8ce38616083a9d15f11fe82fe100174594890c0757c91631ec99b65c7b1103b7f467e3216b143dba1c70a19f2d0b33fa55fe8002100"/247}], 0x118}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0}}], 0x2, 0x0) [ 2690.856461][ T4536] FAULT_INJECTION: forcing a failure. [ 2690.856461][ T4536] name failslab, interval 1, probability 0, space 0, times 0 [ 2690.869096][ T4536] CPU: 0 PID: 4536 Comm: syz-executor.4 Tainted: G W 5.14.0-rc5-syzkaller #0 [ 2690.879147][ T4536] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2690.889196][ T4536] Call Trace: [ 2690.892485][ T4536] dump_stack_lvl+0xb7/0x103 [ 2690.897057][ T4536] dump_stack+0x11/0x1a [ 2690.901205][ T4536] should_fail+0x23c/0x250 [ 2690.905667][ T4536] __should_failslab+0x81/0x90 [ 2690.910425][ T4536] ? register_for_each_vma+0x372/0x890 [ 2690.915881][ T4536] should_failslab+0x5/0x20 [ 2690.920399][ T4536] kmem_cache_alloc_trace+0x49/0x310 [ 2690.925797][ T4536] ? register_for_each_vma+0x372/0x890 [ 2690.931327][ T4536] ? vma_interval_tree_iter_next+0x24c/0x280 [ 2690.937342][ T4536] register_for_each_vma+0x372/0x890 [ 2690.942650][ T4536] __uprobe_register+0x3f4/0x8a0 [ 2690.947566][ T4536] uprobe_register_refctr+0x29/0x40 [ 2690.952764][ T4536] probe_event_enable+0x2be/0x7d0 [ 2690.957770][ T4536] ? __uprobe_trace_func+0x430/0x430 [ 2690.963131][ T4536] trace_uprobe_register+0x88/0x410 [ 2690.968326][ T4536] perf_trace_event_init+0x34e/0x790 [ 2690.973593][ T4536] perf_uprobe_init+0xf5/0x140 [ 2690.978338][ T4536] perf_uprobe_event_init+0xde/0x140 [ 2690.983717][ T4536] perf_try_init_event+0x21a/0x400 [ 2690.988958][ T4536] perf_event_alloc+0xa60/0x1790 [ 2690.993894][ T4536] __se_sys_perf_event_open+0x5c7/0x27f0 [ 2690.999523][ T4536] ? vfs_write+0x50c/0x770 [ 2691.003935][ T4536] __x64_sys_perf_event_open+0x63/0x70 [ 2691.009384][ T4536] do_syscall_64+0x3d/0x90 [ 2691.013864][ T4536] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2691.019742][ T4536] RIP: 0033:0x4665e9 [ 2691.023635][ T4536] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2691.043229][ T4536] RSP: 002b:00007f94d1277188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a 17:52:32 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2691.051643][ T4536] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665e9 [ 2691.059699][ T4536] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000180 [ 2691.067701][ T4536] RBP: 00007f94d12771d0 R08: 0000000000000000 R09: 0000000000000000 [ 2691.075680][ T4536] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2691.083713][ T4536] R13: 00007ffd30f9a9ef R14: 00007f94d1277300 R15: 0000000000022000 17:52:32 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000007000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:52:32 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:52:32 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x406, r0) r2 = perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffff801, 0x0, @perf_bp={&(0x7f0000000000), 0xdc09}}, 0x0, 0x0, r1, 0x0) r3 = fork() perf_event_open(&(0x7f0000000200)={0x0, 0x80, 0x20, 0x5, 0x8, 0x0, 0x0, 0xffff, 0x1010, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1ff, 0x2, @perf_bp={&(0x7f0000000080), 0x1}, 0x401a8, 0x3, 0x9, 0x8, 0x7fffffff, 0x2, 0x2, 0x0, 0x7, 0x0, 0x3}, r3, 0x10, 0xffffffffffffffff, 0x1) r4 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r4, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r5 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r5, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) ioctl$EVIOCGSW(r5, 0x8040451b, &(0x7f0000001540)) r6 = syz_open_dev$tty20(0xc, 0x4, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) ppoll(&(0x7f0000001480)=[{r6, 0x200}, {0xffffffffffffffff, 0xc255}, {r7, 0x208}, {0xffffffffffffffff, 0xa280}, {r4, 0x20}, {0xffffffffffffffff, 0x142}, {r2, 0x40}], 0x7, &(0x7f00000014c0)={0x0, 0x3938700}, &(0x7f0000001500)={[0x583]}, 0x8) 17:52:32 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000280)={'sit0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'veth1_to_bridge\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r1, 0x89f7, &(0x7f0000000140)={'sit0\x00', &(0x7f00000000c0)={'syztnl2\x00', r4, 0x16, 0xbc, 0x80, 0x6, 0x8, @dev={0xfe, 0x80, '\x00', 0x38}, @empty, 0x20, 0x20, 0x9, 0x4}}) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000040)={@mcast1, @local, @private2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa2420200, r3}) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, &(0x7f0000000140)={'sit0\x00', &(0x7f00000000c0)={'syztnl2\x00', 0x0, 0x16, 0xbc, 0x80, 0x6, 0x8, @dev={0xfe, 0x80, '\x00', 0x38}, @empty, 0x20, 0x20, 0x9, 0x4}}) r6 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0xc4000, 0x0) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000180)={0x14, r7, 0x1, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r6, &(0x7f0000000380)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000200)={0x64, r7, 0x200, 0x70bd25, 0x25dfdbff, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x50, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0xffffffffffffffdb, 0x1, r5}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}]}, 0x64}, 0x1, 0x0, 0x0, 0x4}, 0x250c8e04860779a5) io_submit(0x0, 0x1, &(0x7f0000000300)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x5, 0xffffffffffffffff, &(0x7f0000000240)="54b6d4ca6b4c891bdd2acdf56916d8aa14f403845c1789130b3f", 0x1a, 0x146, 0x0, 0x2, r6}]) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0xfff, @local, 0xffffffff}, 0x1c) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @private2={0xfc, 0x2, '\x00', 0x1}}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10, 0x10d, 0x2}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0}}], 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r9, &(0x7f00000bd000), 0x318, 0x0) ppoll(&(0x7f00000001c0)=[{r9}], 0x1, 0x0, 0x0, 0x0) dup2(r9, r8) bind(r8, &(0x7f0000000180)=@isdn={0x22, 0xd4, 0x7, 0x0, 0x3}, 0x80) 17:52:32 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c00}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:52:32 executing program 4 (fault-call:1 fault-nth:37): openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x300}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:52:32 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000017107000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:52:32 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffff801, 0x0, @perf_bp={&(0x7f0000000000), 0xdc09}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = fork() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000000c0)=0x0) setpgid(r3, r2) perf_event_open(&(0x7f0000000200)={0x0, 0x80, 0x20, 0x5, 0x8, 0x0, 0x0, 0xffff, 0x1010, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1ff, 0x2, @perf_bp={&(0x7f0000000080), 0x1}, 0x401a8, 0x3, 0x9, 0x8, 0x7fffffff, 0x2, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x10, 0xffffffffffffffff, 0x1) r4 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r4, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r5 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r5, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) ioctl$KDENABIO(r0, 0x4b36) ioctl$EVIOCGSW(r5, 0x8040451b, &(0x7f0000001540)) r6 = syz_open_dev$tty20(0xc, 0x4, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) ppoll(&(0x7f0000001480)=[{r6, 0x200}, {0xffffffffffffffff, 0xc255}, {r7, 0x208}, {0xffffffffffffffff, 0xa280}, {r4, 0x20}, {0xffffffffffffffff, 0x142}, {r1, 0x40}], 0x7, &(0x7f00000014c0)={0x0, 0x3938700}, &(0x7f0000001500)={[0x583]}, 0x8) [ 2691.328996][ T4579] FAULT_INJECTION: forcing a failure. [ 2691.328996][ T4579] name failslab, interval 1, probability 0, space 0, times 0 [ 2691.341657][ T4579] CPU: 1 PID: 4579 Comm: syz-executor.4 Tainted: G W 5.14.0-rc5-syzkaller #0 [ 2691.351703][ T4579] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2691.361755][ T4579] Call Trace: [ 2691.365020][ T4579] dump_stack_lvl+0xb7/0x103 [ 2691.369659][ T4579] dump_stack+0x11/0x1a [ 2691.373807][ T4579] should_fail+0x23c/0x250 [ 2691.378217][ T4579] __should_failslab+0x81/0x90 [ 2691.382961][ T4579] ? register_for_each_vma+0x372/0x890 [ 2691.388415][ T4579] should_failslab+0x5/0x20 [ 2691.392999][ T4579] kmem_cache_alloc_trace+0x49/0x310 [ 2691.398290][ T4579] ? register_for_each_vma+0x372/0x890 [ 2691.403750][ T4579] ? vma_interval_tree_iter_next+0x263/0x280 [ 2691.409771][ T4579] register_for_each_vma+0x372/0x890 [ 2691.415044][ T4579] __uprobe_register+0x3f4/0x8a0 [ 2691.420051][ T4579] uprobe_register_refctr+0x29/0x40 [ 2691.425242][ T4579] probe_event_enable+0x2be/0x7d0 [ 2691.430326][ T4579] ? __uprobe_trace_func+0x430/0x430 [ 2691.435702][ T4579] trace_uprobe_register+0x88/0x410 [ 2691.440883][ T4579] perf_trace_event_init+0x34e/0x790 [ 2691.446150][ T4579] perf_uprobe_init+0xf5/0x140 [ 2691.450901][ T4579] perf_uprobe_event_init+0xde/0x140 [ 2691.456168][ T4579] perf_try_init_event+0x21a/0x400 [ 2691.461360][ T4579] perf_event_alloc+0xa60/0x1790 [ 2691.466295][ T4579] __se_sys_perf_event_open+0x5c7/0x27f0 [ 2691.471986][ T4579] ? vfs_write+0x50c/0x770 [ 2691.476379][ T4579] __x64_sys_perf_event_open+0x63/0x70 [ 2691.481818][ T4579] do_syscall_64+0x3d/0x90 [ 2691.486227][ T4579] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2691.492149][ T4579] RIP: 0033:0x4665e9 [ 2691.496024][ T4579] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2691.515627][ T4579] RSP: 002b:00007f94d1277188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a 17:52:32 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x29e, 0x0, @perf_bp={&(0x7f0000000000), 0x300}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:52:32 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:52:32 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000008000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 2691.524035][ T4579] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665e9 [ 2691.531995][ T4579] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000180 [ 2691.539954][ T4579] RBP: 00007f94d12771d0 R08: 0000000000000000 R09: 0000000000000000 [ 2691.547987][ T4579] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2691.555953][ T4579] R13: 00007ffd30f9a9ef R14: 00007f94d1277300 R15: 0000000000022000 17:52:32 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c00}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:52:32 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000017108000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:52:32 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000009000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:52:32 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:52:33 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmmsg(r0, &(0x7f0000000000), 0x0, 0x0) 17:52:33 executing program 4 (fault-call:1 fault-nth:38): openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x300}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:52:33 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffff801, 0x0, @perf_bp={&(0x7f0000000000), 0xdc09}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = fork() fsetxattr$security_evm(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000140)=@md5={0x1, "a1f052e4d61337745239a1595d607016"}, 0x11, 0x1) perf_event_open(&(0x7f0000000200)={0x0, 0x80, 0x20, 0x5, 0x8, 0x0, 0x0, 0xffff, 0x1010, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1ff, 0x2, @perf_bp={&(0x7f0000000080), 0x1}, 0x401a8, 0x3, 0x9, 0x8, 0x7fffffff, 0x2, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x10, 0xffffffffffffffff, 0x1) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000000, 0x2010, r0, 0x3fc1d000) r3 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r3, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) r4 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r4, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) ioctl$EVIOCGSW(r4, 0x8040451b, &(0x7f0000001540)) r5 = syz_open_dev$tty20(0xc, 0x4, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) ioctl$EVIOCSKEYCODE_V2(r4, 0x40284504, &(0x7f0000000380)={0x3, 0x15, 0x9, 0x8, "f5199d2972502a60f86026e54294e8420fb9d4dc539ef2aa6b76f6f47c9f90dc"}) ioctl$EVIOCGLED(r0, 0x80404519, &(0x7f0000000280)=""/249) ppoll(&(0x7f0000001480)=[{r5, 0x200}, {0xffffffffffffffff, 0xc255}, {r6, 0x208}, {0xffffffffffffffff, 0xa280}, {r3, 0x20}, {0xffffffffffffffff, 0x142}, {r1, 0x40}], 0x7, &(0x7f00000014c0)={0x0, 0x3938700}, &(0x7f0000001500)={[0x583]}, 0x8) 17:52:33 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000017109000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:52:33 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7a00}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:52:33 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300, 0x0, @perf_bp={&(0x7f0000000000), 0x300}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:52:33 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f00000000000000000a000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004", 0x2d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:52:33 executing program 0: sendmsg$NL802154_CMD_SET_CCA_ED_LEVEL(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x5000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000040)={0x2c, 0x0, 0x100, 0x70bd27, 0x25dfdbfc, {}, [@NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x3}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_IFINDEX={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x8000}, 0x4001) sendmmsg(0xffffffffffffffff, &(0x7f00000089c0)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=[{0x10}, {0x10}], 0x20}}, {{&(0x7f0000004900)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0}}], 0x2, 0x0) sendmsg$AUDIT_SET_FEATURE(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x20, 0x3fa, 0x200, 0x70bd2d, 0x25dfdbfd, {0x1, 0x0, 0x1}, ["", "", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x4}, 0xc040) 17:52:33 exe